From fec6d1bf6ad877fcadfeb5097597931bdbca8d0d Mon Sep 17 00:00:00 2001 From: Owl Bot Date: Tue, 22 Jul 2025 21:47:40 +0000 Subject: [PATCH 1/2] build(python): specify correct BigQuery sub-package namespace avoid clobbering PiperOrigin-RevId: 785895532 Source-Link: https://github.com/googleapis/googleapis/commit/26b80d9ba04a0662ecd7a0f05f3d9be96212618f Source-Link: https://github.com/googleapis/googleapis-gen/commit/73b45679b950532279396b7ba4480698490c740a Copy-Tag: eyJwIjoicGFja2FnZXMvZ29vZ2xlLWNsb3VkLWJpZ3F1ZXJ5LWRhdGFwb2xpY2llcy8uT3dsQm90LnlhbWwiLCJoIjoiNzNiNDU2NzliOTUwNTMyMjc5Mzk2YjdiYTQ0ODA2OTg0OTBjNzQwYSJ9 feat: Add client libraries for V2 Data Policy api PiperOrigin-RevId: 784248816 Source-Link: https://github.com/googleapis/googleapis/commit/af5b6c1ea82bc04143f838ca9816bd0ac5bdb60a Source-Link: https://github.com/googleapis/googleapis-gen/commit/ff4cc44446af1be4513c2e43b11d702cc04f60db Copy-Tag: eyJwIjoicGFja2FnZXMvZ29vZ2xlLWNsb3VkLWJpZ3F1ZXJ5LWRhdGFwb2xpY2llcy8uT3dsQm90LnlhbWwiLCJoIjoiZmY0Y2M0NDQ0NmFmMWJlNDUxM2MyZTQzYjExZDcwMmNjMDRmNjBkYiJ9 build(python): specify correct BigQuery sub-package namespace avoid clobbering PiperOrigin-RevId: 781709210 Source-Link: https://github.com/googleapis/googleapis/commit/d4be887ef681aa9c3c1c6b10aed839d154effa53 Source-Link: https://github.com/googleapis/googleapis-gen/commit/c23841dc49707fa9bef654c5a705394e99db1f15 Copy-Tag: eyJwIjoicGFja2FnZXMvZ29vZ2xlLWNsb3VkLWJpZ3F1ZXJ5LWRhdGFwb2xpY2llcy8uT3dsQm90LnlhbWwiLCJoIjoiYzIzODQxZGM0OTcwN2ZhOWJlZjY1NGM1YTcwNTM5NGU5OWRiMWYxNSJ9 feat: Release v2beta1 version containing Data Policy on Column PiperOrigin-RevId: 781183738 Source-Link: https://github.com/googleapis/googleapis/commit/600ff0624fdd1c74b637c21e10cc961dc845f3ad Source-Link: https://github.com/googleapis/googleapis-gen/commit/c4d623d0d876238a1c229a8a372b08f54f889c24 Copy-Tag: eyJwIjoicGFja2FnZXMvZ29vZ2xlLWNsb3VkLWJpZ3F1ZXJ5LWRhdGFwb2xpY2llcy8uT3dsQm90LnlhbWwiLCJoIjoiYzRkNjIzZDBkODc2MjM4YTFjMjI5YThhMzcyYjA4ZjU0Zjg4OWMyNCJ9 --- .../v1/.coveragerc | 13 + .../v1/.flake8 | 34 + .../v1/LICENSE | 202 + .../v1/MANIFEST.in | 20 + .../v1/README.rst | 143 + .../v1/docs/_static/custom.css | 20 + .../v1/docs/_templates/layout.html | 50 + .../data_policy_service.rst | 10 + .../bigquery_datapolicies_v1/services_.rst | 6 + .../docs/bigquery_datapolicies_v1/types_.rst | 6 + .../v1/docs/conf.py | 385 + .../v1/docs/index.rst | 10 + .../v1/docs/multiprocessing.rst | 7 + .../cloud/bigquery_datapolicies/__init__.py | 45 + .../bigquery_datapolicies/gapic_version.py | 16 + .../cloud/bigquery_datapolicies/py.typed | 2 + .../bigquery_datapolicies_v1/__init__.py | 46 + .../gapic_metadata.json | 163 + .../bigquery_datapolicies_v1/gapic_version.py | 16 + .../cloud/bigquery_datapolicies_v1/py.typed | 2 + .../services/__init__.py | 15 + .../services/data_policy_service/__init__.py | 22 + .../data_policy_service/async_client.py | 1277 +++ .../services/data_policy_service/client.py | 1635 ++++ .../services/data_policy_service/pagers.py | 166 + .../data_policy_service/transports/README.rst | 9 + .../transports/__init__.py | 38 + .../data_policy_service/transports/base.py | 356 + .../data_policy_service/transports/grpc.py | 566 ++ .../transports/grpc_asyncio.py | 708 ++ .../data_policy_service/transports/rest.py | 1833 ++++ .../transports/rest_base.py | 487 + .../types/__init__.py | 38 + .../types/datapolicy.py | 413 + .../v1/mypy.ini | 3 + .../v1/noxfile.py | 591 ++ ...policy_service_create_data_policy_async.py | 57 + ..._policy_service_create_data_policy_sync.py | 57 + ...policy_service_delete_data_policy_async.py | 50 + ..._policy_service_delete_data_policy_sync.py | 50 + ...ta_policy_service_get_data_policy_async.py | 52 + ...ata_policy_service_get_data_policy_sync.py | 52 + ...ata_policy_service_get_iam_policy_async.py | 53 + ...data_policy_service_get_iam_policy_sync.py | 53 + ...policy_service_list_data_policies_async.py | 53 + ..._policy_service_list_data_policies_sync.py | 53 + ...policy_service_rename_data_policy_async.py | 53 + ..._policy_service_rename_data_policy_sync.py | 53 + ...ata_policy_service_set_iam_policy_async.py | 53 + ...data_policy_service_set_iam_policy_sync.py | 53 + ...licy_service_test_iam_permissions_async.py | 54 + ...olicy_service_test_iam_permissions_sync.py | 54 + ...policy_service_update_data_policy_async.py | 56 + ..._policy_service_update_data_policy_sync.py | 56 + ...google.cloud.bigquery.datapolicies.v1.json | 1458 +++ ...fixup_bigquery_datapolicies_v1_keywords.py | 184 + .../v1/setup.py | 99 + .../v1/testing/constraints-3.10.txt | 7 + .../v1/testing/constraints-3.11.txt | 7 + .../v1/testing/constraints-3.12.txt | 7 + .../v1/testing/constraints-3.13.txt | 12 + .../v1/testing/constraints-3.7.txt | 11 + .../v1/testing/constraints-3.8.txt | 7 + .../v1/testing/constraints-3.9.txt | 7 + .../v1/tests/__init__.py | 16 + .../v1/tests/unit/__init__.py | 16 + .../v1/tests/unit/gapic/__init__.py | 16 + .../bigquery_datapolicies_v1/__init__.py | 16 + .../test_data_policy_service.py | 7526 +++++++++++++++ .../v1beta1/.coveragerc | 13 + .../v1beta1/.flake8 | 34 + .../v1beta1/LICENSE | 202 + .../v1beta1/MANIFEST.in | 20 + .../v1beta1/README.rst | 143 + .../v1beta1/docs/_static/custom.css | 20 + .../v1beta1/docs/_templates/layout.html | 50 + .../data_policy_service.rst | 10 + .../services_.rst | 6 + .../bigquery_datapolicies_v1beta1/types_.rst | 6 + .../v1beta1/docs/conf.py | 385 + .../v1beta1/docs/index.rst | 10 + .../v1beta1/docs/multiprocessing.rst | 7 + .../cloud/bigquery_datapolicies/__init__.py | 43 + .../bigquery_datapolicies/gapic_version.py | 16 + .../cloud/bigquery_datapolicies/py.typed | 2 + .../bigquery_datapolicies_v1beta1/__init__.py | 44 + .../gapic_metadata.json | 103 + .../gapic_version.py | 16 + .../bigquery_datapolicies_v1beta1/py.typed | 2 + .../services/__init__.py | 15 + .../services/data_policy_service/__init__.py | 22 + .../data_policy_service/async_client.py | 1162 +++ .../services/data_policy_service/client.py | 1519 +++ .../services/data_policy_service/pagers.py | 166 + .../data_policy_service/transports/README.rst | 9 + .../transports/__init__.py | 33 + .../data_policy_service/transports/base.py | 333 + .../data_policy_service/transports/grpc.py | 539 ++ .../transports/grpc_asyncio.py | 667 ++ .../types/__init__.py | 36 + .../types/datapolicy.py | 320 + .../v1beta1/mypy.ini | 3 + .../v1beta1/noxfile.py | 591 ++ ...policy_service_create_data_policy_async.py | 57 + ..._policy_service_create_data_policy_sync.py | 57 + ...policy_service_delete_data_policy_async.py | 50 + ..._policy_service_delete_data_policy_sync.py | 50 + ...ta_policy_service_get_data_policy_async.py | 52 + ...ata_policy_service_get_data_policy_sync.py | 52 + ...ata_policy_service_get_iam_policy_async.py | 53 + ...data_policy_service_get_iam_policy_sync.py | 53 + ...policy_service_list_data_policies_async.py | 53 + ..._policy_service_list_data_policies_sync.py | 53 + ...ata_policy_service_set_iam_policy_async.py | 53 + ...data_policy_service_set_iam_policy_sync.py | 53 + ...licy_service_test_iam_permissions_async.py | 54 + ...olicy_service_test_iam_permissions_sync.py | 54 + ...policy_service_update_data_policy_async.py | 56 + ..._policy_service_update_data_policy_sync.py | 56 + ...e.cloud.bigquery.datapolicies.v1beta1.json | 1289 +++ ..._bigquery_datapolicies_v1beta1_keywords.py | 183 + .../v1beta1/setup.py | 99 + .../v1beta1/testing/constraints-3.10.txt | 7 + .../v1beta1/testing/constraints-3.11.txt | 7 + .../v1beta1/testing/constraints-3.12.txt | 7 + .../v1beta1/testing/constraints-3.13.txt | 12 + .../v1beta1/testing/constraints-3.7.txt | 11 + .../v1beta1/testing/constraints-3.8.txt | 7 + .../v1beta1/testing/constraints-3.9.txt | 7 + .../v1beta1/tests/__init__.py | 16 + .../v1beta1/tests/unit/__init__.py | 16 + .../v1beta1/tests/unit/gapic/__init__.py | 16 + .../bigquery_datapolicies_v1beta1/__init__.py | 16 + .../test_data_policy_service.py | 4346 +++++++++ .../v2/.coveragerc | 13 + .../v2/.flake8 | 34 + .../v2/LICENSE | 202 + .../v2/MANIFEST.in | 20 + .../v2/README.rst | 143 + .../v2/docs/_static/custom.css | 20 + .../v2/docs/_templates/layout.html | 50 + .../data_policy_service.rst | 10 + .../bigquery_datapolicies_v2/services_.rst | 6 + .../docs/bigquery_datapolicies_v2/types_.rst | 6 + .../v2/docs/conf.py | 385 + .../v2/docs/index.rst | 10 + .../v2/docs/multiprocessing.rst | 7 + .../cloud/bigquery_datapolicies/__init__.py | 47 + .../bigquery_datapolicies/gapic_version.py | 16 + .../cloud/bigquery_datapolicies/py.typed | 2 + .../bigquery_datapolicies_v2/__init__.py | 48 + .../gapic_metadata.json | 178 + .../bigquery_datapolicies_v2/gapic_version.py | 16 + .../cloud/bigquery_datapolicies_v2/py.typed | 2 + .../services/__init__.py | 15 + .../services/data_policy_service/__init__.py | 22 + .../data_policy_service/async_client.py | 1437 +++ .../services/data_policy_service/client.py | 1812 ++++ .../services/data_policy_service/pagers.py | 166 + .../data_policy_service/transports/README.rst | 9 + .../transports/__init__.py | 38 + .../data_policy_service/transports/base.py | 399 + .../data_policy_service/transports/grpc.py | 598 ++ .../transports/grpc_asyncio.py | 774 ++ .../data_policy_service/transports/rest.py | 2008 ++++ .../transports/rest_base.py | 534 ++ .../types/__init__.py | 40 + .../types/datapolicy.py | 543 ++ .../v2/mypy.ini | 3 + .../v2/noxfile.py | 591 ++ ..._data_policy_service_add_grantees_async.py | 53 + ...d_data_policy_service_add_grantees_sync.py | 53 + ...policy_service_create_data_policy_async.py | 58 + ..._policy_service_create_data_policy_sync.py | 58 + ...policy_service_delete_data_policy_async.py | 50 + ..._policy_service_delete_data_policy_sync.py | 50 + ...ta_policy_service_get_data_policy_async.py | 52 + ...ata_policy_service_get_data_policy_sync.py | 52 + ...ata_policy_service_get_iam_policy_async.py | 53 + ...data_policy_service_get_iam_policy_sync.py | 53 + ...policy_service_list_data_policies_async.py | 53 + ..._policy_service_list_data_policies_sync.py | 53 + ...ta_policy_service_remove_grantees_async.py | 53 + ...ata_policy_service_remove_grantees_sync.py | 53 + ...ata_policy_service_set_iam_policy_async.py | 53 + ...data_policy_service_set_iam_policy_sync.py | 53 + ...licy_service_test_iam_permissions_async.py | 54 + ...olicy_service_test_iam_permissions_sync.py | 54 + ...policy_service_update_data_policy_async.py | 56 + ..._policy_service_update_data_policy_sync.py | 56 + ...google.cloud.bigquery.datapolicies.v2.json | 1635 ++++ ...fixup_bigquery_datapolicies_v2_keywords.py | 185 + .../v2/setup.py | 99 + .../v2/testing/constraints-3.10.txt | 7 + .../v2/testing/constraints-3.11.txt | 7 + .../v2/testing/constraints-3.12.txt | 7 + .../v2/testing/constraints-3.13.txt | 12 + .../v2/testing/constraints-3.7.txt | 11 + .../v2/testing/constraints-3.8.txt | 7 + .../v2/testing/constraints-3.9.txt | 7 + .../v2/tests/__init__.py | 16 + .../v2/tests/unit/__init__.py | 16 + .../v2/tests/unit/gapic/__init__.py | 16 + .../bigquery_datapolicies_v2/__init__.py | 16 + .../test_data_policy_service.py | 8343 +++++++++++++++++ .../v2beta1/.coveragerc | 13 + .../v2beta1/.flake8 | 34 + .../v2beta1/LICENSE | 202 + .../v2beta1/MANIFEST.in | 20 + .../v2beta1/README.rst | 143 + .../v2beta1/docs/_static/custom.css | 20 + .../v2beta1/docs/_templates/layout.html | 50 + .../data_policy_service.rst | 10 + .../services_.rst | 6 + .../bigquery_datapolicies_v2beta1/types_.rst | 6 + .../v2beta1/docs/conf.py | 385 + .../v2beta1/docs/index.rst | 10 + .../v2beta1/docs/multiprocessing.rst | 7 + .../cloud/bigquery_datapolicies/__init__.py | 47 + .../bigquery_datapolicies/gapic_version.py | 16 + .../cloud/bigquery_datapolicies/py.typed | 2 + .../bigquery_datapolicies_v2beta1/__init__.py | 48 + .../gapic_metadata.json | 178 + .../gapic_version.py | 16 + .../bigquery_datapolicies_v2beta1/py.typed | 2 + .../services/__init__.py | 15 + .../services/data_policy_service/__init__.py | 22 + .../data_policy_service/async_client.py | 1435 +++ .../services/data_policy_service/client.py | 1801 ++++ .../services/data_policy_service/pagers.py | 166 + .../data_policy_service/transports/README.rst | 9 + .../transports/__init__.py | 38 + .../data_policy_service/transports/base.py | 399 + .../data_policy_service/transports/grpc.py | 598 ++ .../transports/grpc_asyncio.py | 774 ++ .../data_policy_service/transports/rest.py | 2008 ++++ .../transports/rest_base.py | 534 ++ .../types/__init__.py | 40 + .../types/datapolicy.py | 449 + .../v2beta1/mypy.ini | 3 + .../v2beta1/noxfile.py | 591 ++ ..._data_policy_service_add_grantees_async.py | 53 + ...d_data_policy_service_add_grantees_sync.py | 53 + ...policy_service_create_data_policy_async.py | 58 + ..._policy_service_create_data_policy_sync.py | 58 + ...policy_service_delete_data_policy_async.py | 50 + ..._policy_service_delete_data_policy_sync.py | 50 + ...ta_policy_service_get_data_policy_async.py | 52 + ...ata_policy_service_get_data_policy_sync.py | 52 + ...ata_policy_service_get_iam_policy_async.py | 53 + ...data_policy_service_get_iam_policy_sync.py | 53 + ...policy_service_list_data_policies_async.py | 53 + ..._policy_service_list_data_policies_sync.py | 53 + ...ta_policy_service_remove_grantees_async.py | 53 + ...ata_policy_service_remove_grantees_sync.py | 53 + ...ata_policy_service_set_iam_policy_async.py | 53 + ...data_policy_service_set_iam_policy_sync.py | 53 + ...licy_service_test_iam_permissions_async.py | 54 + ...olicy_service_test_iam_permissions_sync.py | 54 + ...policy_service_update_data_policy_async.py | 56 + ..._policy_service_update_data_policy_sync.py | 56 + ...e.cloud.bigquery.datapolicies.v2beta1.json | 1635 ++++ ..._bigquery_datapolicies_v2beta1_keywords.py | 185 + .../v2beta1/setup.py | 99 + .../v2beta1/testing/constraints-3.10.txt | 7 + .../v2beta1/testing/constraints-3.11.txt | 7 + .../v2beta1/testing/constraints-3.12.txt | 7 + .../v2beta1/testing/constraints-3.13.txt | 12 + .../v2beta1/testing/constraints-3.7.txt | 11 + .../v2beta1/testing/constraints-3.8.txt | 7 + .../v2beta1/testing/constraints-3.9.txt | 7 + .../v2beta1/tests/__init__.py | 16 + .../v2beta1/tests/unit/__init__.py | 16 + .../v2beta1/tests/unit/gapic/__init__.py | 16 + .../bigquery_datapolicies_v2beta1/__init__.py | 16 + .../test_data_policy_service.py | 8320 ++++++++++++++++ 276 files changed, 76332 insertions(+) create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py create mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc new file mode 100644 index 000000000000..0c3effcc3668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc @@ -0,0 +1,13 @@ +[run] +branch = True + +[report] +show_missing = True +omit = + google/cloud/bigquery_datapolicies/__init__.py + google/cloud/bigquery_datapolicies/gapic_version.py +exclude_lines = + # Re-enable the standard pragma + pragma: NO COVER + # Ignore debug-only repr + def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 new file mode 100644 index 000000000000..90316de21489 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 @@ -0,0 +1,34 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +[flake8] +# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): +# Resolve flake8 lint issues +ignore = E203, E231, E266, E501, W503 +exclude = + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): + # Ensure that generated code passes flake8 lint + **/gapic/** + **/services/** + **/types/** + # Exclude Protobuf gencode + *_pb2.py + + # Standard linting exemptions. + **/.nox/** + __pycache__, + .git, + *.pyc, + conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE new file mode 100644 index 000000000000..d64569567334 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in new file mode 100644 index 000000000000..dae249ec8976 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +include README.rst LICENSE +recursive-include google *.py *.pyi *.json *.proto py.typed +recursive-include tests * +global-exclude *.py[co] +global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst new file mode 100644 index 000000000000..074e1245b6d1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst @@ -0,0 +1,143 @@ +Python Client for Google Cloud Bigquery Datapolicies API +================================================= + +Quick Start +----------- + +In order to use this library, you first need to go through the following steps: + +1. `Select or create a Cloud Platform project.`_ +2. `Enable billing for your project.`_ +3. Enable the Google Cloud Bigquery Datapolicies API. +4. `Setup Authentication.`_ + +.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project +.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project +.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html + +Installation +~~~~~~~~~~~~ + +Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to +create isolated Python environments. The basic problem it addresses is one of +dependencies and versions, and indirectly permissions. + +With `virtualenv`_, it's possible to install this library without needing system +install permissions, and without clashing with the installed system +dependencies. + +.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ + + +Mac/Linux +^^^^^^^^^ + +.. code-block:: console + + python3 -m venv + source /bin/activate + /bin/pip install /path/to/library + + +Windows +^^^^^^^ + +.. code-block:: console + + python3 -m venv + \Scripts\activate + \Scripts\pip.exe install \path\to\library + + +Logging +------- + +This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. +Note the following: + +#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. +#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. +#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. + + +Simple, environment-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google +logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged +messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging +event. + +A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. + +- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. +- Invalid logging scopes: :code:`foo`, :code:`123`, etc. + +**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. + + +Examples +^^^^^^^^ + +- Enabling the default handler for all Google-based loggers + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google + +- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 + + +Advanced, code-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +You can also configure a valid logging scope using Python's standard `logging` mechanism. + + +Examples +^^^^^^^^ + +- Configuring a handler for all Google-based loggers + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + +- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google.cloud.library_v1") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + + +Logging details +~~~~~~~~~~~~~~~ + +#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root + logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set + :code:`logging.getLogger("google").propagate = True` in your code. +#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for + one library, but decide you need to also set up environment-based logging configuration for another library. + + #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual + if the code -based configuration gets applied first. + +#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get + executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. + (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css new file mode 100644 index 000000000000..b0a295464b23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css @@ -0,0 +1,20 @@ +div#python2-eol { + border-color: red; + border-width: medium; +} + +/* Ensure minimum width for 'Parameters' / 'Returns' column */ +dl.field-list > dt { + min-width: 100px +} + +/* Insert space between methods for readability */ +dl.method { + padding-top: 10px; + padding-bottom: 10px +} + +/* Insert empty space between classes */ +dl.class { + padding-bottom: 50px +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html new file mode 100644 index 000000000000..95e9c77fcfe1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html @@ -0,0 +1,50 @@ + +{% extends "!layout.html" %} +{%- block content %} +{%- if theme_fixed_sidebar|lower == 'true' %} +
+ {{ sidebar() }} + {%- block document %} +
+ {%- if render_sidebar %} +
+ {%- endif %} + + {%- block relbar_top %} + {%- if theme_show_relbar_top|tobool %} + + {%- endif %} + {% endblock %} + +
+
+ As of January 1, 2020 this library no longer supports Python 2 on the latest released version. + Library versions released prior to that date will continue to be available. For more information please + visit Python 2 support on Google Cloud. +
+ {% block body %} {% endblock %} +
+ + {%- block relbar_bottom %} + {%- if theme_show_relbar_bottom|tobool %} + + {%- endif %} + {% endblock %} + + {%- if render_sidebar %} +
+ {%- endif %} +
+ {%- endblock %} +
+
+{%- else %} +{{ super() }} +{%- endif %} +{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst new file mode 100644 index 000000000000..9c23456d5fe3 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst @@ -0,0 +1,10 @@ +DataPolicyService +----------------------------------- + +.. automodule:: google.cloud.bigquery_datapolicies_v1.services.data_policy_service + :members: + :inherited-members: + +.. automodule:: google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers + :members: + :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst new file mode 100644 index 000000000000..7c9f6284928f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst @@ -0,0 +1,6 @@ +Services for Google Cloud Bigquery Datapolicies v1 API +====================================================== +.. toctree:: + :maxdepth: 2 + + data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst new file mode 100644 index 000000000000..d9b14f8bac0c --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst @@ -0,0 +1,6 @@ +Types for Google Cloud Bigquery Datapolicies v1 API +=================================================== + +.. automodule:: google.cloud.bigquery_datapolicies_v1.types + :members: + :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py new file mode 100644 index 000000000000..babd226a574e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py @@ -0,0 +1,385 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# +# google-cloud-bigquery-datapolicies documentation build configuration file +# +# This file is execfile()d with the current directory set to its +# containing dir. +# +# Note that not all possible configuration values are present in this +# autogenerated file. +# +# All configuration values have a default; values that are commented out +# serve to show the default. + +import sys +import os +import shlex + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +sys.path.insert(0, os.path.abspath("..")) + +# For plugins that can not read conf.py. +# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 +sys.path.insert(0, os.path.abspath(".")) + +__version__ = "" + +# -- General configuration ------------------------------------------------ + +# If your documentation needs a minimal Sphinx version, state it here. +needs_sphinx = "4.5.0" + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [ + "sphinx.ext.autodoc", + "sphinx.ext.autosummary", + "sphinx.ext.intersphinx", + "sphinx.ext.coverage", + "sphinx.ext.doctest", + "sphinx.ext.napoleon", + "sphinx.ext.todo", + "sphinx.ext.viewcode", + "recommonmark", +] + +# autodoc/autosummary flags +autoclass_content = "both" +autodoc_default_options = {"members": True} +autosummary_generate = True + + +# Add any paths that contain templates here, relative to this directory. +templates_path = ["_templates"] + +# The suffix(es) of source filenames. +# You can specify multiple suffix as a list of string: +# source_suffix = ['.rst', '.md'] +source_suffix = [".rst", ".md"] + +# The encoding of source files. +# source_encoding = 'utf-8-sig' + +# The root toctree document. +root_doc = "index" + +# General information about the project. +project = u"google-cloud-bigquery-datapolicies" +copyright = u"2025, Google, LLC" +author = u"Google APIs" + +# The version info for the project you're documenting, acts as replacement for +# |version| and |release|, also used in various other places throughout the +# built documents. +# +# The full version, including alpha/beta/rc tags. +release = __version__ +# The short X.Y version. +version = ".".join(release.split(".")[0:2]) + +# The language for content autogenerated by Sphinx. Refer to documentation +# for a list of supported languages. +# +# This is also used if you do content translation via gettext catalogs. +# Usually you set "language" from the command line for these cases. +language = None + +# There are two options for replacing |today|: either, you set today to some +# non-false value, then it is used: +# today = '' +# Else, today_fmt is used as the format for a strftime call. +# today_fmt = '%B %d, %Y' + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +exclude_patterns = [ + "_build", + "**/.nox/**/*", + "samples/AUTHORING_GUIDE.md", + "samples/CONTRIBUTING.md", + "samples/snippets/README.rst", +] + +# The reST default role (used for this markup: `text`) to use for all +# documents. +# default_role = None + +# If true, '()' will be appended to :func: etc. cross-reference text. +# add_function_parentheses = True + +# If true, the current module name will be prepended to all description +# unit titles (such as .. function::). +# add_module_names = True + +# If true, sectionauthor and moduleauthor directives will be shown in the +# output. They are ignored by default. +# show_authors = False + +# The name of the Pygments (syntax highlighting) style to use. +pygments_style = "sphinx" + +# A list of ignored prefixes for module index sorting. +# modindex_common_prefix = [] + +# If true, keep warnings as "system message" paragraphs in the built documents. +# keep_warnings = False + +# If true, `todo` and `todoList` produce output, else they produce nothing. +todo_include_todos = True + + +# -- Options for HTML output ---------------------------------------------- + +# The theme to use for HTML and HTML Help pages. See the documentation for +# a list of builtin themes. +html_theme = "alabaster" + +# Theme options are theme-specific and customize the look and feel of a theme +# further. For a list of options available for each theme, see the +# documentation. +html_theme_options = { + "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", + "github_user": "googleapis", + "github_repo": "google-cloud-python", + "github_banner": True, + "font_family": "'Roboto', Georgia, sans", + "head_font_family": "'Roboto', Georgia, serif", + "code_font_family": "'Roboto Mono', 'Consolas', monospace", +} + +# Add any paths that contain custom themes here, relative to this directory. +# html_theme_path = [] + +# The name for this set of Sphinx documents. If None, it defaults to +# " v documentation". +# html_title = None + +# A shorter title for the navigation bar. Default is the same as html_title. +# html_short_title = None + +# The name of an image file (relative to this directory) to place at the top +# of the sidebar. +# html_logo = None + +# The name of an image file (within the static path) to use as favicon of the +# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 +# pixels large. +# html_favicon = None + +# Add any paths that contain custom static files (such as style sheets) here, +# relative to this directory. They are copied after the builtin static files, +# so a file named "default.css" will overwrite the builtin "default.css". +html_static_path = ["_static"] + +# Add any extra paths that contain custom files (such as robots.txt or +# .htaccess) here, relative to this directory. These files are copied +# directly to the root of the documentation. +# html_extra_path = [] + +# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, +# using the given strftime format. +# html_last_updated_fmt = '%b %d, %Y' + +# If true, SmartyPants will be used to convert quotes and dashes to +# typographically correct entities. +# html_use_smartypants = True + +# Custom sidebar templates, maps document names to template names. +# html_sidebars = {} + +# Additional templates that should be rendered to pages, maps page names to +# template names. +# html_additional_pages = {} + +# If false, no module index is generated. +# html_domain_indices = True + +# If false, no index is generated. +# html_use_index = True + +# If true, the index is split into individual pages for each letter. +# html_split_index = False + +# If true, links to the reST sources are added to the pages. +# html_show_sourcelink = True + +# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. +# html_show_sphinx = True + +# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. +# html_show_copyright = True + +# If true, an OpenSearch description file will be output, and all pages will +# contain a tag referring to it. The value of this option must be the +# base URL from which the finished HTML is served. +# html_use_opensearch = '' + +# This is the file name suffix for HTML files (e.g. ".xhtml"). +# html_file_suffix = None + +# Language to be used for generating the HTML full-text search index. +# Sphinx supports the following languages: +# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' +# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' +# html_search_language = 'en' + +# A dictionary with options for the search language support, empty by default. +# Now only 'ja' uses this config value +# html_search_options = {'type': 'default'} + +# The name of a javascript file (relative to the configuration directory) that +# implements a search results scorer. If empty, the default will be used. +# html_search_scorer = 'scorer.js' + +# Output file base name for HTML help builder. +htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" + +# -- Options for warnings ------------------------------------------------------ + + +suppress_warnings = [ + # Temporarily suppress this to avoid "more than one target found for + # cross-reference" warning, which are intractable for us to avoid while in + # a mono-repo. + # See https://github.com/sphinx-doc/sphinx/blob + # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 + "ref.python" +] + +# -- Options for LaTeX output --------------------------------------------- + +latex_elements = { + # The paper size ('letterpaper' or 'a4paper'). + # 'papersize': 'letterpaper', + # The font size ('10pt', '11pt' or '12pt'). + # 'pointsize': '10pt', + # Additional stuff for the LaTeX preamble. + # 'preamble': '', + # Latex figure (float) alignment + # 'figure_align': 'htbp', +} + +# Grouping the document tree into LaTeX files. List of tuples +# (source start file, target name, title, +# author, documentclass [howto, manual, or own class]). +latex_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies.tex", + u"google-cloud-bigquery-datapolicies Documentation", + author, + "manual", + ) +] + +# The name of an image file (relative to this directory) to place at the top of +# the title page. +# latex_logo = None + +# For "manual" documents, if this is true, then toplevel headings are parts, +# not chapters. +# latex_use_parts = False + +# If true, show page references after internal links. +# latex_show_pagerefs = False + +# If true, show URL addresses after external links. +# latex_show_urls = False + +# Documents to append as an appendix to all manuals. +# latex_appendices = [] + +# If false, no module index is generated. +# latex_domain_indices = True + + +# -- Options for manual page output --------------------------------------- + +# One entry per manual page. List of tuples +# (source start file, name, description, authors, manual section). +man_pages = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + [author], + 1, + ) +] + +# If true, show URL addresses after external links. +# man_show_urls = False + + +# -- Options for Texinfo output ------------------------------------------- + +# Grouping the document tree into Texinfo files. List of tuples +# (source start file, target name, title, author, +# dir menu entry, description, category) +texinfo_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + author, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Library", + "APIs", + ) +] + +# Documents to append as an appendix to all manuals. +# texinfo_appendices = [] + +# If false, no module index is generated. +# texinfo_domain_indices = True + +# How to display URL addresses: 'footnote', 'no', or 'inline'. +# texinfo_show_urls = 'footnote' + +# If true, do not generate a @detailmenu in the "Top" node's menu. +# texinfo_no_detailmenu = False + + +# Example configuration for intersphinx: refer to the Python standard library. +intersphinx_mapping = { + "python": ("https://python.readthedocs.org/en/latest/", None), + "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), + "google.api_core": ( + "https://googleapis.dev/python/google-api-core/latest/", + None, + ), + "grpc": ("https://grpc.github.io/grpc/python/", None), + "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), + "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), +} + + +# Napoleon settings +napoleon_google_docstring = True +napoleon_numpy_docstring = True +napoleon_include_private_with_doc = False +napoleon_include_special_with_doc = True +napoleon_use_admonition_for_examples = False +napoleon_use_admonition_for_notes = False +napoleon_use_admonition_for_references = False +napoleon_use_ivar = False +napoleon_use_param = True +napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst new file mode 100644 index 000000000000..9f7b5a92c789 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst @@ -0,0 +1,10 @@ +.. include:: multiprocessing.rst + + +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v1/services_ + bigquery_datapolicies_v1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst new file mode 100644 index 000000000000..536d17b2ea65 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst @@ -0,0 +1,7 @@ +.. note:: + + Because this client uses :mod:`grpc` library, it is safe to + share instances across threads. In multiprocessing scenarios, the best + practice is to create client instances *after* the invocation of + :func:`os.fork` by :class:`multiprocessing.pool.Pool` or + :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py new file mode 100644 index 000000000000..3c37f4889a1e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies import gapic_version as package_version + +__version__ = package_version.__version__ + + +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service.client import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient + +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import CreateDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DataMaskingPolicy +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DataPolicy +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DeleteDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import GetDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import ListDataPoliciesRequest +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import ListDataPoliciesResponse +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import RenameDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1.types.datapolicy import UpdateDataPolicyRequest + +__all__ = ('DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RenameDataPolicyRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py new file mode 100644 index 000000000000..4305760e5115 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py @@ -0,0 +1,46 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import DataPolicyServiceClient +from .services.data_policy_service import DataPolicyServiceAsyncClient + +from .types.datapolicy import CreateDataPolicyRequest +from .types.datapolicy import DataMaskingPolicy +from .types.datapolicy import DataPolicy +from .types.datapolicy import DeleteDataPolicyRequest +from .types.datapolicy import GetDataPolicyRequest +from .types.datapolicy import ListDataPoliciesRequest +from .types.datapolicy import ListDataPoliciesResponse +from .types.datapolicy import RenameDataPolicyRequest +from .types.datapolicy import UpdateDataPolicyRequest + +__all__ = ( + 'DataPolicyServiceAsyncClient', +'CreateDataPolicyRequest', +'DataMaskingPolicy', +'DataPolicy', +'DataPolicyServiceClient', +'DeleteDataPolicyRequest', +'GetDataPolicyRequest', +'ListDataPoliciesRequest', +'ListDataPoliciesResponse', +'RenameDataPolicyRequest', +'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json new file mode 100644 index 000000000000..1ce28d57fccc --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json @@ -0,0 +1,163 @@ + { + "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", + "language": "python", + "libraryPackage": "google.cloud.bigquery_datapolicies_v1", + "protoPackage": "google.cloud.bigquery.datapolicies.v1", + "schema": "1.0", + "services": { + "DataPolicyService": { + "clients": { + "grpc": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RenameDataPolicy": { + "methods": [ + "rename_data_policy" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "grpc-async": { + "libraryClient": "DataPolicyServiceAsyncClient", + "rpcs": { + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RenameDataPolicy": { + "methods": [ + "rename_data_policy" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "rest": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RenameDataPolicy": { + "methods": [ + "rename_data_policy" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + } + } + } + } +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py new file mode 100644 index 000000000000..cbf94b283c70 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py @@ -0,0 +1,15 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py new file mode 100644 index 000000000000..deca793e77bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py @@ -0,0 +1,22 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .client import DataPolicyServiceClient +from .async_client import DataPolicyServiceAsyncClient + +__all__ = ( + 'DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py new file mode 100644 index 000000000000..4f878a380805 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py @@ -0,0 +1,1277 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging as std_logging +from collections import OrderedDict +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union + +from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version + +from google.api_core.client_options import ClientOptions +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + + +try: + OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .client import DataPolicyServiceClient + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +class DataPolicyServiceAsyncClient: + """Data Policy Service provides APIs for managing the + label-policy bindings. + """ + + _client: DataPolicyServiceClient + + # Copy defaults from the synchronous client for use here. + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT + DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE + _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE + + data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) + parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) + parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) + parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) + common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) + parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) + parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) + parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore + + from_service_account_json = from_service_account_file + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client instance. + """ + return self._client.transport + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._client._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used + by the client instance. + """ + return self._client._universe_domain + + get_transport_class = DataPolicyServiceClient.get_transport_class + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service async client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport to use. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client = DataPolicyServiceClient( + credentials=credentials, + transport=transport, + client_options=client_options, + client_info=client_info, + + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v1.DataPolicyServiceAsyncClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._client._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "credentialsType": None, + } + ) + + async def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest, dict]]): + The request object. Request message for the + CreateDataPolicy method. + parent (:class:`str`): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (:class:`google.cloud.bigquery_datapolicies_v1.types.DataPolicy`): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest, dict]]): + The request object. Response message for the + UpdateDataPolicy method. + data_policy (:class:`google.cloud.bigquery_datapolicies_v1.types.DataPolicy`): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def rename_data_policy(self, + request: Optional[Union[datapolicy.RenameDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + new_data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Renames the id (display name) of the specified data + policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_rename_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.RenameDataPolicyRequest( + name="name_value", + new_data_policy_id="new_data_policy_id_value", + ) + + # Make the request + response = await client.rename_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest, dict]]): + The request object. Request message for the + RenameDataPolicy method. + name (:class:`str`): + Required. Resource name of the data policy to rename. + The format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + new_data_policy_id (:class:`str`): + Required. The new data policy id. + This corresponds to the ``new_data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name, new_data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RenameDataPolicyRequest): + request = datapolicy.RenameDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + if new_data_policy_id is not None: + request.new_data_policy_id = new_data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.rename_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest, dict]]): + The request object. Request message for the + DeleteDataPolicy method. + name (:class:`str`): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + async def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest, dict]]): + The request object. Request message for the GetDataPolicy + method. + name (:class:`str`): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest, dict]]): + The request object. Request message for the + ListDataPolicies method. + parent (:class:`str`): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__aiter__` convenience method. + response = pagers.ListDataPoliciesAsyncPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def __aenter__(self) -> "DataPolicyServiceAsyncClient": + return self + + async def __aexit__(self, exc_type, exc, tb): + await self.transport.close() + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +__all__ = ( + "DataPolicyServiceAsyncClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py new file mode 100644 index 000000000000..38358b284aa3 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py @@ -0,0 +1,1635 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from http import HTTPStatus +import json +import logging as std_logging +import os +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +import warnings + +from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version + +from google.api_core import client_options as client_options_lib +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc import DataPolicyServiceGrpcTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .transports.rest import DataPolicyServiceRestTransport + + +class DataPolicyServiceClientMeta(type): + """Metaclass for the DataPolicyService client. + + This provides class-level methods for building and retrieving + support objects (e.g. transport) without polluting the client instance + objects. + """ + _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + _transport_registry["grpc"] = DataPolicyServiceGrpcTransport + _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport + _transport_registry["rest"] = DataPolicyServiceRestTransport + + def get_transport_class(cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: + """Returns an appropriate transport class. + + Args: + label: The name of the desired transport. If none is + provided, then the first transport in the registry is used. + + Returns: + The transport class to use. + """ + # If a specific transport is requested, return that one. + if label: + return cls._transport_registry[label] + + # No transport is requested; return the default (that is, the first one + # in the dictionary). + return next(iter(cls._transport_registry.values())) + + +class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): + """Data Policy Service provides APIs for managing the + label-policy bindings. + """ + + @staticmethod + def _get_default_mtls_endpoint(api_endpoint): + """Converts api endpoint to mTLS endpoint. + + Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to + "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. + Args: + api_endpoint (Optional[str]): the api endpoint to convert. + Returns: + str: converted mTLS api endpoint. + """ + if not api_endpoint: + return api_endpoint + + mtls_endpoint_re = re.compile( + r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" + ) + + m = mtls_endpoint_re.match(api_endpoint) + name, mtls, sandbox, googledomain = m.groups() + if mtls or not googledomain: + return api_endpoint + + if sandbox: + return api_endpoint.replace( + "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" + ) + + return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") + + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" + DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore + DEFAULT_ENDPOINT + ) + + _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" + _DEFAULT_UNIVERSE = "googleapis.com" + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_info(info) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_file( + filename) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + from_service_account_json = from_service_account_file + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client + instance. + """ + return self._transport + + @staticmethod + def data_policy_path(project: str,location: str,data_policy: str,) -> str: + """Returns a fully-qualified data_policy string.""" + return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + + @staticmethod + def parse_data_policy_path(path: str) -> Dict[str,str]: + """Parses a data_policy path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_billing_account_path(billing_account: str, ) -> str: + """Returns a fully-qualified billing_account string.""" + return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + + @staticmethod + def parse_common_billing_account_path(path: str) -> Dict[str,str]: + """Parse a billing_account path into its component segments.""" + m = re.match(r"^billingAccounts/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_folder_path(folder: str, ) -> str: + """Returns a fully-qualified folder string.""" + return "folders/{folder}".format(folder=folder, ) + + @staticmethod + def parse_common_folder_path(path: str) -> Dict[str,str]: + """Parse a folder path into its component segments.""" + m = re.match(r"^folders/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_organization_path(organization: str, ) -> str: + """Returns a fully-qualified organization string.""" + return "organizations/{organization}".format(organization=organization, ) + + @staticmethod + def parse_common_organization_path(path: str) -> Dict[str,str]: + """Parse a organization path into its component segments.""" + m = re.match(r"^organizations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_project_path(project: str, ) -> str: + """Returns a fully-qualified project string.""" + return "projects/{project}".format(project=project, ) + + @staticmethod + def parse_common_project_path(path: str) -> Dict[str,str]: + """Parse a project path into its component segments.""" + m = re.match(r"^projects/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_location_path(project: str, location: str, ) -> str: + """Returns a fully-qualified location string.""" + return "projects/{project}/locations/{location}".format(project=project, location=location, ) + + @staticmethod + def parse_common_location_path(path: str) -> Dict[str,str]: + """Parse a location path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + """Deprecated. Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + + warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning) + if client_options is None: + client_options = client_options_lib.ClientOptions() + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + + # Figure out the client cert source to use. + client_cert_source = None + if use_client_cert == "true": + if client_options.client_cert_source: + client_cert_source = client_options.client_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + + # Figure out which api endpoint to use. + if client_options.api_endpoint is not None: + api_endpoint = client_options.api_endpoint + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + api_endpoint = cls.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = cls.DEFAULT_ENDPOINT + + return api_endpoint, client_cert_source + + @staticmethod + def _read_environment_variables(): + """Returns the environment variables used by the client. + + Returns: + Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, + GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. + + Raises: + ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not + any of ["true", "false"]. + google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT + is not any of ["auto", "never", "always"]. + """ + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() + universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + return use_client_cert == "true", use_mtls_endpoint, universe_domain_env + + @staticmethod + def _get_client_cert_source(provided_cert_source, use_cert_flag): + """Return the client cert source to be used by the client. + + Args: + provided_cert_source (bytes): The client certificate source provided. + use_cert_flag (bool): A flag indicating whether to use the client certificate. + + Returns: + bytes or None: The client cert source to be used by the client. + """ + client_cert_source = None + if use_cert_flag: + if provided_cert_source: + client_cert_source = provided_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + return client_cert_source + + @staticmethod + def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + """Return the API endpoint used by the client. + + Args: + api_override (str): The API endpoint override. If specified, this is always + the return value of this function and the other arguments are not used. + client_cert_source (bytes): The client certificate source used by the client. + universe_domain (str): The universe domain used by the client. + use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. + Possible values are "always", "auto", or "never". + + Returns: + str: The API endpoint to be used by the client. + """ + if api_override is not None: + api_endpoint = api_override + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + if universe_domain != _default_universe: + raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + return api_endpoint + + @staticmethod + def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + """Return the universe domain used by the client. + + Args: + client_universe_domain (Optional[str]): The universe domain configured via the client options. + universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. + + Returns: + str: The universe domain to be used by the client. + + Raises: + ValueError: If the universe domain is an empty string. + """ + universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE + if client_universe_domain is not None: + universe_domain = client_universe_domain + elif universe_domain_env is not None: + universe_domain = universe_domain_env + if len(universe_domain.strip()) == 0: + raise ValueError("Universe Domain cannot be an empty string.") + return universe_domain + + def _validate_universe_domain(self): + """Validates client's and credentials' universe domains are consistent. + + Returns: + bool: True iff the configured universe domain is valid. + + Raises: + ValueError: If the configured universe domain is not valid. + """ + + # NOTE (b/349488459): universe validation is disabled until further notice. + return True + + def _add_cred_info_for_auth_errors( + self, + error: core_exceptions.GoogleAPICallError + ) -> None: + """Adds credential info string to error details for 401/403/404 errors. + + Args: + error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. + """ + if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + return + + cred = self._transport._credentials + + # get_cred_info is only available in google-auth>=2.35.0 + if not hasattr(cred, "get_cred_info"): + return + + # ignore the type check since pypy test fails when get_cred_info + # is not available + cred_info = cred.get_cred_info() # type: ignore + if cred_info and hasattr(error._details, "append"): + error._details.append(json.dumps(cred_info)) + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used by the client instance. + """ + return self._universe_domain + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that the ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client_options = client_options + if isinstance(self._client_options, dict): + self._client_options = client_options_lib.from_dict(self._client_options) + if self._client_options is None: + self._client_options = client_options_lib.ClientOptions() + self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + + universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + + self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) + self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) + self._api_endpoint = None # updated below, depending on `transport` + + # Initialize the universe domain validation. + self._is_universe_domain_valid = False + + if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER + # Setup logging. + client_logging.initialize_logging() + + api_key_value = getattr(self._client_options, "api_key", None) + if api_key_value and credentials: + raise ValueError("client_options.api_key and credentials are mutually exclusive") + + # Save or instantiate the transport. + # Ordinarily, we provide the transport, but allowing a custom transport + # instance provides an extensibility point for unusual situations. + transport_provided = isinstance(transport, DataPolicyServiceTransport) + if transport_provided: + # transport is a DataPolicyServiceTransport instance. + if credentials or self._client_options.credentials_file or api_key_value: + raise ValueError("When providing a transport instance, " + "provide its credentials directly.") + if self._client_options.scopes: + raise ValueError( + "When providing a transport instance, provide its scopes " + "directly." + ) + self._transport = cast(DataPolicyServiceTransport, transport) + self._api_endpoint = self._transport.host + + self._api_endpoint = (self._api_endpoint or + DataPolicyServiceClient._get_api_endpoint( + self._client_options.api_endpoint, + self._client_cert_source, + self._universe_domain, + self._use_mtls_endpoint)) + + if not transport_provided: + import google.auth._default # type: ignore + + if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): + credentials = google.auth._default.get_api_key_credentials(api_key_value) + + transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + DataPolicyServiceClient.get_transport_class(transport) + if isinstance(transport, str) or transport is None + else cast(Callable[..., DataPolicyServiceTransport], transport) + ) + # initialize with the provided callable or the passed in class + self._transport = transport_init( + credentials=credentials, + credentials_file=self._client_options.credentials_file, + host=self._api_endpoint, + scopes=self._client_options.scopes, + client_cert_source_for_mtls=self._client_cert_source, + quota_project_id=self._client_options.quota_project_id, + client_info=client_info, + always_use_jwt_access=True, + api_audience=self._client_options.api_audience, + ) + + if "async" not in str(self._transport): + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "credentialsType": None, + } + ) + + def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest, dict]): + The request object. Request message for the + CreateDataPolicy method. + parent (str): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest, dict]): + The request object. Response message for the + UpdateDataPolicy method. + data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def rename_data_policy(self, + request: Optional[Union[datapolicy.RenameDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + new_data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Renames the id (display name) of the specified data + policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_rename_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.RenameDataPolicyRequest( + name="name_value", + new_data_policy_id="new_data_policy_id_value", + ) + + # Make the request + response = client.rename_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest, dict]): + The request object. Request message for the + RenameDataPolicy method. + name (str): + Required. Resource name of the data policy to rename. + The format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + new_data_policy_id (str): + Required. The new data policy id. + This corresponds to the ``new_data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name, new_data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RenameDataPolicyRequest): + request = datapolicy.RenameDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + if new_data_policy_id is not None: + request.new_data_policy_id = new_data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.rename_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest, dict]): + The request object. Request message for the + DeleteDataPolicy method. + name (str): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest, dict]): + The request object. Request message for the GetDataPolicy + method. + name (str): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + + def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest, dict]): + The request object. Request message for the + ListDataPolicies method. + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__iter__` convenience method. + response = pagers.ListDataPoliciesPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def __enter__(self) -> "DataPolicyServiceClient": + return self + + def __exit__(self, type, value, traceback): + """Releases underlying transport's resources. + + .. warning:: + ONLY use as a context manager if the transport is NOT shared + with other clients! Exiting the with block will CLOSE the transport + and may cause errors in other clients! + """ + self.transport.close() + + + + + + + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + +__all__ = ( + "DataPolicyServiceClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py new file mode 100644 index 000000000000..a1dd388dd5d7 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py @@ -0,0 +1,166 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.api_core import retry_async as retries_async +from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy + + +class ListDataPoliciesPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` object, and + provides an ``__iter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__iter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiate the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.Retry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + + def __iter__(self) -> Iterator[datapolicy.DataPolicy]: + for page in self.pages: + yield from page.data_policies + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + + +class ListDataPoliciesAsyncPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` object, and + provides an ``__aiter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__aiter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiates the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.AsyncRetry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: + async def async_generator(): + async for page in self.pages: + for response in page.data_policies: + yield response + + return async_generator() + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst new file mode 100644 index 000000000000..b83d156af245 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst @@ -0,0 +1,9 @@ + +transport inheritance structure +_______________________________ + +`DataPolicyServiceTransport` is the ABC for all transports. +- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). +- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). +- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). +- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py new file mode 100644 index 000000000000..2c95ef809668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py @@ -0,0 +1,38 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from typing import Dict, Type + +from .base import DataPolicyServiceTransport +from .grpc import DataPolicyServiceGrpcTransport +from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .rest import DataPolicyServiceRestTransport +from .rest import DataPolicyServiceRestInterceptor + + +# Compile a registry of transports. +_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] +_transport_registry['grpc'] = DataPolicyServiceGrpcTransport +_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry['rest'] = DataPolicyServiceRestTransport + +__all__ = ( + 'DataPolicyServiceTransport', + 'DataPolicyServiceGrpcTransport', + 'DataPolicyServiceGrpcAsyncIOTransport', + 'DataPolicyServiceRestTransport', + 'DataPolicyServiceRestInterceptor', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py new file mode 100644 index 000000000000..8538f8466860 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py @@ -0,0 +1,356 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import abc +from typing import Awaitable, Callable, Dict, Optional, Sequence, Union + +from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version + +import google.auth # type: ignore +import google.api_core +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceTransport(abc.ABC): + """Abstract transport class for DataPolicyService.""" + + AUTH_SCOPES = ( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', + ) + + DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + + def __init__( + self, *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A list of scopes. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + """ + + scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} + + # Save the scopes. + self._scopes = scopes + if not hasattr(self, "_ignore_credentials"): + self._ignore_credentials: bool = False + + # If no credentials are provided, then determine the appropriate + # defaults. + if credentials and credentials_file: + raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + + if credentials_file is not None: + credentials, _ = google.auth.load_credentials_from_file( + credentials_file, + **scopes_kwargs, + quota_project_id=quota_project_id + ) + elif credentials is None and not self._ignore_credentials: + credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + # Don't apply audience if the credentials file passed from user. + if hasattr(credentials, "with_gdch_audience"): + credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + + # If the credentials are service account credentials, then always try to use self signed JWT. + if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + credentials = credentials.with_always_use_jwt_access(True) + + # Save the credentials. + self._credentials = credentials + + # Save the hostname. Default to port 443 (HTTPS) if none is specified. + if ':' not in host: + host += ':443' + self._host = host + + @property + def host(self): + return self._host + + def _prep_wrapped_messages(self, client_info): + # Precompute the wrapped methods. + self._wrapped_methods = { + self.create_data_policy: gapic_v1.method.wrap_method( + self.create_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.update_data_policy: gapic_v1.method.wrap_method( + self.update_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.rename_data_policy: gapic_v1.method.wrap_method( + self.rename_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.delete_data_policy: gapic_v1.method.wrap_method( + self.delete_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_data_policy: gapic_v1.method.wrap_method( + self.get_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.list_data_policies: gapic_v1.method.wrap_method( + self.list_data_policies, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_iam_policy: gapic_v1.method.wrap_method( + self.get_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.set_iam_policy: gapic_v1.method.wrap_method( + self.set_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.test_iam_permissions: gapic_v1.method.wrap_method( + self.test_iam_permissions, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + } + + def close(self): + """Closes resources associated with the transport. + + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! + """ + raise NotImplementedError() + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def rename_data_policy(self) -> Callable[ + [datapolicy.RenameDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[ + empty_pb2.Empty, + Awaitable[empty_pb2.Empty] + ]]: + raise NotImplementedError() + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse] + ]]: + raise NotImplementedError() + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse] + ]]: + raise NotImplementedError() + + @property + def kind(self) -> str: + raise NotImplementedError() + + +__all__ = ( + 'DataPolicyServiceTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py new file mode 100644 index 000000000000..3f9e9dd9a085 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py @@ -0,0 +1,566 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json +import logging as std_logging +import pickle +import warnings +from typing import Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import grpc_helpers +from google.api_core import gapic_v1 +import google.auth # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER + def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = response.result() + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response for {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": client_call_details.method, + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): + """gRPC backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the + label-policy bindings. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + _stubs: Dict[str, Callable] + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if a ``channel`` instance is provided. + channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, grpc.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientInterceptor() + self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> grpc.Channel: + """Create and return a gRPC channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + grpc.Channel: A gRPC channel object. + + Raises: + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + + return grpc_helpers.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + @property + def grpc_channel(self) -> grpc.Channel: + """Return the channel designed to connect to this service. + """ + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def rename_data_policy(self) -> Callable[ + [datapolicy.RenameDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the rename data policy method over gRPC. + + Renames the id (display name) of the specified data + policy. + + Returns: + Callable[[~.RenameDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'rename_data_policy' not in self._stubs: + self._stubs['rename_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/RenameDataPolicy', + request_serializer=datapolicy.RenameDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['rename_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + ~.Empty]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + ~.ListDataPoliciesResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + ~.TestIamPermissionsResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def close(self): + self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc" + + +__all__ = ( + 'DataPolicyServiceGrpcTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py new file mode 100644 index 000000000000..df6c8bb5887c --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py @@ -0,0 +1,708 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import inspect +import json +import pickle +import logging as std_logging +import warnings +from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers_async +from google.api_core import exceptions as core_exceptions +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore +from grpc.experimental import aio # type: ignore + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .grpc import DataPolicyServiceGrpcTransport + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER + async def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = await continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = await response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = await response + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response to rpc {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": str(client_call_details.method), + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): + """gRPC AsyncIO backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the + label-policy bindings. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + + _grpc_channel: aio.Channel + _stubs: Dict[str, Callable] = {} + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> aio.Channel: + """Create and return a gRPC AsyncIO channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + aio.Channel: A gRPC AsyncIO channel object. + """ + + return grpc_helpers_async.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, aio.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientAIOInterceptor() + self._grpc_channel._unary_unary_interceptors.append(self._interceptor) + self._logged_channel = self._grpc_channel + self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @property + def grpc_channel(self) -> aio.Channel: + """Create the channel designed to connect to this service. + + This property caches on the instance; repeated calls return + the same channel. + """ + # Return the channel from cache. + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def rename_data_policy(self) -> Callable[ + [datapolicy.RenameDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the rename data policy method over gRPC. + + Renames the id (display name) of the specified data + policy. + + Returns: + Callable[[~.RenameDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'rename_data_policy' not in self._stubs: + self._stubs['rename_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/RenameDataPolicy', + request_serializer=datapolicy.RenameDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['rename_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Awaitable[empty_pb2.Empty]]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + Awaitable[~.Empty]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse]]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + Awaitable[~.ListDataPoliciesResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + Awaitable[~.TestIamPermissionsResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def _prep_wrapped_messages(self, client_info): + """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + self._wrapped_methods = { + self.create_data_policy: self._wrap_method( + self.create_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.update_data_policy: self._wrap_method( + self.update_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.rename_data_policy: self._wrap_method( + self.rename_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.delete_data_policy: self._wrap_method( + self.delete_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_data_policy: self._wrap_method( + self.get_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.list_data_policies: self._wrap_method( + self.list_data_policies, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_iam_policy: self._wrap_method( + self.get_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.set_iam_policy: self._wrap_method( + self.set_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.test_iam_permissions: self._wrap_method( + self.test_iam_permissions, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + } + + def _wrap_method(self, func, *args, **kwargs): + if self._wrap_with_kind: # pragma: NO COVER + kwargs["kind"] = self.kind + return gapic_v1.method_async.wrap_method(func, *args, **kwargs) + + def close(self): + return self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc_asyncio" + + +__all__ = ( + 'DataPolicyServiceGrpcAsyncIOTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py new file mode 100644 index 000000000000..36566edccae6 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py @@ -0,0 +1,1833 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging +import json # type: ignore + +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.api_core import rest_helpers +from google.api_core import rest_streaming +from google.api_core import gapic_v1 +import google.protobuf + +from google.protobuf import json_format + +from requests import __version__ as requests_version +import dataclasses +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +from .rest_base import _BaseDataPolicyServiceRestTransport +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = logging.getLogger(__name__) + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=f"requests@{requests_version}", +) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceRestInterceptor: + """Interceptor for DataPolicyService. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the DataPolicyServiceRestTransport. + + .. code-block:: python + class MyCustomDataPolicyServiceInterceptor(DataPolicyServiceRestInterceptor): + def pre_create_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_delete_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def pre_get_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_get_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_data_policies(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_data_policies(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_rename_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_rename_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_set_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_set_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_test_iam_permissions(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_test_iam_permissions(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_update_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + transport = DataPolicyServiceRestTransport(interceptor=MyCustomDataPolicyServiceInterceptor()) + client = DataPolicyServiceClient(transport=transport) + + + """ + def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for create_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for create_data_policy + + DEPRECATED. Please use the `post_create_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_create_data_policy` interceptor runs + before the `post_create_data_policy_with_metadata` interceptor. + """ + return response + + def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for create_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_create_data_policy_with_metadata` + interceptor in new development instead of the `post_create_data_policy` interceptor. + When both interceptors are used, this `post_create_data_policy_with_metadata` interceptor runs after the + `post_create_data_policy` interceptor. The (possibly modified) response returned by + `post_create_data_policy` will be passed to + `post_create_data_policy_with_metadata`. + """ + return response, metadata + + def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for delete_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for get_data_policy + + DEPRECATED. Please use the `post_get_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_data_policy` interceptor runs + before the `post_get_data_policy_with_metadata` interceptor. + """ + return response + + def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_data_policy_with_metadata` + interceptor in new development instead of the `post_get_data_policy` interceptor. + When both interceptors are used, this `post_get_data_policy_with_metadata` interceptor runs after the + `post_get_data_policy` interceptor. The (possibly modified) response returned by + `post_get_data_policy` will be passed to + `post_get_data_policy_with_metadata`. + """ + return response, metadata + + def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for get_iam_policy + + DEPRECATED. Please use the `post_get_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_iam_policy` interceptor runs + before the `post_get_iam_policy_with_metadata` interceptor. + """ + return response + + def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_iam_policy_with_metadata` + interceptor in new development instead of the `post_get_iam_policy` interceptor. + When both interceptors are used, this `post_get_iam_policy_with_metadata` interceptor runs after the + `post_get_iam_policy` interceptor. The (possibly modified) response returned by + `post_get_iam_policy` will be passed to + `post_get_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for list_data_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: + """Post-rpc interceptor for list_data_policies + + DEPRECATED. Please use the `post_list_data_policies_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_list_data_policies` interceptor runs + before the `post_list_data_policies_with_metadata` interceptor. + """ + return response + + def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for list_data_policies + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_list_data_policies_with_metadata` + interceptor in new development instead of the `post_list_data_policies` interceptor. + When both interceptors are used, this `post_list_data_policies_with_metadata` interceptor runs after the + `post_list_data_policies` interceptor. The (possibly modified) response returned by + `post_list_data_policies` will be passed to + `post_list_data_policies_with_metadata`. + """ + return response, metadata + + def pre_rename_data_policy(self, request: datapolicy.RenameDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RenameDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for rename_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_rename_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for rename_data_policy + + DEPRECATED. Please use the `post_rename_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_rename_data_policy` interceptor runs + before the `post_rename_data_policy_with_metadata` interceptor. + """ + return response + + def post_rename_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for rename_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_rename_data_policy_with_metadata` + interceptor in new development instead of the `post_rename_data_policy` interceptor. + When both interceptors are used, this `post_rename_data_policy_with_metadata` interceptor runs after the + `post_rename_data_policy` interceptor. The (possibly modified) response returned by + `post_rename_data_policy` will be passed to + `post_rename_data_policy_with_metadata`. + """ + return response, metadata + + def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for set_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for set_iam_policy + + DEPRECATED. Please use the `post_set_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_set_iam_policy` interceptor runs + before the `post_set_iam_policy_with_metadata` interceptor. + """ + return response + + def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for set_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_set_iam_policy_with_metadata` + interceptor in new development instead of the `post_set_iam_policy` interceptor. + When both interceptors are used, this `post_set_iam_policy_with_metadata` interceptor runs after the + `post_set_iam_policy` interceptor. The (possibly modified) response returned by + `post_set_iam_policy` will be passed to + `post_set_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for test_iam_permissions + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: + """Post-rpc interceptor for test_iam_permissions + + DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_test_iam_permissions` interceptor runs + before the `post_test_iam_permissions_with_metadata` interceptor. + """ + return response + + def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for test_iam_permissions + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_test_iam_permissions_with_metadata` + interceptor in new development instead of the `post_test_iam_permissions` interceptor. + When both interceptors are used, this `post_test_iam_permissions_with_metadata` interceptor runs after the + `post_test_iam_permissions` interceptor. The (possibly modified) response returned by + `post_test_iam_permissions` will be passed to + `post_test_iam_permissions_with_metadata`. + """ + return response, metadata + + def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for update_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for update_data_policy + + DEPRECATED. Please use the `post_update_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_update_data_policy` interceptor runs + before the `post_update_data_policy_with_metadata` interceptor. + """ + return response + + def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for update_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_update_data_policy_with_metadata` + interceptor in new development instead of the `post_update_data_policy` interceptor. + When both interceptors are used, this `post_update_data_policy_with_metadata` interceptor runs after the + `post_update_data_policy` interceptor. The (possibly modified) response returned by + `post_update_data_policy` will be passed to + `post_update_data_policy_with_metadata`. + """ + return response, metadata + + +@dataclasses.dataclass +class DataPolicyServiceRestStub: + _session: AuthorizedSession + _host: str + _interceptor: DataPolicyServiceRestInterceptor + + +class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): + """REST backend synchronous transport for DataPolicyService. + + Data Policy Service provides APIs for managing the + label-policy bindings. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[ + ], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + interceptor: Optional[DataPolicyServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + url_scheme=url_scheme, + api_audience=api_audience + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST) + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or DataPolicyServiceRestInterceptor() + self._prep_wrapped_messages(client_info) + + class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.CreateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.CreateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the create data policy method over HTTP. + + Args: + request (~.datapolicy.CreateDataPolicyRequest): + The request object. Request message for the + CreateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_create_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.CreateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "CreateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_create_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.create_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "CreateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.DeleteDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ): + r"""Call the delete data policy method over HTTP. + + Args: + request (~.datapolicy.DeleteDataPolicyRequest): + The request object. Request message for the + DeleteDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.DeleteDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "DeleteDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.GetDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the get data policy method over HTTP. + + Args: + request (~.datapolicy.GetDataPolicyRequest): + The request object. Request message for the GetDataPolicy + method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.GetDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "GetDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.get_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "GetDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.GetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the get iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.GetIamPolicyRequest): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.GetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "GetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.get_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "GetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.ListDataPolicies") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.ListDataPoliciesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.ListDataPoliciesResponse: + r"""Call the list data policies method over HTTP. + + Args: + request (~.datapolicy.ListDataPoliciesRequest): + The request object. Request message for the + ListDataPolicies method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.ListDataPoliciesResponse: + Response message for the + ListDataPolicies method. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + + request, metadata = self._interceptor.pre_list_data_policies(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.ListDataPolicies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "ListDataPolicies", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.ListDataPoliciesResponse() + pb_resp = datapolicy.ListDataPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_list_data_policies(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.list_data_policies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "ListDataPolicies", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _RenameDataPolicy(_BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.RenameDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.RenameDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the rename data policy method over HTTP. + + Args: + request (~.datapolicy.RenameDataPolicyRequest): + The request object. Request message for the + RenameDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_rename_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.RenameDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "RenameDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._RenameDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_rename_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_rename_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.rename_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "RenameDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.SetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.SetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the set iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.SetIamPolicyRequest): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.SetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "SetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_set_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.set_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "SetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.TestIamPermissions") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.TestIamPermissionsRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Call the test iam permissions method over HTTP. + + Args: + request (~.iam_policy_pb2.TestIamPermissionsRequest): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.iam_policy_pb2.TestIamPermissionsResponse: + Response message for ``TestIamPermissions`` method. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + + request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.TestIamPermissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "TestIamPermissions", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = iam_policy_pb2.TestIamPermissionsResponse() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_test_iam_permissions(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.test_iam_permissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "TestIamPermissions", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.UpdateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the update data policy method over HTTP. + + Args: + request (~.datapolicy.UpdateDataPolicyRequest): + The request object. Response message for the + UpdateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_update_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.UpdateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_update_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.update_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def rename_data_policy(self) -> Callable[ + [datapolicy.RenameDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._RenameDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__=( + 'DataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py new file mode 100644 index 000000000000..d49390db633f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py @@ -0,0 +1,487 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json # type: ignore +from google.api_core import path_template +from google.api_core import gapic_v1 + +from google.protobuf import json_format +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +import re +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union + + +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): + """Base REST backend transport for DataPolicyService. + + Note: This class is not meant to be used directly. Use its sync and + async sub-classes instead. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[Any] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[Any]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience + ) + + class _BaseCreateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v1/{parent=projects/*/locations/*}/dataPolicies', + 'body': 'data_policy', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.CreateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseDeleteDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'delete', + 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.DeleteDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.GetDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseListDataPolicies: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v1/{parent=projects/*/locations/*}/dataPolicies', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.ListDataPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseRenameDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}:rename', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.RenameDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseSetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseTestIamPermissions: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseUpdateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'patch', + 'uri': '/v1/{data_policy.name=projects/*/locations/*/dataPolicies/*}', + 'body': 'data_policy', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.UpdateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + +__all__=( + '_BaseDataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py new file mode 100644 index 000000000000..995ed7f38c5f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py @@ -0,0 +1,38 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .datapolicy import ( + CreateDataPolicyRequest, + DataMaskingPolicy, + DataPolicy, + DeleteDataPolicyRequest, + GetDataPolicyRequest, + ListDataPoliciesRequest, + ListDataPoliciesResponse, + RenameDataPolicyRequest, + UpdateDataPolicyRequest, +) + +__all__ = ( + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RenameDataPolicyRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py new file mode 100644 index 000000000000..ffea92f32392 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py @@ -0,0 +1,413 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from __future__ import annotations + +from typing import MutableMapping, MutableSequence + +import proto # type: ignore + +from google.protobuf import field_mask_pb2 # type: ignore + + +__protobuf__ = proto.module( + package='google.cloud.bigquery.datapolicies.v1', + manifest={ + 'CreateDataPolicyRequest', + 'UpdateDataPolicyRequest', + 'RenameDataPolicyRequest', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'DataPolicy', + 'DataMaskingPolicy', + }, +) + + +class CreateDataPolicyRequest(proto.Message): + r"""Request message for the CreateDataPolicy method. + + Attributes: + parent (str): + Required. Resource name of the project that the data policy + will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): + Required. The data policy to create. The ``name`` field does + not need to be provided for the data policy creation. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=2, + message='DataPolicy', + ) + + +class UpdateDataPolicyRequest(proto.Message): + r"""Response message for the UpdateDataPolicy method. + + Attributes: + data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` field. + Other fields are updated to the specified values based on + the field masks. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are allowed + to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are not + allowed. + """ + + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + update_mask: field_mask_pb2.FieldMask = proto.Field( + proto.MESSAGE, + number=2, + message=field_mask_pb2.FieldMask, + ) + + +class RenameDataPolicyRequest(proto.Message): + r"""Request message for the RenameDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the data policy to rename. The + format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` + new_data_policy_id (str): + Required. The new data policy id. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + new_data_policy_id: str = proto.Field( + proto.STRING, + number=2, + ) + + +class DeleteDataPolicyRequest(proto.Message): + r"""Request message for the DeleteDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the data policy to delete. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class GetDataPolicyRequest(proto.Message): + r"""Request message for the GetDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the requested data policy. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class ListDataPoliciesRequest(proto.Message): + r"""Request message for the ListDataPolicies method. + + Attributes: + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + page_size (int): + The maximum number of data policies to + return. Must be a value between 1 and 1000. + If not set, defaults to 50. + page_token (str): + The ``nextPageToken`` value returned from a previous list + request, if any. If not set, defaults to an empty string. + filter (str): + Filters the data policies by policy tags that they are + associated with. Currently filter only supports + "policy\_tag" based filtering and OR based predicates. + Sample filter can be "policy\_tag: + projects/1/locations/us/taxonomies/2/policyTags/3". You may + also use wildcard such as "policy\_tag: + projects/1/locations/us/taxonomies/2*". Please note that OR + predicates cannot be used with wildcard filters. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + page_size: int = proto.Field( + proto.INT32, + number=2, + ) + page_token: str = proto.Field( + proto.STRING, + number=3, + ) + filter: str = proto.Field( + proto.STRING, + number=4, + ) + + +class ListDataPoliciesResponse(proto.Message): + r"""Response message for the ListDataPolicies method. + + Attributes: + data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v1.types.DataPolicy]): + Data policies that belong to the requested + project. + next_page_token (str): + Token used to retrieve the next page of + results, or empty if there are no more results. + """ + + @property + def raw_page(self): + return self + + data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + next_page_token: str = proto.Field( + proto.STRING, + number=2, + ) + + +class DataPolicy(proto.Message): + r"""Represents the label-policy binding. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + policy_tag (str): + Policy tag resource name, in the format of + ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. + + This field is a member of `oneof`_ ``matching_label``. + data_masking_policy (google.cloud.bigquery_datapolicies_v1.types.DataMaskingPolicy): + The data masking policy that specifies the + data masking rule to use. + + This field is a member of `oneof`_ ``policy``. + name (str): + Output only. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + data_policy_type (google.cloud.bigquery_datapolicies_v1.types.DataPolicy.DataPolicyType): + Type of data policy. + data_policy_id (str): + User-assigned (human readable) ID of the data policy that + needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + """ + class DataPolicyType(proto.Enum): + r"""A list of supported data policy types. + + Values: + DATA_POLICY_TYPE_UNSPECIFIED (0): + Default value for the data policy type. This + should not be used. + COLUMN_LEVEL_SECURITY_POLICY (3): + Used to create a data policy for column-level + security, without data masking. + DATA_MASKING_POLICY (2): + Used to create a data policy for data + masking. + """ + DATA_POLICY_TYPE_UNSPECIFIED = 0 + COLUMN_LEVEL_SECURITY_POLICY = 3 + DATA_MASKING_POLICY = 2 + + policy_tag: str = proto.Field( + proto.STRING, + number=4, + oneof='matching_label', + ) + data_masking_policy: 'DataMaskingPolicy' = proto.Field( + proto.MESSAGE, + number=5, + oneof='policy', + message='DataMaskingPolicy', + ) + name: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_type: DataPolicyType = proto.Field( + proto.ENUM, + number=2, + enum=DataPolicyType, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=3, + ) + + +class DataMaskingPolicy(proto.Message): + r"""The data masking policy that is used to specify data masking + rule. + + This message has `oneof`_ fields (mutually exclusive fields). + For each oneof, at most one member field can be set at the same time. + Setting any member of the oneof automatically clears all other + members. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + predefined_expression (google.cloud.bigquery_datapolicies_v1.types.DataMaskingPolicy.PredefinedExpression): + A predefined masking expression. + + This field is a member of `oneof`_ ``masking_expression``. + routine (str): + The name of the BigQuery routine that contains the custom + masking routine, in the format of + ``projects/{project_number}/datasets/{dataset_id}/routines/{routine_id}``. + + This field is a member of `oneof`_ ``masking_expression``. + """ + class PredefinedExpression(proto.Enum): + r"""The available masking rules. Learn more here: + https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. + + Values: + PREDEFINED_EXPRESSION_UNSPECIFIED (0): + Default, unspecified predefined expression. + No masking will take place since no expression + is specified. + SHA256 (3): + Masking expression to replace data with + SHA-256 hash. + ALWAYS_NULL (5): + Masking expression to replace data with + NULLs. + DEFAULT_MASKING_VALUE (7): + Masking expression to replace data with their default + masking values. The default masking values for each type + listed as below: + + - STRING: "" + - BYTES: b'' + - INTEGER: 0 + - FLOAT: 0.0 + - NUMERIC: 0 + - BOOLEAN: FALSE + - TIMESTAMP: 1970-01-01 00:00:00 UTC + - DATE: 1970-01-01 + - TIME: 00:00:00 + - DATETIME: 1970-01-01T00:00:00 + - GEOGRAPHY: POINT(0 0) + - BIGNUMERIC: 0 + - ARRAY: [] + - STRUCT: NOT_APPLICABLE + - JSON: NULL + LAST_FOUR_CHARACTERS (9): + Masking expression shows the last four characters of text. + The masking behavior is as follows: + + - If text length > 4 characters: Replace text with XXXXX, + append last four characters of original text. + - If text length <= 4 characters: Apply SHA-256 hash. + FIRST_FOUR_CHARACTERS (10): + Masking expression shows the first four characters of text. + The masking behavior is as follows: + + - If text length > 4 characters: Replace text with XXXXX, + prepend first four characters of original text. + - If text length <= 4 characters: Apply SHA-256 hash. + EMAIL_MASK (12): + Masking expression for email addresses. The masking behavior + is as follows: + + - Syntax-valid email address: Replace username with XXXXX. + For example, cloudysanfrancisco@gmail.com becomes + XXXXX@gmail.com. + - Syntax-invalid email address: Apply SHA-256 hash. + + For more information, see `Email + mask `__. + DATE_YEAR_MASK (13): + Masking expression to only show the year of ``Date``, + ``DateTime`` and ``TimeStamp``. For example, with the year + 2076: + + - DATE : 2076-01-01 + - DATETIME : 2076-01-01T00:00:00 + - TIMESTAMP : 2076-01-01 00:00:00 UTC + + Truncation occurs according to the UTC time zone. To change + this, adjust the default time zone using the ``time_zone`` + system variable. For more information, see the System + variables reference. + """ + PREDEFINED_EXPRESSION_UNSPECIFIED = 0 + SHA256 = 3 + ALWAYS_NULL = 5 + DEFAULT_MASKING_VALUE = 7 + LAST_FOUR_CHARACTERS = 9 + FIRST_FOUR_CHARACTERS = 10 + EMAIL_MASK = 12 + DATE_YEAR_MASK = 13 + + predefined_expression: PredefinedExpression = proto.Field( + proto.ENUM, + number=1, + oneof='masking_expression', + enum=PredefinedExpression, + ) + routine: str = proto.Field( + proto.STRING, + number=3, + oneof='masking_expression', + ) + + +__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini new file mode 100644 index 000000000000..574c5aed394b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini @@ -0,0 +1,3 @@ +[mypy] +python_version = 3.7 +namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py new file mode 100644 index 000000000000..25d78ab7c0ff --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py @@ -0,0 +1,591 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +import pathlib +import re +import shutil + +from typing import Dict, List +import warnings + +import nox + +BLACK_VERSION = "black[jupyter]==23.7.0" +ISORT_VERSION = "isort==5.11.0" + +LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] + +ALL_PYTHON = [ + "3.7", + "3.8", + "3.9", + "3.10", + "3.11", + "3.12", + "3.13", +] + +DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] + +CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() + +LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" +PACKAGE_NAME = "google-cloud-bigquery-datapolicies" + +UNIT_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "asyncmock", + "pytest", + "pytest-cov", + "pytest-asyncio", +] +UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_DEPENDENCIES: List[str] = [] +UNIT_TEST_EXTRAS: List[str] = [] +UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] +SYSTEM_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "pytest", + "google-cloud-testutils", +] +SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_EXTRAS: List[str] = [] +SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +nox.options.sessions = [ + "unit", + "system", + "cover", + "lint", + "lint_setup_py", + "blacken", + "docs", +] + +# Error if a python version is missing +nox.options.error_on_missing_interpreters = True + + +@nox.session(python=ALL_PYTHON) +def mypy(session): + """Run the type checker.""" + session.install( + "mypy", + "types-requests", + "types-protobuf", + ) + session.install(".") + session.run( + "mypy", + "-p", + "google", + ) + + +@nox.session +def update_lower_bounds(session): + """Update lower bounds in constraints.txt to match setup.py""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "update", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session +def check_lower_bounds(session): + """Check lower bounds in setup.py are reflected in constraints file""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "check", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint(session): + """Run linters. + + Returns a failure if the linters find linting errors or sufficiently + serious code quality issues. + """ + session.install("flake8", BLACK_VERSION) + session.run( + "black", + "--check", + *LINT_PATHS, + ) + + session.run("flake8", "google", "tests") + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def blacken(session): + """Run black. Format code to uniform standard.""" + session.install(BLACK_VERSION) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def format(session): + """ + Run isort to sort imports. Then run black + to format code to uniform standard. + """ + session.install(BLACK_VERSION, ISORT_VERSION) + # Use the --fss option to sort imports using strict alphabetical order. + # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections + session.run( + "isort", + "--fss", + *LINT_PATHS, + ) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint_setup_py(session): + """Verify that setup.py is valid (including RST check).""" + session.install("setuptools", "docutils", "pygments") + session.run("python", "setup.py", "check", "--restructuredtext", "--strict") + + +def install_unittest_dependencies(session, *constraints): + standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES + session.install(*standard_deps, *constraints) + + if UNIT_TEST_EXTERNAL_DEPENDENCIES: + warnings.warn( + "'unit_test_external_dependencies' is deprecated. Instead, please " + "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", + DeprecationWarning, + ) + session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_LOCAL_DEPENDENCIES: + session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_EXTRAS_BY_PYTHON: + extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif UNIT_TEST_EXTRAS: + extras = UNIT_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=ALL_PYTHON) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def unit(session, protobuf_implementation): + # Install all test dependencies, then install this package in-place. + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + install_unittest_dependencies(session, "-c", constraints_path) + + # TODO(https://github.com/googleapis/synthtool/issues/1976): + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + f"--junitxml=unit_{session.python}_sponge_log.xml", + "--cov=google", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +def install_systemtest_dependencies(session, *constraints): + session.install("--pre", "grpcio") + + session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: + session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_LOCAL_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTRAS_BY_PYTHON: + extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif SYSTEM_TEST_EXTRAS: + extras = SYSTEM_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) +def system(session): + """Run the system test suite.""" + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + system_test_path = os.path.join("tests", "system.py") + system_test_folder_path = os.path.join("tests", "system") + + # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. + if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": + session.skip("RUN_SYSTEM_TESTS is set to false, skipping") + # Install pyopenssl for mTLS testing. + if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": + session.install("pyopenssl") + + system_test_exists = os.path.exists(system_test_path) + system_test_folder_exists = os.path.exists(system_test_folder_path) + # Sanity check: only run tests if found. + if not system_test_exists and not system_test_folder_exists: + session.skip("System tests were not found") + + install_systemtest_dependencies(session, "-c", constraints_path) + + # Run py.test against the system tests. + if system_test_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_path, + *session.posargs, + ) + if system_test_folder_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_folder_path, + *session.posargs, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def cover(session): + """Run the final coverage report. + + This outputs the coverage report aggregating coverage from the unit + test runs (not system test runs), and then erases coverage data. + """ + session.install("coverage", "pytest-cov") + session.run("coverage", "report", "--show-missing", "--fail-under=100") + + session.run("coverage", "erase") + + +@nox.session(python="3.10") +def docs(session): + """Build the docs for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "sphinx==4.5.0", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-W", # warnings as errors + "-T", # show full traceback on exception + "-N", # no colors + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python="3.10") +def docfx(session): + """Build the docfx yaml files for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "gcp-sphinx-docfx-yaml", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-T", # show full traceback on exception + "-N", # no colors + "-D", + ( + "extensions=sphinx.ext.autodoc," + "sphinx.ext.autosummary," + "docfx_yaml.extension," + "sphinx.ext.intersphinx," + "sphinx.ext.coverage," + "sphinx.ext.napoleon," + "sphinx.ext.todo," + "sphinx.ext.viewcode," + "recommonmark" + ), + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def prerelease_deps(session, protobuf_implementation): + """ + Run all tests with pre-release versions of dependencies installed + rather than the standard non pre-release versions. + Pre-release versions can be installed using + `pip install --pre `. + """ + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # Note: If a dependency is added to the `prerel_deps` list, + # the `core_dependencies_from_source` list in the `core_deps_from_source` + # nox session should also be updated. + prerel_deps = [ + "googleapis-common-protos", + "google-api-core", + "google-auth", + "grpc-google-iam-v1", + "grpcio", + "grpcio-status", + "protobuf", + "proto-plus", + ] + + for dep in prerel_deps: + session.install("--pre", "--no-deps", "--ignore-installed", dep) + # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` + # to the dictionary below once this bug is fixed. + # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add + # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below + # once this bug is fixed. + package_namespaces = { + "google-api-core": "google.api_core", + "google-auth": "google.auth", + "grpcio": "grpc", + "protobuf": "google.protobuf", + "proto-plus": "proto", + } + + version_namespace = package_namespaces.get(dep) + + print(f"Installed {dep}") + if version_namespace: + session.run( + "python", + "-c", + f"import {version_namespace}; print({version_namespace}.__version__)", + ) + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb"], +) +def core_deps_from_source(session, protobuf_implementation): + """Run all tests with core dependencies installed from source + rather than pulling the dependencies from PyPI. + """ + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and + # `grpcio-status` should be added to the list below so that they are installed from source, + # rather than PyPI. + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be + # added to the list below so that it is installed from source, rather than PyPI + # Note: If a dependency is added to the `core_dependencies_from_source` list, + # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. + core_dependencies_from_source = [ + "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", + "google-api-core @ git+https://github.com/googleapis/python-api-core.git", + "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", + "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", + "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", + ] + + for dep in core_dependencies_from_source: + session.install(dep, "--no-deps", "--ignore-installed") + print(f"Installed {dep}") + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py new file mode 100644 index 000000000000..3435852d6d72 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py new file mode 100644 index 000000000000..416215eaf8a0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py new file mode 100644 index 000000000000..bd938f6cd0a4 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py new file mode 100644 index 000000000000..88dde1367751 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py new file mode 100644 index 000000000000..609b7bb8dac1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py new file mode 100644 index 000000000000..f3cf35a06ba8 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py new file mode 100644 index 000000000000..1006832c420e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py new file mode 100644 index 000000000000..026f90ae6db9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py new file mode 100644 index 000000000000..865a7a51b5bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py new file mode 100644 index 000000000000..1df6eea1eee2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py new file mode 100644 index 000000000000..f01f13869a60 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RenameDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_rename_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.RenameDataPolicyRequest( + name="name_value", + new_data_policy_id="new_data_policy_id_value", + ) + + # Make the request + response = await client.rename_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py new file mode 100644 index 000000000000..076e44ed782d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RenameDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_rename_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1.RenameDataPolicyRequest( + name="name_value", + new_data_policy_id="new_data_policy_id_value", + ) + + # Make the request + response = client.rename_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py new file mode 100644 index 000000000000..432013f9b7ba --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py new file mode 100644 index 000000000000..5c8e19df921c --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py new file mode 100644 index 000000000000..fb2ec8a593bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py new file mode 100644 index 000000000000..55228548e624 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py new file mode 100644 index 000000000000..9699aef81753 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py new file mode 100644 index 000000000000..25671a027b8d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1 + + +def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" + + request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json new file mode 100644 index 000000000000..8f3adb520dfb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json @@ -0,0 +1,1458 @@ +{ + "clientLibrary": { + "apis": [ + { + "id": "google.cloud.bigquery.datapolicies.v1", + "version": "v1" + } + ], + "language": "PYTHON", + "name": "google-cloud-bigquery-datapolicies", + "version": "0.1.0" + }, + "snippets": [ + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 50, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 51, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 50, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 51, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.rename_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.RenameDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RenameDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "new_data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "rename_data_policy" + }, + "description": "Sample for RenameDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.rename_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.RenameDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RenameDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "new_data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "rename_data_policy" + }, + "description": "Sample for RenameDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py" + } + ] +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py new file mode 100644 index 000000000000..4d2cb9622b50 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py @@ -0,0 +1,184 @@ +#! /usr/bin/env python3 +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import argparse +import os +import libcst as cst +import pathlib +import sys +from typing import (Any, Callable, Dict, List, Sequence, Tuple) + + +def partition( + predicate: Callable[[Any], bool], + iterator: Sequence[Any] +) -> Tuple[List[Any], List[Any]]: + """A stable, out-of-place partition.""" + results = ([], []) + + for i in iterator: + results[int(predicate(i))].append(i) + + # Returns trueList, falseList + return results[1], results[0] + + +class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): + CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') + METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { + 'create_data_policy': ('parent', 'data_policy', ), + 'delete_data_policy': ('name', ), + 'get_data_policy': ('name', ), + 'get_iam_policy': ('resource', 'options', ), + 'list_data_policies': ('parent', 'page_size', 'page_token', 'filter', ), + 'rename_data_policy': ('name', 'new_data_policy_id', ), + 'set_iam_policy': ('resource', 'policy', 'update_mask', ), + 'test_iam_permissions': ('resource', 'permissions', ), + 'update_data_policy': ('data_policy', 'update_mask', ), + } + + def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: + try: + key = original.func.attr.value + kword_params = self.METHOD_TO_PARAMS[key] + except (AttributeError, KeyError): + # Either not a method from the API or too convoluted to be sure. + return updated + + # If the existing code is valid, keyword args come after positional args. + # Therefore, all positional args must map to the first parameters. + args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) + if any(k.keyword.value == "request" for k in kwargs): + # We've already fixed this file, don't fix it again. + return updated + + kwargs, ctrl_kwargs = partition( + lambda a: a.keyword.value not in self.CTRL_PARAMS, + kwargs + ) + + args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] + ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) + for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) + + request_arg = cst.Arg( + value=cst.Dict([ + cst.DictElement( + cst.SimpleString("'{}'".format(name)), +cst.Element(value=arg.value) + ) + # Note: the args + kwargs looks silly, but keep in mind that + # the control parameters had to be stripped out, and that + # those could have been passed positionally or by keyword. + for name, arg in zip(kword_params, args + kwargs)]), + keyword=cst.Name("request") + ) + + return updated.with_changes( + args=[request_arg] + ctrl_kwargs + ) + + +def fix_files( + in_dir: pathlib.Path, + out_dir: pathlib.Path, + *, + transformer=bigquery_datapoliciesCallTransformer(), +): + """Duplicate the input dir to the output dir, fixing file method calls. + + Preconditions: + * in_dir is a real directory + * out_dir is a real, empty directory + """ + pyfile_gen = ( + pathlib.Path(os.path.join(root, f)) + for root, _, files in os.walk(in_dir) + for f in files if os.path.splitext(f)[1] == ".py" + ) + + for fpath in pyfile_gen: + with open(fpath, 'r') as f: + src = f.read() + + # Parse the code and insert method call fixes. + tree = cst.parse_module(src) + updated = tree.visit(transformer) + + # Create the path and directory structure for the new file. + updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) + updated_path.parent.mkdir(parents=True, exist_ok=True) + + # Generate the updated source file at the corresponding path. + with open(updated_path, 'w') as f: + f.write(updated.code) + + +if __name__ == '__main__': + parser = argparse.ArgumentParser( + description="""Fix up source that uses the bigquery_datapolicies client library. + +The existing sources are NOT overwritten but are copied to output_dir with changes made. + +Note: This tool operates at a best-effort level at converting positional + parameters in client method calls to keyword based parameters. + Cases where it WILL FAIL include + A) * or ** expansion in a method call. + B) Calls via function or method alias (includes free function calls) + C) Indirect or dispatched calls (e.g. the method is looked up dynamically) + + These all constitute false negatives. The tool will also detect false + positives when an API method shares a name with another method. +""") + parser.add_argument( + '-d', + '--input-directory', + required=True, + dest='input_dir', + help='the input directory to walk for python files to fix up', + ) + parser.add_argument( + '-o', + '--output-directory', + required=True, + dest='output_dir', + help='the directory to output files fixed via un-flattening', + ) + args = parser.parse_args() + input_dir = pathlib.Path(args.input_dir) + output_dir = pathlib.Path(args.output_dir) + if not input_dir.is_dir(): + print( + f"input directory '{input_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if not output_dir.is_dir(): + print( + f"output directory '{output_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if os.listdir(output_dir): + print( + f"output directory '{output_dir}' is not empty", + file=sys.stderr, + ) + sys.exit(-1) + + fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py new file mode 100644 index 000000000000..40366686e783 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py @@ -0,0 +1,99 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import io +import os +import re + +import setuptools # type: ignore + +package_root = os.path.abspath(os.path.dirname(__file__)) + +name = 'google-cloud-bigquery-datapolicies' + + +description = "Google Cloud Bigquery Datapolicies API client library" + +version = None + +with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: + version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) + assert (len(version_candidates) == 1) + version = version_candidates[0] + +if version[0] == "0": + release_status = "Development Status :: 4 - Beta" +else: + release_status = "Development Status :: 5 - Production/Stable" + +dependencies = [ + "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", + # Exclude incompatible versions of `google-auth` + # See https://github.com/googleapis/google-cloud-python/issues/12364 + "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", + "proto-plus >= 1.22.3, <2.0.0", + "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", + "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", + "grpc-google-iam-v1 >= 0.14.0, <1.0.0", +] +extras = { +} +url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" + +package_root = os.path.abspath(os.path.dirname(__file__)) + +readme_filename = os.path.join(package_root, "README.rst") +with io.open(readme_filename, encoding="utf-8") as readme_file: + readme = readme_file.read() + +packages = [ + package + for package in setuptools.find_namespace_packages() + if package.startswith("google") +] + +setuptools.setup( + name=name, + version=version, + description=description, + long_description=readme, + author="Google LLC", + author_email="googleapis-packages@google.com", + license="Apache 2.0", + url=url, + classifiers=[ + release_status, + "Intended Audience :: Developers", + "License :: OSI Approved :: Apache Software License", + "Programming Language :: Python", + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.7", + "Programming Language :: Python :: 3.8", + "Programming Language :: Python :: 3.9", + "Programming Language :: Python :: 3.10", + "Programming Language :: Python :: 3.11", + "Programming Language :: Python :: 3.12", + "Programming Language :: Python :: 3.13", + "Operating System :: OS Independent", + "Topic :: Internet", + ], + platforms="Posix; MacOS X; Windows", + packages=packages, + python_requires=">=3.7", + install_requires=dependencies, + extras_require=extras, + include_package_data=True, + zip_safe=False, +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt new file mode 100644 index 000000000000..2010e549cceb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt @@ -0,0 +1,12 @@ +# We use the constraints file for the latest Python version +# (currently this file) to check that the latest +# major versions of dependencies are supported in setup.py. +# List all library dependencies and extras in this file. +# Require the latest major version be installed for each dependency. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo>=1 +google-api-core>=2 +google-auth>=2 +proto-plus>=1 +protobuf>=6 +grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt new file mode 100644 index 000000000000..56affbd9bd75 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt @@ -0,0 +1,11 @@ +# This constraints file is used to check that lower bounds +# are correct in setup.py +# List all library dependencies and extras in this file. +# Pin the version to the lower bound. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo==1.14.0 +google-api-core==1.34.1 +google-auth==2.14.1 +proto-plus==1.22.3 +protobuf==3.20.2 +grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py new file mode 100644 index 000000000000..b39b50d578a9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py @@ -0,0 +1,7526 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +# try/except added for compatibility with python < 3.8 +try: + from unittest import mock + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER + import mock + +import grpc +from grpc.experimental import aio +from collections.abc import Iterable, AsyncIterable +from google.protobuf import json_format +import json +import math +import pytest +from google.api_core import api_core_version +from proto.marshal.rules.dates import DurationRule, TimestampRule +from proto.marshal.rules import wrappers +from requests import Response +from requests import Request, PreparedRequest +from requests.sessions import Session +from google.protobuf import json_format + +try: + from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True +except ImportError: # pragma: NO COVER + HAS_GOOGLE_AUTH_AIO = False + +from google.api_core import client_options +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers +from google.api_core import grpc_helpers_async +from google.api_core import path_template +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials +from google.auth.exceptions import MutualTLSChannelError +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import DataPolicyServiceAsyncClient +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import transports +from google.cloud.bigquery_datapolicies_v1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import options_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account +from google.protobuf import field_mask_pb2 # type: ignore +from google.type import expr_pb2 # type: ignore +import google.auth + + + +CRED_INFO_JSON = { + "credential_source": "/path/to/file", + "credential_type": "service account credentials", + "principal": "service-account@example.com", +} +CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) + + +async def mock_async_gen(data, chunk_size=1): + for i in range(0, len(data)): # pragma: NO COVER + chunk = data[i : i + chunk_size] + yield chunk.encode("utf-8") + +def client_cert_source_callback(): + return b"cert bytes", b"key bytes" + +# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. +# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. +def async_anonymous_credentials(): + if HAS_GOOGLE_AUTH_AIO: + return ga_credentials_async.AnonymousCredentials() + return ga_credentials.AnonymousCredentials() + +# If default endpoint is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint(client): + return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + +# If default endpoint template is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint template so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint_template(client): + return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + + +def test__get_default_mtls_endpoint(): + api_endpoint = "example.googleapis.com" + api_mtls_endpoint = "example.mtls.googleapis.com" + sandbox_endpoint = "example.sandbox.googleapis.com" + sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" + non_googleapi = "api.example.com" + + assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + +def test__read_environment_variables(): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + +def test__get_client_cert_source(): + mock_provided_cert_source = mock.Mock() + mock_default_cert_source = mock.Mock() + + assert DataPolicyServiceClient._get_client_cert_source(None, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): + assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source + +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test__get_api_endpoint(): + api_override = "foo.com" + mock_client_cert_source = mock.Mock() + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") + assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + + +def test__get_universe_domain(): + client_universe_domain = "foo.com" + universe_domain_env = "bar.com" + + assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain + assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env + assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._get_universe_domain("", None) + assert str(excinfo.value) == "Universe Domain cannot be an empty string." + +@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False) +]) +def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): + cred = mock.Mock(["get_cred_info"]) + cred.get_cred_info = mock.Mock(return_value=cred_info_json) + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=["foo"]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + if show_cred_info: + assert error.details == ["foo", CRED_INFO_STRING] + else: + assert error.details == ["foo"] + +@pytest.mark.parametrize("error_code", [401,403,404,500]) +def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): + cred = mock.Mock([]) + assert not hasattr(cred, "get_cred_info") + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=[]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + assert error.details == [] + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + factory.return_value = creds + info = {"valid": True} + client = client_class.from_service_account_info(info, transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +@pytest.mark.parametrize("transport_class,transport_name", [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=True) + use_jwt.assert_called_once_with(True) + + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=False) + use_jwt.assert_not_called() + + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_file(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + factory.return_value = creds + client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +def test_data_policy_service_client_get_transport_class(): + transport = DataPolicyServiceClient.get_transport_class() + available_transports = [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceRestTransport, + ] + assert transport in available_transports + + transport = DataPolicyServiceClient.get_transport_class("grpc") + assert transport == transports.DataPolicyServiceGrpcTransport + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): + # Check that if channel is provided we won't create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ) + client = client_class(transport=transport) + gtc.assert_not_called() + + # Check that if channel is provided via str we will create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + client = client_class(transport=transport_name) + gtc.assert_called() + + # Check the case api_endpoint is provided. + options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name, client_options=options) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client.DEFAULT_MTLS_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + # Check the case quota_project_id is provided + options = client_options.ClientOptions(quota_project_id="octopus") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id="octopus", + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + # Check the case api_endpoint is provided + options = client_options.ClientOptions(api_audience="https://language.googleapis.com") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience="https://language.googleapis.com" + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) +def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): + # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default + # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. + + # Check the case client_cert_source is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + + if use_client_cert_env == "false": + expected_client_cert_source = None + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + else: + expected_client_cert_source = client_cert_source_callback + expected_host = client.DEFAULT_MTLS_ENDPOINT + + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case ADC client cert is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + if use_client_cert_env == "false": + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_client_cert_source = None + else: + expected_host = client.DEFAULT_MTLS_ENDPOINT + expected_client_cert_source = client_cert_source_callback + + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case client_cert_source and ADC client cert are not provided. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): + mock_client_cert_source = mock.Mock() + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source == mock_client_cert_source + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + mock_client_cert_source = mock.Mock() + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source == mock_client_cert_source + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_api_endpoint(client_class): + mock_client_cert_source = client_cert_source_callback + api_override = "foo.com" + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", + # use ClientOptions.api_endpoint as the api endpoint regardless. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == api_override + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", + # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + + # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), + # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, + # and ClientOptions.universe_domain="bar.com", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. + options = client_options.ClientOptions() + universe_exists = hasattr(options, "universe_domain") + if universe_exists: + options = client_options.ClientOptions(universe_domain=mock_universe) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + else: + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) + assert client.universe_domain == (mock_universe if universe_exists else default_universe) + + # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + options = client_options.ClientOptions() + if hasattr(options, "universe_domain"): + delattr(options, "universe_domain") + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): + # Check the case scopes are provided. + options = client_options.ClientOptions( + scopes=["1", "2"], + ) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=["1", "2"], + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), +]) +def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +def test_data_policy_service_client_client_options_from_dict(): + with mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + grpc_transport.return_value = None + client = DataPolicyServiceClient( + client_options={'api_endpoint': 'squid.clam.whelk'} + ) + grpc_transport.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), +]) +def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=None, + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_create_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.CreateDataPolicyRequest( + parent='parent_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.create_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.CreateDataPolicyRequest( + parent='parent_value', + ) + +def test_create_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + + request = {} + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_create_data_policy_async_from_dict(): + await test_create_data_policy_async(request_type=dict) + +def test_create_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_create_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_create_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + + +def test_create_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_update_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.UpdateDataPolicyRequest( + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.update_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.UpdateDataPolicyRequest( + ) + +def test_update_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + + request = {} + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_update_data_policy_async_from_dict(): + await test_update_data_policy_async(request_type=dict) + +def test_update_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_update_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +def test_update_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.update_data_policy( + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + + +def test_update_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.update_data_policy( + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RenameDataPolicyRequest, + dict, +]) +def test_rename_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.RenameDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_rename_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.RenameDataPolicyRequest( + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.rename_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.RenameDataPolicyRequest( + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + +def test_rename_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.rename_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.rename_data_policy] = mock_rpc + request = {} + client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.rename_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_rename_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.rename_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.rename_data_policy] = mock_rpc + + request = {} + await client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.rename_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_rename_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RenameDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.RenameDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_rename_data_policy_async_from_dict(): + await test_rename_data_policy_async(request_type=dict) + +def test_rename_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RenameDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_rename_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RenameDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_rename_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.rename_data_policy( + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + arg = args[0].new_data_policy_id + mock_val = 'new_data_policy_id_value' + assert arg == mock_val + + +def test_rename_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.rename_data_policy( + datapolicy.RenameDataPolicyRequest(), + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + +@pytest.mark.asyncio +async def test_rename_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.rename_data_policy( + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + arg = args[0].new_data_policy_id + mock_val = 'new_data_policy_id_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_rename_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.rename_data_policy( + datapolicy.RenameDataPolicyRequest(), + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + response = client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.delete_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + +def test_delete_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + + request = {} + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + response = await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.asyncio +async def test_delete_data_policy_async_from_dict(): + await test_delete_data_policy_async(request_type=dict) + +def test_delete_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_delete_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_delete_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_delete_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_get_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.GetDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.GetDataPolicyRequest( + name='name_value', + ) + +def test_get_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + + request = {} + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_get_data_policy_async_from_dict(): + await test_get_data_policy_async(request_type=dict) + +def test_get_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_get_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_get_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + response = client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +def test_list_data_policies_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + filter='filter_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.list_data_policies(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + filter='filter_value', + ) + +def test_list_data_policies_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + + request = {} + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + response = await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesAsyncPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.asyncio +async def test_list_data_policies_async_from_dict(): + await test_list_data_policies_async(request_type=dict) + +def test_list_data_policies_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_list_data_policies_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_list_data_policies_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + + +def test_list_data_policies_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_pager(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + + expected_metadata = () + retry = retries.Retry() + timeout = 5 + expected_metadata = tuple(expected_metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ('parent', ''), + )), + ) + pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) + + assert pager._metadata == expected_metadata + assert pager._retry == retry + assert pager._timeout == timeout + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) +def test_list_data_policies_pages(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = list(client.list_data_policies(request={}).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.asyncio +async def test_list_data_policies_async_pager(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + async_pager = await client.list_data_policies(request={},) + assert async_pager.next_page_token == 'abc' + responses = [] + async for response in async_pager: # pragma: no branch + responses.append(response) + + assert len(responses) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in responses) + + +@pytest.mark.asyncio +async def test_list_data_policies_async_pages(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = [] + # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` + # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 + async for page_ in ( # pragma: no branch + await client.list_data_policies(request={}) + ).pages: + pages.append(page_) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_get_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + +def test_get_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + + request = {} + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_get_iam_policy_async_from_dict(): + await test_get_iam_policy_async(request_type=dict) + +def test_get_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_get_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.get_iam_policy(request={ + 'resource': 'resource_value', + 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_set_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.set_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + +def test_set_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + + request = {} + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_set_iam_policy_async_from_dict(): + await test_set_iam_policy_async(request_type=dict) + +def test_set_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_set_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_set_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.set_iam_policy(request={ + 'resource': 'resource_value', + 'policy': policy_pb2.Policy(version=774), + 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + response = client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.test_iam_permissions(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + +def test_test_iam_permissions_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + + request = {} + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + response = await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_from_dict(): + await test_test_iam_permissions_async(request_type=dict) + +def test_test_iam_permissions_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_test_iam_permissions_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + response = client.test_iam_permissions(request={ + 'resource': 'resource_value', + 'permissions': ['permissions_value'], + } + ) + call.assert_called() + + +def test_create_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.create_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_create_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.create_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("parent", "dataPolicy", ))) + + +def test_create_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.create_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + +def test_update_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "patch", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.update_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_update_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.update_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask", )) & set(("dataPolicy", ))) + + +def test_update_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + + # get truthy value for each flattened field + mock_args = dict( + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.update_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +def test_rename_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.rename_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.rename_data_policy] = mock_rpc + + request = {} + client.rename_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.rename_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_rename_data_policy_rest_required_fields(request_type=datapolicy.RenameDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request_init["new_data_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).rename_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + jsonified_request["newDataPolicyId"] = 'new_data_policy_id_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).rename_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + assert "newDataPolicyId" in jsonified_request + assert jsonified_request["newDataPolicyId"] == 'new_data_policy_id_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.rename_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_rename_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.rename_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", "newDataPolicyId", ))) + + +def test_rename_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.rename_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}:rename" % client.transport._host, args[1]) + + +def test_rename_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.rename_data_policy( + datapolicy.RenameDataPolicyRequest(), + name='name_value', + new_data_policy_id='new_data_policy_id_value', + ) + + +def test_delete_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = None + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "delete", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.delete_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_delete_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.delete_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_delete_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.delete_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +def test_get_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_get_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.get_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +def test_list_data_policies_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("filter", "page_size", "page_token", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.list_data_policies(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_list_data_policies_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.list_data_policies._get_unset_required_fields({}) + assert set(unset_fields) == (set(("filter", "pageSize", "pageToken", )) & set(("parent", ))) + + +def test_list_data_policies_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.list_data_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_rest_pager(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + #with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode('UTF-8') + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + pager = client.list_data_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) + + pages = list(client.list_data_policies(request=sample_request).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + + +def test_get_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", ))) + + +def test_set_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.set_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_set_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.set_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) + + +def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request_init["permissions"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + jsonified_request["permissions"] = 'permissions_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + assert "permissions" in jsonified_request + assert jsonified_request["permissions"] == 'permissions_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.test_iam_permissions(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_test_iam_permissions_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = DataPolicyServiceClient(transport=transport) + assert client.transport is transport + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + +@pytest.mark.parametrize("transport_class", [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, +]) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + +def test_transport_kind_grpc(): + transport = DataPolicyServiceClient.get_transport_class("grpc")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "grpc" + + +def test_initialize_client_w_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_rename_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.rename_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RenameDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_grpc_asyncio(): + transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( + credentials=async_anonymous_credentials() + ) + assert transport.kind == "grpc_asyncio" + + +def test_initialize_client_w_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_create_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_update_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_rename_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.rename_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RenameDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_delete_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_list_data_policies_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + await client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_set_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_test_iam_permissions_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + await client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_rest(): + transport = DataPolicyServiceClient.get_transport_class("rest")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "rest" + + +def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.create_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init["data_policy"] = {'policy_tag': 'policy_tag_value', 'data_masking_policy': {'predefined_expression': 3, 'routine': 'routine_value'}, 'name': 'name_value', 'data_policy_type': 3, 'data_policy_id': 'data_policy_id_value'} + # The version of a generated dependency at test runtime may differ from the version used during generation. + # Delete any fields which are not present in the current runtime dependency + # See https://github.com/googleapis/gapic-generator-python/issues/1748 + + # Determine if the message type is proto-plus or protobuf + test_field = datapolicy.CreateDataPolicyRequest.meta.fields["data_policy"] + + def get_message_fields(field): + # Given a field which is a message (composite type), return a list with + # all the fields of the message. + # If the field is not a composite type, return an empty list. + message_fields = [] + + if hasattr(field, "message") and field.message: + is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") + + if is_field_type_proto_plus_type: + message_fields = field.message.meta.fields.values() + # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types + else: # pragma: NO COVER + message_fields = field.message.DESCRIPTOR.fields + return message_fields + + runtime_nested_fields = [ + (field.name, nested_field.name) + for field in get_message_fields(test_field) + for nested_field in get_message_fields(field) + ] + + subfields_not_in_runtime = [] + + # For each item in the sample request, create a list of sub fields which are not present at runtime + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for field, value in request_init["data_policy"].items(): # pragma: NO COVER + result = None + is_repeated = False + # For repeated fields + if isinstance(value, list) and len(value): + is_repeated = True + result = value[0] + # For fields where the type is another message + if isinstance(value, dict): + result = value + + if result and hasattr(result, "keys"): + for subfield in result.keys(): + if (field, subfield) not in runtime_nested_fields: + subfields_not_in_runtime.append( + {"field": field, "subfield": subfield, "is_repeated": is_repeated} + ) + + # Remove fields from the sample request which are not present in the runtime version of the dependency + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + field = subfield_to_delete.get("field") + field_repeated = subfield_to_delete.get("is_repeated") + subfield = subfield_to_delete.get("subfield") + if subfield: + if field_repeated: + for i in range(0, len(request_init["data_policy"][field])): + del request_init["data_policy"][field][i][subfield] + else: + del request_init["data_policy"][field][subfield] + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.create_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.CreateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.update_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request_init["data_policy"] = {'policy_tag': 'policy_tag_value', 'data_masking_policy': {'predefined_expression': 3, 'routine': 'routine_value'}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_type': 3, 'data_policy_id': 'data_policy_id_value'} + # The version of a generated dependency at test runtime may differ from the version used during generation. + # Delete any fields which are not present in the current runtime dependency + # See https://github.com/googleapis/gapic-generator-python/issues/1748 + + # Determine if the message type is proto-plus or protobuf + test_field = datapolicy.UpdateDataPolicyRequest.meta.fields["data_policy"] + + def get_message_fields(field): + # Given a field which is a message (composite type), return a list with + # all the fields of the message. + # If the field is not a composite type, return an empty list. + message_fields = [] + + if hasattr(field, "message") and field.message: + is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") + + if is_field_type_proto_plus_type: + message_fields = field.message.meta.fields.values() + # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types + else: # pragma: NO COVER + message_fields = field.message.DESCRIPTOR.fields + return message_fields + + runtime_nested_fields = [ + (field.name, nested_field.name) + for field in get_message_fields(test_field) + for nested_field in get_message_fields(field) + ] + + subfields_not_in_runtime = [] + + # For each item in the sample request, create a list of sub fields which are not present at runtime + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for field, value in request_init["data_policy"].items(): # pragma: NO COVER + result = None + is_repeated = False + # For repeated fields + if isinstance(value, list) and len(value): + is_repeated = True + result = value[0] + # For fields where the type is another message + if isinstance(value, dict): + result = value + + if result and hasattr(result, "keys"): + for subfield in result.keys(): + if (field, subfield) not in runtime_nested_fields: + subfields_not_in_runtime.append( + {"field": field, "subfield": subfield, "is_repeated": is_repeated} + ) + + # Remove fields from the sample request which are not present in the runtime version of the dependency + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + field = subfield_to_delete.get("field") + field_repeated = subfield_to_delete.get("is_repeated") + subfield = subfield_to_delete.get("subfield") + if subfield: + if field_repeated: + for i in range(0, len(request_init["data_policy"][field])): + del request_init["data_policy"][field][i][subfield] + else: + del request_init["data_policy"][field][subfield] + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.update_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.UpdateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_rename_data_policy_rest_bad_request(request_type=datapolicy.RenameDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.rename_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RenameDataPolicyRequest, + dict, +]) +def test_rename_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.rename_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_rename_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_rename_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_rename_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_rename_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.RenameDataPolicyRequest.pb(datapolicy.RenameDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.RenameDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.rename_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.delete_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = '' + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.delete_data_policy(request) + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: + pre.assert_not_called() + pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + request = datapolicy.DeleteDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + + client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + + +def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.GetDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.list_data_policies(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.list_data_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_data_policies_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) + req.return_value.content = return_value + + request = datapolicy.ListDataPoliciesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.ListDataPoliciesResponse() + post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata + + client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.GetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.GetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.set_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.set_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_set_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.SetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.SetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.test_iam_permissions(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.test_iam_permissions(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_test_iam_permissions_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.TestIamPermissionsRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) + req.return_value.content = return_value + + request = iam_policy_pb2.TestIamPermissionsRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = iam_policy_pb2.TestIamPermissionsResponse() + post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata + + client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + +def test_initialize_client_w_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_rename_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.rename_data_policy), + '__call__') as call: + client.rename_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RenameDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.DataPolicyServiceGrpcTransport, + ) + +def test_data_policy_service_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json" + ) + + +def test_data_policy_service_base_transport(): + # Instantiate the base transport. + with mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + Transport.return_value = None + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + 'create_data_policy', + 'update_data_policy', + 'rename_data_policy', + 'delete_data_policy', + 'get_data_policy', + 'list_data_policies', + 'get_iam_policy', + 'set_iam_policy', + 'test_iam_permissions', + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Catch all for all remaining methods and properties + remainder = [ + 'kind', + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_data_policy_service_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with("credentials.json", + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id="octopus", + ) + + +def test_data_policy_service_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport() + adc.assert_called_once() + + +def test_data_policy_service_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + DataPolicyServiceClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, + ], +) +def test_data_policy_service_transport_auth_gdch_credentials(transport_class): + host = 'https://language.com' + api_audience_tests = [None, 'https://language2.com'] + api_audience_expect = [host, 'https://language2.com'] + for t, e in zip(api_audience_tests, api_audience_expect): + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + gdch_mock = mock.MagicMock() + type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + adc.return_value = (gdch_mock, None) + transport_class(host=host, api_audience=t) + gdch_mock.with_gdch_audience.assert_called_once_with( + e + ) + + +@pytest.mark.parametrize( + "transport_class,grpc_helpers", + [ + (transports.DataPolicyServiceGrpcTransport, grpc_helpers), + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + ], +) +def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + grpc_helpers, "create_channel", autospec=True + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + adc.return_value = (creds, None) + transport_class( + quota_project_id="octopus", + scopes=["1", "2"] + ) + + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=creds, + credentials_file=None, + quota_project_id="octopus", + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=["1", "2"], + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( + transport_class +): + cred = ga_credentials.AnonymousCredentials() + + # Check ssl_channel_credentials is used if provided. + with mock.patch.object(transport_class, "create_channel") as mock_create_channel: + mock_ssl_channel_creds = mock.Mock() + transport_class( + host="squid.clam.whelk", + credentials=cred, + ssl_channel_credentials=mock_ssl_channel_creds + ) + mock_create_channel.assert_called_once_with( + "squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_channel_creds, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls + # is used. + with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): + with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: + transport_class( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + expected_cert, expected_key = client_cert_source_callback() + mock_ssl_cred.assert_called_once_with( + certificate_chain=expected_cert, + private_key=expected_key + ) + +def test_data_policy_service_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: + transports.DataPolicyServiceRestTransport ( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_no_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com' + ) + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_with_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:8000' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com:8000' + ) + +@pytest.mark.parametrize("transport_name", [ + "rest", +]) +def test_data_policy_service_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = DataPolicyServiceClient( + credentials=creds1, + transport=transport_name, + ) + client2 = DataPolicyServiceClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.create_data_policy._session + session2 = client2.transport.create_data_policy._session + assert session1 != session2 + session1 = client1.transport.update_data_policy._session + session2 = client2.transport.update_data_policy._session + assert session1 != session2 + session1 = client1.transport.rename_data_policy._session + session2 = client2.transport.rename_data_policy._session + assert session1 != session2 + session1 = client1.transport.delete_data_policy._session + session2 = client2.transport.delete_data_policy._session + assert session1 != session2 + session1 = client1.transport.get_data_policy._session + session2 = client2.transport.get_data_policy._session + assert session1 != session2 + session1 = client1.transport.list_data_policies._session + session2 = client2.transport.list_data_policies._session + assert session1 != session2 + session1 = client1.transport.get_iam_policy._session + session2 = client2.transport.get_iam_policy._session + assert session1 != session2 + session1 = client1.transport.set_iam_policy._session + session2 = client2.transport.set_iam_policy._session + assert session1 != session2 + session1 = client1.transport.test_iam_permissions._session + session2 = client2.transport.test_iam_permissions._session + assert session1 != session2 +def test_data_policy_service_grpc_transport_channel(): + channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +def test_data_policy_service_grpc_asyncio_transport_channel(): + channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_client_cert_source( + transport_class +): + with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_ssl_cred = mock.Mock() + grpc_ssl_channel_cred.return_value = mock_ssl_cred + + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + + cred = ga_credentials.AnonymousCredentials() + with pytest.warns(DeprecationWarning): + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (cred, None) + transport = transport_class( + host="squid.clam.whelk", + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=client_cert_source_callback, + ) + adc.assert_called_once() + + grpc_ssl_channel_cred.assert_called_once_with( + certificate_chain=b"cert bytes", private_key=b"key bytes" + ) + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + assert transport._ssl_channel_credentials == mock_ssl_cred + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_adc( + transport_class +): + mock_ssl_cred = mock.Mock() + with mock.patch.multiple( + "google.auth.transport.grpc.SslCredentials", + __init__=mock.Mock(return_value=None), + ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), + ): + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + mock_cred = mock.Mock() + + with pytest.warns(DeprecationWarning): + transport = transport_class( + host="squid.clam.whelk", + credentials=mock_cred, + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=None, + ) + + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=mock_cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + + +def test_data_policy_path(): + project = "squid" + location = "clam" + data_policy = "whelk" + expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) + assert expected == actual + + +def test_parse_data_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "data_policy": "nudibranch", + } + path = DataPolicyServiceClient.data_policy_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_data_policy_path(path) + assert expected == actual + +def test_common_billing_account_path(): + billing_account = "cuttlefish" + expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + actual = DataPolicyServiceClient.common_billing_account_path(billing_account) + assert expected == actual + + +def test_parse_common_billing_account_path(): + expected = { + "billing_account": "mussel", + } + path = DataPolicyServiceClient.common_billing_account_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_billing_account_path(path) + assert expected == actual + +def test_common_folder_path(): + folder = "winkle" + expected = "folders/{folder}".format(folder=folder, ) + actual = DataPolicyServiceClient.common_folder_path(folder) + assert expected == actual + + +def test_parse_common_folder_path(): + expected = { + "folder": "nautilus", + } + path = DataPolicyServiceClient.common_folder_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_folder_path(path) + assert expected == actual + +def test_common_organization_path(): + organization = "scallop" + expected = "organizations/{organization}".format(organization=organization, ) + actual = DataPolicyServiceClient.common_organization_path(organization) + assert expected == actual + + +def test_parse_common_organization_path(): + expected = { + "organization": "abalone", + } + path = DataPolicyServiceClient.common_organization_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_organization_path(path) + assert expected == actual + +def test_common_project_path(): + project = "squid" + expected = "projects/{project}".format(project=project, ) + actual = DataPolicyServiceClient.common_project_path(project) + assert expected == actual + + +def test_parse_common_project_path(): + expected = { + "project": "clam", + } + path = DataPolicyServiceClient.common_project_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_project_path(path) + assert expected == actual + +def test_common_location_path(): + project = "whelk" + location = "octopus" + expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + actual = DataPolicyServiceClient.common_location_path(project, location) + assert expected == actual + + +def test_parse_common_location_path(): + expected = { + "project": "oyster", + "location": "nudibranch", + } + path = DataPolicyServiceClient.common_location_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_location_path(path) + assert expected == actual + + +def test_client_with_default_client_info(): + client_info = gapic_v1.client_info.ClientInfo() + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + transport_class = DataPolicyServiceClient.get_transport_class() + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + +def test_transport_close_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +@pytest.mark.asyncio +async def test_transport_close_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + async with client: + close.assert_not_called() + close.assert_called_once() + + +def test_transport_close_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +def test_client_ctx(): + transports = [ + 'rest', + 'grpc', + ] + for transport in transports: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport + ) + # Test client calls underlying transport. + with mock.patch.object(type(client.transport), "close") as close: + close.assert_not_called() + with client: + pass + close.assert_called() + +@pytest.mark.parametrize("client_class,transport_class", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), +]) +def test_api_key_credentials(client_class, transport_class): + with mock.patch.object( + google.auth._default, "get_api_key_credentials", create=True + ) as get_api_key_credentials: + mock_cred = mock.Mock() + get_api_key_credentials.return_value = mock_cred + options = client_options.ClientOptions() + options.api_key = "api_key" + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options) + patched.assert_called_once_with( + credentials=mock_cred, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc new file mode 100644 index 000000000000..0c3effcc3668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc @@ -0,0 +1,13 @@ +[run] +branch = True + +[report] +show_missing = True +omit = + google/cloud/bigquery_datapolicies/__init__.py + google/cloud/bigquery_datapolicies/gapic_version.py +exclude_lines = + # Re-enable the standard pragma + pragma: NO COVER + # Ignore debug-only repr + def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 new file mode 100644 index 000000000000..90316de21489 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 @@ -0,0 +1,34 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +[flake8] +# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): +# Resolve flake8 lint issues +ignore = E203, E231, E266, E501, W503 +exclude = + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): + # Ensure that generated code passes flake8 lint + **/gapic/** + **/services/** + **/types/** + # Exclude Protobuf gencode + *_pb2.py + + # Standard linting exemptions. + **/.nox/** + __pycache__, + .git, + *.pyc, + conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE new file mode 100644 index 000000000000..d64569567334 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in new file mode 100644 index 000000000000..dae249ec8976 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +include README.rst LICENSE +recursive-include google *.py *.pyi *.json *.proto py.typed +recursive-include tests * +global-exclude *.py[co] +global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst new file mode 100644 index 000000000000..074e1245b6d1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst @@ -0,0 +1,143 @@ +Python Client for Google Cloud Bigquery Datapolicies API +================================================= + +Quick Start +----------- + +In order to use this library, you first need to go through the following steps: + +1. `Select or create a Cloud Platform project.`_ +2. `Enable billing for your project.`_ +3. Enable the Google Cloud Bigquery Datapolicies API. +4. `Setup Authentication.`_ + +.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project +.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project +.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html + +Installation +~~~~~~~~~~~~ + +Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to +create isolated Python environments. The basic problem it addresses is one of +dependencies and versions, and indirectly permissions. + +With `virtualenv`_, it's possible to install this library without needing system +install permissions, and without clashing with the installed system +dependencies. + +.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ + + +Mac/Linux +^^^^^^^^^ + +.. code-block:: console + + python3 -m venv + source /bin/activate + /bin/pip install /path/to/library + + +Windows +^^^^^^^ + +.. code-block:: console + + python3 -m venv + \Scripts\activate + \Scripts\pip.exe install \path\to\library + + +Logging +------- + +This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. +Note the following: + +#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. +#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. +#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. + + +Simple, environment-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google +logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged +messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging +event. + +A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. + +- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. +- Invalid logging scopes: :code:`foo`, :code:`123`, etc. + +**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. + + +Examples +^^^^^^^^ + +- Enabling the default handler for all Google-based loggers + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google + +- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 + + +Advanced, code-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +You can also configure a valid logging scope using Python's standard `logging` mechanism. + + +Examples +^^^^^^^^ + +- Configuring a handler for all Google-based loggers + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + +- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google.cloud.library_v1") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + + +Logging details +~~~~~~~~~~~~~~~ + +#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root + logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set + :code:`logging.getLogger("google").propagate = True` in your code. +#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for + one library, but decide you need to also set up environment-based logging configuration for another library. + + #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual + if the code -based configuration gets applied first. + +#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get + executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. + (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css new file mode 100644 index 000000000000..b0a295464b23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css @@ -0,0 +1,20 @@ +div#python2-eol { + border-color: red; + border-width: medium; +} + +/* Ensure minimum width for 'Parameters' / 'Returns' column */ +dl.field-list > dt { + min-width: 100px +} + +/* Insert space between methods for readability */ +dl.method { + padding-top: 10px; + padding-bottom: 10px +} + +/* Insert empty space between classes */ +dl.class { + padding-bottom: 50px +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html new file mode 100644 index 000000000000..95e9c77fcfe1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html @@ -0,0 +1,50 @@ + +{% extends "!layout.html" %} +{%- block content %} +{%- if theme_fixed_sidebar|lower == 'true' %} +
+ {{ sidebar() }} + {%- block document %} +
+ {%- if render_sidebar %} +
+ {%- endif %} + + {%- block relbar_top %} + {%- if theme_show_relbar_top|tobool %} + + {%- endif %} + {% endblock %} + +
+
+ As of January 1, 2020 this library no longer supports Python 2 on the latest released version. + Library versions released prior to that date will continue to be available. For more information please + visit Python 2 support on Google Cloud. +
+ {% block body %} {% endblock %} +
+ + {%- block relbar_bottom %} + {%- if theme_show_relbar_bottom|tobool %} + + {%- endif %} + {% endblock %} + + {%- if render_sidebar %} +
+ {%- endif %} +
+ {%- endblock %} +
+
+{%- else %} +{{ super() }} +{%- endif %} +{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst new file mode 100644 index 000000000000..e4198c590cde --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst @@ -0,0 +1,10 @@ +DataPolicyService +----------------------------------- + +.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service + :members: + :inherited-members: + +.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers + :members: + :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst new file mode 100644 index 000000000000..38e5512e1111 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst @@ -0,0 +1,6 @@ +Services for Google Cloud Bigquery Datapolicies v1beta1 API +=========================================================== +.. toctree:: + :maxdepth: 2 + + data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst new file mode 100644 index 000000000000..2322c0ee11d4 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst @@ -0,0 +1,6 @@ +Types for Google Cloud Bigquery Datapolicies v1beta1 API +======================================================== + +.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.types + :members: + :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py new file mode 100644 index 000000000000..babd226a574e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py @@ -0,0 +1,385 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# +# google-cloud-bigquery-datapolicies documentation build configuration file +# +# This file is execfile()d with the current directory set to its +# containing dir. +# +# Note that not all possible configuration values are present in this +# autogenerated file. +# +# All configuration values have a default; values that are commented out +# serve to show the default. + +import sys +import os +import shlex + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +sys.path.insert(0, os.path.abspath("..")) + +# For plugins that can not read conf.py. +# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 +sys.path.insert(0, os.path.abspath(".")) + +__version__ = "" + +# -- General configuration ------------------------------------------------ + +# If your documentation needs a minimal Sphinx version, state it here. +needs_sphinx = "4.5.0" + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [ + "sphinx.ext.autodoc", + "sphinx.ext.autosummary", + "sphinx.ext.intersphinx", + "sphinx.ext.coverage", + "sphinx.ext.doctest", + "sphinx.ext.napoleon", + "sphinx.ext.todo", + "sphinx.ext.viewcode", + "recommonmark", +] + +# autodoc/autosummary flags +autoclass_content = "both" +autodoc_default_options = {"members": True} +autosummary_generate = True + + +# Add any paths that contain templates here, relative to this directory. +templates_path = ["_templates"] + +# The suffix(es) of source filenames. +# You can specify multiple suffix as a list of string: +# source_suffix = ['.rst', '.md'] +source_suffix = [".rst", ".md"] + +# The encoding of source files. +# source_encoding = 'utf-8-sig' + +# The root toctree document. +root_doc = "index" + +# General information about the project. +project = u"google-cloud-bigquery-datapolicies" +copyright = u"2025, Google, LLC" +author = u"Google APIs" + +# The version info for the project you're documenting, acts as replacement for +# |version| and |release|, also used in various other places throughout the +# built documents. +# +# The full version, including alpha/beta/rc tags. +release = __version__ +# The short X.Y version. +version = ".".join(release.split(".")[0:2]) + +# The language for content autogenerated by Sphinx. Refer to documentation +# for a list of supported languages. +# +# This is also used if you do content translation via gettext catalogs. +# Usually you set "language" from the command line for these cases. +language = None + +# There are two options for replacing |today|: either, you set today to some +# non-false value, then it is used: +# today = '' +# Else, today_fmt is used as the format for a strftime call. +# today_fmt = '%B %d, %Y' + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +exclude_patterns = [ + "_build", + "**/.nox/**/*", + "samples/AUTHORING_GUIDE.md", + "samples/CONTRIBUTING.md", + "samples/snippets/README.rst", +] + +# The reST default role (used for this markup: `text`) to use for all +# documents. +# default_role = None + +# If true, '()' will be appended to :func: etc. cross-reference text. +# add_function_parentheses = True + +# If true, the current module name will be prepended to all description +# unit titles (such as .. function::). +# add_module_names = True + +# If true, sectionauthor and moduleauthor directives will be shown in the +# output. They are ignored by default. +# show_authors = False + +# The name of the Pygments (syntax highlighting) style to use. +pygments_style = "sphinx" + +# A list of ignored prefixes for module index sorting. +# modindex_common_prefix = [] + +# If true, keep warnings as "system message" paragraphs in the built documents. +# keep_warnings = False + +# If true, `todo` and `todoList` produce output, else they produce nothing. +todo_include_todos = True + + +# -- Options for HTML output ---------------------------------------------- + +# The theme to use for HTML and HTML Help pages. See the documentation for +# a list of builtin themes. +html_theme = "alabaster" + +# Theme options are theme-specific and customize the look and feel of a theme +# further. For a list of options available for each theme, see the +# documentation. +html_theme_options = { + "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", + "github_user": "googleapis", + "github_repo": "google-cloud-python", + "github_banner": True, + "font_family": "'Roboto', Georgia, sans", + "head_font_family": "'Roboto', Georgia, serif", + "code_font_family": "'Roboto Mono', 'Consolas', monospace", +} + +# Add any paths that contain custom themes here, relative to this directory. +# html_theme_path = [] + +# The name for this set of Sphinx documents. If None, it defaults to +# " v documentation". +# html_title = None + +# A shorter title for the navigation bar. Default is the same as html_title. +# html_short_title = None + +# The name of an image file (relative to this directory) to place at the top +# of the sidebar. +# html_logo = None + +# The name of an image file (within the static path) to use as favicon of the +# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 +# pixels large. +# html_favicon = None + +# Add any paths that contain custom static files (such as style sheets) here, +# relative to this directory. They are copied after the builtin static files, +# so a file named "default.css" will overwrite the builtin "default.css". +html_static_path = ["_static"] + +# Add any extra paths that contain custom files (such as robots.txt or +# .htaccess) here, relative to this directory. These files are copied +# directly to the root of the documentation. +# html_extra_path = [] + +# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, +# using the given strftime format. +# html_last_updated_fmt = '%b %d, %Y' + +# If true, SmartyPants will be used to convert quotes and dashes to +# typographically correct entities. +# html_use_smartypants = True + +# Custom sidebar templates, maps document names to template names. +# html_sidebars = {} + +# Additional templates that should be rendered to pages, maps page names to +# template names. +# html_additional_pages = {} + +# If false, no module index is generated. +# html_domain_indices = True + +# If false, no index is generated. +# html_use_index = True + +# If true, the index is split into individual pages for each letter. +# html_split_index = False + +# If true, links to the reST sources are added to the pages. +# html_show_sourcelink = True + +# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. +# html_show_sphinx = True + +# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. +# html_show_copyright = True + +# If true, an OpenSearch description file will be output, and all pages will +# contain a tag referring to it. The value of this option must be the +# base URL from which the finished HTML is served. +# html_use_opensearch = '' + +# This is the file name suffix for HTML files (e.g. ".xhtml"). +# html_file_suffix = None + +# Language to be used for generating the HTML full-text search index. +# Sphinx supports the following languages: +# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' +# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' +# html_search_language = 'en' + +# A dictionary with options for the search language support, empty by default. +# Now only 'ja' uses this config value +# html_search_options = {'type': 'default'} + +# The name of a javascript file (relative to the configuration directory) that +# implements a search results scorer. If empty, the default will be used. +# html_search_scorer = 'scorer.js' + +# Output file base name for HTML help builder. +htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" + +# -- Options for warnings ------------------------------------------------------ + + +suppress_warnings = [ + # Temporarily suppress this to avoid "more than one target found for + # cross-reference" warning, which are intractable for us to avoid while in + # a mono-repo. + # See https://github.com/sphinx-doc/sphinx/blob + # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 + "ref.python" +] + +# -- Options for LaTeX output --------------------------------------------- + +latex_elements = { + # The paper size ('letterpaper' or 'a4paper'). + # 'papersize': 'letterpaper', + # The font size ('10pt', '11pt' or '12pt'). + # 'pointsize': '10pt', + # Additional stuff for the LaTeX preamble. + # 'preamble': '', + # Latex figure (float) alignment + # 'figure_align': 'htbp', +} + +# Grouping the document tree into LaTeX files. List of tuples +# (source start file, target name, title, +# author, documentclass [howto, manual, or own class]). +latex_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies.tex", + u"google-cloud-bigquery-datapolicies Documentation", + author, + "manual", + ) +] + +# The name of an image file (relative to this directory) to place at the top of +# the title page. +# latex_logo = None + +# For "manual" documents, if this is true, then toplevel headings are parts, +# not chapters. +# latex_use_parts = False + +# If true, show page references after internal links. +# latex_show_pagerefs = False + +# If true, show URL addresses after external links. +# latex_show_urls = False + +# Documents to append as an appendix to all manuals. +# latex_appendices = [] + +# If false, no module index is generated. +# latex_domain_indices = True + + +# -- Options for manual page output --------------------------------------- + +# One entry per manual page. List of tuples +# (source start file, name, description, authors, manual section). +man_pages = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + [author], + 1, + ) +] + +# If true, show URL addresses after external links. +# man_show_urls = False + + +# -- Options for Texinfo output ------------------------------------------- + +# Grouping the document tree into Texinfo files. List of tuples +# (source start file, target name, title, author, +# dir menu entry, description, category) +texinfo_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + author, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Library", + "APIs", + ) +] + +# Documents to append as an appendix to all manuals. +# texinfo_appendices = [] + +# If false, no module index is generated. +# texinfo_domain_indices = True + +# How to display URL addresses: 'footnote', 'no', or 'inline'. +# texinfo_show_urls = 'footnote' + +# If true, do not generate a @detailmenu in the "Top" node's menu. +# texinfo_no_detailmenu = False + + +# Example configuration for intersphinx: refer to the Python standard library. +intersphinx_mapping = { + "python": ("https://python.readthedocs.org/en/latest/", None), + "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), + "google.api_core": ( + "https://googleapis.dev/python/google-api-core/latest/", + None, + ), + "grpc": ("https://grpc.github.io/grpc/python/", None), + "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), + "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), +} + + +# Napoleon settings +napoleon_google_docstring = True +napoleon_numpy_docstring = True +napoleon_include_private_with_doc = False +napoleon_include_special_with_doc = True +napoleon_use_admonition_for_examples = False +napoleon_use_admonition_for_notes = False +napoleon_use_admonition_for_references = False +napoleon_use_ivar = False +napoleon_use_param = True +napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst new file mode 100644 index 000000000000..30c4f11b89cf --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst @@ -0,0 +1,10 @@ +.. include:: multiprocessing.rst + + +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v1beta1/services_ + bigquery_datapolicies_v1beta1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst new file mode 100644 index 000000000000..536d17b2ea65 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst @@ -0,0 +1,7 @@ +.. note:: + + Because this client uses :mod:`grpc` library, it is safe to + share instances across threads. In multiprocessing scenarios, the best + practice is to create client instances *after* the invocation of + :func:`os.fork` by :class:`multiprocessing.pool.Pool` or + :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py new file mode 100644 index 000000000000..705e708d1ff2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py @@ -0,0 +1,43 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies import gapic_version as package_version + +__version__ = package_version.__version__ + + +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.client import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient + +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import CreateDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DataMaskingPolicy +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DataPolicy +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DeleteDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import GetDataPolicyRequest +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import ListDataPoliciesRequest +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import ListDataPoliciesResponse +from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import UpdateDataPolicyRequest + +__all__ = ('DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py new file mode 100644 index 000000000000..611003d729c9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py @@ -0,0 +1,44 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import DataPolicyServiceClient +from .services.data_policy_service import DataPolicyServiceAsyncClient + +from .types.datapolicy import CreateDataPolicyRequest +from .types.datapolicy import DataMaskingPolicy +from .types.datapolicy import DataPolicy +from .types.datapolicy import DeleteDataPolicyRequest +from .types.datapolicy import GetDataPolicyRequest +from .types.datapolicy import ListDataPoliciesRequest +from .types.datapolicy import ListDataPoliciesResponse +from .types.datapolicy import UpdateDataPolicyRequest + +__all__ = ( + 'DataPolicyServiceAsyncClient', +'CreateDataPolicyRequest', +'DataMaskingPolicy', +'DataPolicy', +'DataPolicyServiceClient', +'DeleteDataPolicyRequest', +'GetDataPolicyRequest', +'ListDataPoliciesRequest', +'ListDataPoliciesResponse', +'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json new file mode 100644 index 000000000000..229de39247fe --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json @@ -0,0 +1,103 @@ + { + "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", + "language": "python", + "libraryPackage": "google.cloud.bigquery_datapolicies_v1beta1", + "protoPackage": "google.cloud.bigquery.datapolicies.v1beta1", + "schema": "1.0", + "services": { + "DataPolicyService": { + "clients": { + "grpc": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "grpc-async": { + "libraryClient": "DataPolicyServiceAsyncClient", + "rpcs": { + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + } + } + } + } +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py new file mode 100644 index 000000000000..cbf94b283c70 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py @@ -0,0 +1,15 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py new file mode 100644 index 000000000000..deca793e77bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py @@ -0,0 +1,22 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .client import DataPolicyServiceClient +from .async_client import DataPolicyServiceAsyncClient + +__all__ = ( + 'DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py new file mode 100644 index 000000000000..f2f6d40070dd --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py @@ -0,0 +1,1162 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging as std_logging +from collections import OrderedDict +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union + +from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version + +from google.api_core.client_options import ClientOptions +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + + +try: + OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .client import DataPolicyServiceClient + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +class DataPolicyServiceAsyncClient: + """Data Policy Service provides APIs for managing the + label-policy bindings. + """ + + _client: DataPolicyServiceClient + + # Copy defaults from the synchronous client for use here. + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT + DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE + _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE + + data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) + parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) + parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) + parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) + common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) + parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) + parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) + parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore + + from_service_account_json = from_service_account_file + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client instance. + """ + return self._client.transport + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._client._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used + by the client instance. + """ + return self._client._universe_domain + + get_transport_class = DataPolicyServiceClient.get_transport_class + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service async client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport to use. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client = DataPolicyServiceClient( + credentials=credentials, + transport=transport, + client_options=client_options, + client_info=client_info, + + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v1beta1.DataPolicyServiceAsyncClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._client._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "credentialsType": None, + } + ) + + async def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest, dict]]): + The request object. Request message for the + CreateDataPolicy method. + parent (:class:`str`): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (:class:`google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy`): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest, dict]]): + The request object. Response message for the + UpdateDataPolicy method. + data_policy (:class:`google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy`): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest, dict]]): + The request object. Request message for the + DeleteDataPolicy method. + name (:class:`str`): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + async def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest, dict]]): + The request object. Request message for the GetDataPolicy + method. + name (:class:`str`): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest, dict]]): + The request object. Request message for the + ListDataPolicies method. + parent (:class:`str`): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__aiter__` convenience method. + response = pagers.ListDataPoliciesAsyncPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def __aenter__(self) -> "DataPolicyServiceAsyncClient": + return self + + async def __aexit__(self, exc_type, exc, tb): + await self.transport.close() + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +__all__ = ( + "DataPolicyServiceAsyncClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py new file mode 100644 index 000000000000..c30a37b9f313 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py @@ -0,0 +1,1519 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from http import HTTPStatus +import json +import logging as std_logging +import os +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +import warnings + +from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version + +from google.api_core import client_options as client_options_lib +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc import DataPolicyServiceGrpcTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport + + +class DataPolicyServiceClientMeta(type): + """Metaclass for the DataPolicyService client. + + This provides class-level methods for building and retrieving + support objects (e.g. transport) without polluting the client instance + objects. + """ + _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + _transport_registry["grpc"] = DataPolicyServiceGrpcTransport + _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport + + def get_transport_class(cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: + """Returns an appropriate transport class. + + Args: + label: The name of the desired transport. If none is + provided, then the first transport in the registry is used. + + Returns: + The transport class to use. + """ + # If a specific transport is requested, return that one. + if label: + return cls._transport_registry[label] + + # No transport is requested; return the default (that is, the first one + # in the dictionary). + return next(iter(cls._transport_registry.values())) + + +class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): + """Data Policy Service provides APIs for managing the + label-policy bindings. + """ + + @staticmethod + def _get_default_mtls_endpoint(api_endpoint): + """Converts api endpoint to mTLS endpoint. + + Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to + "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. + Args: + api_endpoint (Optional[str]): the api endpoint to convert. + Returns: + str: converted mTLS api endpoint. + """ + if not api_endpoint: + return api_endpoint + + mtls_endpoint_re = re.compile( + r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" + ) + + m = mtls_endpoint_re.match(api_endpoint) + name, mtls, sandbox, googledomain = m.groups() + if mtls or not googledomain: + return api_endpoint + + if sandbox: + return api_endpoint.replace( + "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" + ) + + return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") + + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" + DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore + DEFAULT_ENDPOINT + ) + + _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" + _DEFAULT_UNIVERSE = "googleapis.com" + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_info(info) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_file( + filename) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + from_service_account_json = from_service_account_file + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client + instance. + """ + return self._transport + + @staticmethod + def data_policy_path(project: str,location: str,data_policy: str,) -> str: + """Returns a fully-qualified data_policy string.""" + return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + + @staticmethod + def parse_data_policy_path(path: str) -> Dict[str,str]: + """Parses a data_policy path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_billing_account_path(billing_account: str, ) -> str: + """Returns a fully-qualified billing_account string.""" + return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + + @staticmethod + def parse_common_billing_account_path(path: str) -> Dict[str,str]: + """Parse a billing_account path into its component segments.""" + m = re.match(r"^billingAccounts/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_folder_path(folder: str, ) -> str: + """Returns a fully-qualified folder string.""" + return "folders/{folder}".format(folder=folder, ) + + @staticmethod + def parse_common_folder_path(path: str) -> Dict[str,str]: + """Parse a folder path into its component segments.""" + m = re.match(r"^folders/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_organization_path(organization: str, ) -> str: + """Returns a fully-qualified organization string.""" + return "organizations/{organization}".format(organization=organization, ) + + @staticmethod + def parse_common_organization_path(path: str) -> Dict[str,str]: + """Parse a organization path into its component segments.""" + m = re.match(r"^organizations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_project_path(project: str, ) -> str: + """Returns a fully-qualified project string.""" + return "projects/{project}".format(project=project, ) + + @staticmethod + def parse_common_project_path(path: str) -> Dict[str,str]: + """Parse a project path into its component segments.""" + m = re.match(r"^projects/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_location_path(project: str, location: str, ) -> str: + """Returns a fully-qualified location string.""" + return "projects/{project}/locations/{location}".format(project=project, location=location, ) + + @staticmethod + def parse_common_location_path(path: str) -> Dict[str,str]: + """Parse a location path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + """Deprecated. Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + + warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning) + if client_options is None: + client_options = client_options_lib.ClientOptions() + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + + # Figure out the client cert source to use. + client_cert_source = None + if use_client_cert == "true": + if client_options.client_cert_source: + client_cert_source = client_options.client_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + + # Figure out which api endpoint to use. + if client_options.api_endpoint is not None: + api_endpoint = client_options.api_endpoint + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + api_endpoint = cls.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = cls.DEFAULT_ENDPOINT + + return api_endpoint, client_cert_source + + @staticmethod + def _read_environment_variables(): + """Returns the environment variables used by the client. + + Returns: + Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, + GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. + + Raises: + ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not + any of ["true", "false"]. + google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT + is not any of ["auto", "never", "always"]. + """ + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() + universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + return use_client_cert == "true", use_mtls_endpoint, universe_domain_env + + @staticmethod + def _get_client_cert_source(provided_cert_source, use_cert_flag): + """Return the client cert source to be used by the client. + + Args: + provided_cert_source (bytes): The client certificate source provided. + use_cert_flag (bool): A flag indicating whether to use the client certificate. + + Returns: + bytes or None: The client cert source to be used by the client. + """ + client_cert_source = None + if use_cert_flag: + if provided_cert_source: + client_cert_source = provided_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + return client_cert_source + + @staticmethod + def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + """Return the API endpoint used by the client. + + Args: + api_override (str): The API endpoint override. If specified, this is always + the return value of this function and the other arguments are not used. + client_cert_source (bytes): The client certificate source used by the client. + universe_domain (str): The universe domain used by the client. + use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. + Possible values are "always", "auto", or "never". + + Returns: + str: The API endpoint to be used by the client. + """ + if api_override is not None: + api_endpoint = api_override + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + if universe_domain != _default_universe: + raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + return api_endpoint + + @staticmethod + def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + """Return the universe domain used by the client. + + Args: + client_universe_domain (Optional[str]): The universe domain configured via the client options. + universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. + + Returns: + str: The universe domain to be used by the client. + + Raises: + ValueError: If the universe domain is an empty string. + """ + universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE + if client_universe_domain is not None: + universe_domain = client_universe_domain + elif universe_domain_env is not None: + universe_domain = universe_domain_env + if len(universe_domain.strip()) == 0: + raise ValueError("Universe Domain cannot be an empty string.") + return universe_domain + + def _validate_universe_domain(self): + """Validates client's and credentials' universe domains are consistent. + + Returns: + bool: True iff the configured universe domain is valid. + + Raises: + ValueError: If the configured universe domain is not valid. + """ + + # NOTE (b/349488459): universe validation is disabled until further notice. + return True + + def _add_cred_info_for_auth_errors( + self, + error: core_exceptions.GoogleAPICallError + ) -> None: + """Adds credential info string to error details for 401/403/404 errors. + + Args: + error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. + """ + if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + return + + cred = self._transport._credentials + + # get_cred_info is only available in google-auth>=2.35.0 + if not hasattr(cred, "get_cred_info"): + return + + # ignore the type check since pypy test fails when get_cred_info + # is not available + cred_info = cred.get_cred_info() # type: ignore + if cred_info and hasattr(error._details, "append"): + error._details.append(json.dumps(cred_info)) + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used by the client instance. + """ + return self._universe_domain + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that the ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client_options = client_options + if isinstance(self._client_options, dict): + self._client_options = client_options_lib.from_dict(self._client_options) + if self._client_options is None: + self._client_options = client_options_lib.ClientOptions() + self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + + universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + + self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) + self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) + self._api_endpoint = None # updated below, depending on `transport` + + # Initialize the universe domain validation. + self._is_universe_domain_valid = False + + if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER + # Setup logging. + client_logging.initialize_logging() + + api_key_value = getattr(self._client_options, "api_key", None) + if api_key_value and credentials: + raise ValueError("client_options.api_key and credentials are mutually exclusive") + + # Save or instantiate the transport. + # Ordinarily, we provide the transport, but allowing a custom transport + # instance provides an extensibility point for unusual situations. + transport_provided = isinstance(transport, DataPolicyServiceTransport) + if transport_provided: + # transport is a DataPolicyServiceTransport instance. + if credentials or self._client_options.credentials_file or api_key_value: + raise ValueError("When providing a transport instance, " + "provide its credentials directly.") + if self._client_options.scopes: + raise ValueError( + "When providing a transport instance, provide its scopes " + "directly." + ) + self._transport = cast(DataPolicyServiceTransport, transport) + self._api_endpoint = self._transport.host + + self._api_endpoint = (self._api_endpoint or + DataPolicyServiceClient._get_api_endpoint( + self._client_options.api_endpoint, + self._client_cert_source, + self._universe_domain, + self._use_mtls_endpoint)) + + if not transport_provided: + import google.auth._default # type: ignore + + if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): + credentials = google.auth._default.get_api_key_credentials(api_key_value) + + transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + DataPolicyServiceClient.get_transport_class(transport) + if isinstance(transport, str) or transport is None + else cast(Callable[..., DataPolicyServiceTransport], transport) + ) + # initialize with the provided callable or the passed in class + self._transport = transport_init( + credentials=credentials, + credentials_file=self._client_options.credentials_file, + host=self._api_endpoint, + scopes=self._client_options.scopes, + client_cert_source_for_mtls=self._client_cert_source, + quota_project_id=self._client_options.quota_project_id, + client_info=client_info, + always_use_jwt_access=True, + api_audience=self._client_options.api_audience, + ) + + if "async" not in str(self._transport): + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v1beta1.DataPolicyServiceClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "credentialsType": None, + } + ) + + def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest, dict]): + The request object. Request message for the + CreateDataPolicy method. + parent (str): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest, dict]): + The request object. Response message for the + UpdateDataPolicy method. + data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest, dict]): + The request object. Request message for the + DeleteDataPolicy method. + name (str): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest, dict]): + The request object. Request message for the GetDataPolicy + method. + name (str): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + + def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest, dict]): + The request object. Request message for the + ListDataPolicies method. + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__iter__` convenience method. + response = pagers.ListDataPoliciesPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v1beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def __enter__(self) -> "DataPolicyServiceClient": + return self + + def __exit__(self, type, value, traceback): + """Releases underlying transport's resources. + + .. warning:: + ONLY use as a context manager if the transport is NOT shared + with other clients! Exiting the with block will CLOSE the transport + and may cause errors in other clients! + """ + self.transport.close() + + + + + + + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + +__all__ = ( + "DataPolicyServiceClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py new file mode 100644 index 000000000000..6a42e5f218a9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py @@ -0,0 +1,166 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.api_core import retry_async as retries_async +from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy + + +class ListDataPoliciesPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` object, and + provides an ``__iter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__iter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiate the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.Retry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + + def __iter__(self) -> Iterator[datapolicy.DataPolicy]: + for page in self.pages: + yield from page.data_policies + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + + +class ListDataPoliciesAsyncPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` object, and + provides an ``__aiter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__aiter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiates the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.AsyncRetry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: + async def async_generator(): + async for page in self.pages: + for response in page.data_policies: + yield response + + return async_generator() + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst new file mode 100644 index 000000000000..b83d156af245 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst @@ -0,0 +1,9 @@ + +transport inheritance structure +_______________________________ + +`DataPolicyServiceTransport` is the ABC for all transports. +- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). +- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). +- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). +- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py new file mode 100644 index 000000000000..86209da54f31 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py @@ -0,0 +1,33 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from typing import Dict, Type + +from .base import DataPolicyServiceTransport +from .grpc import DataPolicyServiceGrpcTransport +from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport + + +# Compile a registry of transports. +_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] +_transport_registry['grpc'] = DataPolicyServiceGrpcTransport +_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport + +__all__ = ( + 'DataPolicyServiceTransport', + 'DataPolicyServiceGrpcTransport', + 'DataPolicyServiceGrpcAsyncIOTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py new file mode 100644 index 000000000000..e66bac610f73 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py @@ -0,0 +1,333 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import abc +from typing import Awaitable, Callable, Dict, Optional, Sequence, Union + +from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version + +import google.auth # type: ignore +import google.api_core +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceTransport(abc.ABC): + """Abstract transport class for DataPolicyService.""" + + AUTH_SCOPES = ( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', + ) + + DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + + def __init__( + self, *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A list of scopes. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + """ + + scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} + + # Save the scopes. + self._scopes = scopes + if not hasattr(self, "_ignore_credentials"): + self._ignore_credentials: bool = False + + # If no credentials are provided, then determine the appropriate + # defaults. + if credentials and credentials_file: + raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + + if credentials_file is not None: + credentials, _ = google.auth.load_credentials_from_file( + credentials_file, + **scopes_kwargs, + quota_project_id=quota_project_id + ) + elif credentials is None and not self._ignore_credentials: + credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + # Don't apply audience if the credentials file passed from user. + if hasattr(credentials, "with_gdch_audience"): + credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + + # If the credentials are service account credentials, then always try to use self signed JWT. + if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + credentials = credentials.with_always_use_jwt_access(True) + + # Save the credentials. + self._credentials = credentials + + # Save the hostname. Default to port 443 (HTTPS) if none is specified. + if ':' not in host: + host += ':443' + self._host = host + + @property + def host(self): + return self._host + + def _prep_wrapped_messages(self, client_info): + # Precompute the wrapped methods. + self._wrapped_methods = { + self.create_data_policy: gapic_v1.method.wrap_method( + self.create_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.update_data_policy: gapic_v1.method.wrap_method( + self.update_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.delete_data_policy: gapic_v1.method.wrap_method( + self.delete_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_data_policy: gapic_v1.method.wrap_method( + self.get_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.list_data_policies: gapic_v1.method.wrap_method( + self.list_data_policies, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_iam_policy: gapic_v1.method.wrap_method( + self.get_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.set_iam_policy: gapic_v1.method.wrap_method( + self.set_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.test_iam_permissions: gapic_v1.method.wrap_method( + self.test_iam_permissions, + default_retry=retries.Retry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + } + + def close(self): + """Closes resources associated with the transport. + + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! + """ + raise NotImplementedError() + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[ + empty_pb2.Empty, + Awaitable[empty_pb2.Empty] + ]]: + raise NotImplementedError() + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse] + ]]: + raise NotImplementedError() + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse] + ]]: + raise NotImplementedError() + + @property + def kind(self) -> str: + raise NotImplementedError() + + +__all__ = ( + 'DataPolicyServiceTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py new file mode 100644 index 000000000000..b002d2deac25 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py @@ -0,0 +1,539 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json +import logging as std_logging +import pickle +import warnings +from typing import Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import grpc_helpers +from google.api_core import gapic_v1 +import google.auth # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore + +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER + def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = response.result() + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response for {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "rpcName": client_call_details.method, + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): + """gRPC backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the + label-policy bindings. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + _stubs: Dict[str, Callable] + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if a ``channel`` instance is provided. + channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, grpc.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientInterceptor() + self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> grpc.Channel: + """Create and return a gRPC channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + grpc.Channel: A gRPC channel object. + + Raises: + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + + return grpc_helpers.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + @property + def grpc_channel(self) -> grpc.Channel: + """Return the channel designed to connect to this service. + """ + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + ~.Empty]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + ~.ListDataPoliciesResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + ~.TestIamPermissionsResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def close(self): + self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc" + + +__all__ = ( + 'DataPolicyServiceGrpcTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py new file mode 100644 index 000000000000..36bdf106655f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py @@ -0,0 +1,667 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import inspect +import json +import pickle +import logging as std_logging +import warnings +from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers_async +from google.api_core import exceptions as core_exceptions +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore +from grpc.experimental import aio # type: ignore + +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .grpc import DataPolicyServiceGrpcTransport + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER + async def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = await continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = await response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = await response + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response to rpc {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): + """gRPC AsyncIO backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the + label-policy bindings. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + + _grpc_channel: aio.Channel + _stubs: Dict[str, Callable] = {} + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> aio.Channel: + """Create and return a gRPC AsyncIO channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + aio.Channel: A gRPC AsyncIO channel object. + """ + + return grpc_helpers_async.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, aio.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientAIOInterceptor() + self._grpc_channel._unary_unary_interceptors.append(self._interceptor) + self._logged_channel = self._grpc_channel + self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @property + def grpc_channel(self) -> aio.Channel: + """Create the channel designed to connect to this service. + + This property caches on the instance; repeated calls return + the same channel. + """ + # Return the channel from cache. + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``dataPolicyId`` (used as the display name), policy tag, and + data policy type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Awaitable[empty_pb2.Empty]]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + Awaitable[~.Empty]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse]]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + Awaitable[~.ListDataPoliciesResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + Awaitable[~.TestIamPermissionsResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def _prep_wrapped_messages(self, client_info): + """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + self._wrapped_methods = { + self.create_data_policy: self._wrap_method( + self.create_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.update_data_policy: self._wrap_method( + self.update_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.delete_data_policy: self._wrap_method( + self.delete_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_data_policy: self._wrap_method( + self.get_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.list_data_policies: self._wrap_method( + self.list_data_policies, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.get_iam_policy: self._wrap_method( + self.get_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.set_iam_policy: self._wrap_method( + self.set_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + self.test_iam_permissions: self._wrap_method( + self.test_iam_permissions, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=10.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.ServiceUnavailable, + ), + deadline=60.0, + ), + default_timeout=60.0, + client_info=client_info, + ), + } + + def _wrap_method(self, func, *args, **kwargs): + if self._wrap_with_kind: # pragma: NO COVER + kwargs["kind"] = self.kind + return gapic_v1.method_async.wrap_method(func, *args, **kwargs) + + def close(self): + return self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc_asyncio" + + +__all__ = ( + 'DataPolicyServiceGrpcAsyncIOTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py new file mode 100644 index 000000000000..cc6bda214e86 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py @@ -0,0 +1,36 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .datapolicy import ( + CreateDataPolicyRequest, + DataMaskingPolicy, + DataPolicy, + DeleteDataPolicyRequest, + GetDataPolicyRequest, + ListDataPoliciesRequest, + ListDataPoliciesResponse, + UpdateDataPolicyRequest, +) + +__all__ = ( + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py new file mode 100644 index 000000000000..9bcedeb0addd --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py @@ -0,0 +1,320 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from __future__ import annotations + +from typing import MutableMapping, MutableSequence + +import proto # type: ignore + +from google.protobuf import field_mask_pb2 # type: ignore + + +__protobuf__ = proto.module( + package='google.cloud.bigquery.datapolicies.v1beta1', + manifest={ + 'CreateDataPolicyRequest', + 'UpdateDataPolicyRequest', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'DataPolicy', + 'DataMaskingPolicy', + }, +) + + +class CreateDataPolicyRequest(proto.Message): + r"""Request message for the CreateDataPolicy method. + + Attributes: + parent (str): + Required. Resource name of the project that the data policy + will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): + Required. The data policy to create. The ``name`` field does + not need to be provided for the data policy creation. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=2, + message='DataPolicy', + ) + + +class UpdateDataPolicyRequest(proto.Message): + r"""Response message for the UpdateDataPolicy method. + + Attributes: + data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` field. + Other fields are updated to the specified values based on + the field masks. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are allowed + to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are not + allowed. + """ + + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + update_mask: field_mask_pb2.FieldMask = proto.Field( + proto.MESSAGE, + number=2, + message=field_mask_pb2.FieldMask, + ) + + +class DeleteDataPolicyRequest(proto.Message): + r"""Request message for the DeleteDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the data policy to delete. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class GetDataPolicyRequest(proto.Message): + r"""Request message for the GetDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the requested data policy. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class ListDataPoliciesRequest(proto.Message): + r"""Request message for the ListDataPolicies method. + + Attributes: + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + page_size (int): + The maximum number of data policies to + return. Must be a value between 1 and 1000. + If not set, defaults to 50. + page_token (str): + The ``nextPageToken`` value returned from a previous list + request, if any. If not set, defaults to an empty string. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + page_size: int = proto.Field( + proto.INT32, + number=2, + ) + page_token: str = proto.Field( + proto.STRING, + number=3, + ) + + +class ListDataPoliciesResponse(proto.Message): + r"""Response message for the ListDataPolicies method. + + Attributes: + data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy]): + Data policies that belong to the requested + project. + next_page_token (str): + Token used to retrieve the next page of + results, or empty if there are no more results. + """ + + @property + def raw_page(self): + return self + + data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + next_page_token: str = proto.Field( + proto.STRING, + number=2, + ) + + +class DataPolicy(proto.Message): + r"""Represents the label-policy binding. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + policy_tag (str): + Policy tag resource name, in the format of + ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. + + This field is a member of `oneof`_ ``matching_label``. + data_masking_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataMaskingPolicy): + The data masking policy that specifies the + data masking rule to use. + + This field is a member of `oneof`_ ``policy``. + name (str): + Output only. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + data_policy_type (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy.DataPolicyType): + Type of data policy. + data_policy_id (str): + User-assigned (human readable) ID of the data policy that + needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + """ + class DataPolicyType(proto.Enum): + r"""A list of supported data policy types. + + Values: + DATA_POLICY_TYPE_UNSPECIFIED (0): + Default value for the data policy type. This + should not be used. + COLUMN_LEVEL_SECURITY_POLICY (3): + Used to create a data policy for column-level + security, without data masking. + DATA_MASKING_POLICY (2): + Used to create a data policy for data + masking. + """ + DATA_POLICY_TYPE_UNSPECIFIED = 0 + COLUMN_LEVEL_SECURITY_POLICY = 3 + DATA_MASKING_POLICY = 2 + + policy_tag: str = proto.Field( + proto.STRING, + number=4, + oneof='matching_label', + ) + data_masking_policy: 'DataMaskingPolicy' = proto.Field( + proto.MESSAGE, + number=5, + oneof='policy', + message='DataMaskingPolicy', + ) + name: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_type: DataPolicyType = proto.Field( + proto.ENUM, + number=2, + enum=DataPolicyType, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=3, + ) + + +class DataMaskingPolicy(proto.Message): + r"""The data masking policy that is used to specify data masking + rule. + + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + predefined_expression (google.cloud.bigquery_datapolicies_v1beta1.types.DataMaskingPolicy.PredefinedExpression): + A predefined masking expression. + + This field is a member of `oneof`_ ``masking_expression``. + """ + class PredefinedExpression(proto.Enum): + r"""The available masking rules. Learn more here: + https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. + + Values: + PREDEFINED_EXPRESSION_UNSPECIFIED (0): + Default, unspecified predefined expression. + No masking will take place since no expression + is specified. + SHA256 (3): + Masking expression to replace data with + SHA-256 hash. + ALWAYS_NULL (5): + Masking expression to replace data with + NULLs. + DEFAULT_MASKING_VALUE (7): + Masking expression to replace data with their default + masking values. The default masking values for each type + listed as below: + + - STRING: "" + - BYTES: b'' + - INTEGER: 0 + - FLOAT: 0.0 + - NUMERIC: 0 + - BOOLEAN: FALSE + - TIMESTAMP: 0001-01-01 00:00:00 UTC + - DATE: 0001-01-01 + - TIME: 00:00:00 + - DATETIME: 0001-01-01T00:00:00 + - GEOGRAPHY: POINT(0 0) + - BIGNUMERIC: 0 + - ARRAY: [] + - STRUCT: NOT_APPLICABLE + - JSON: NULL + """ + PREDEFINED_EXPRESSION_UNSPECIFIED = 0 + SHA256 = 3 + ALWAYS_NULL = 5 + DEFAULT_MASKING_VALUE = 7 + + predefined_expression: PredefinedExpression = proto.Field( + proto.ENUM, + number=1, + oneof='masking_expression', + enum=PredefinedExpression, + ) + + +__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini new file mode 100644 index 000000000000..574c5aed394b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini @@ -0,0 +1,3 @@ +[mypy] +python_version = 3.7 +namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py new file mode 100644 index 000000000000..25d78ab7c0ff --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py @@ -0,0 +1,591 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +import pathlib +import re +import shutil + +from typing import Dict, List +import warnings + +import nox + +BLACK_VERSION = "black[jupyter]==23.7.0" +ISORT_VERSION = "isort==5.11.0" + +LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] + +ALL_PYTHON = [ + "3.7", + "3.8", + "3.9", + "3.10", + "3.11", + "3.12", + "3.13", +] + +DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] + +CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() + +LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" +PACKAGE_NAME = "google-cloud-bigquery-datapolicies" + +UNIT_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "asyncmock", + "pytest", + "pytest-cov", + "pytest-asyncio", +] +UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_DEPENDENCIES: List[str] = [] +UNIT_TEST_EXTRAS: List[str] = [] +UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] +SYSTEM_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "pytest", + "google-cloud-testutils", +] +SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_EXTRAS: List[str] = [] +SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +nox.options.sessions = [ + "unit", + "system", + "cover", + "lint", + "lint_setup_py", + "blacken", + "docs", +] + +# Error if a python version is missing +nox.options.error_on_missing_interpreters = True + + +@nox.session(python=ALL_PYTHON) +def mypy(session): + """Run the type checker.""" + session.install( + "mypy", + "types-requests", + "types-protobuf", + ) + session.install(".") + session.run( + "mypy", + "-p", + "google", + ) + + +@nox.session +def update_lower_bounds(session): + """Update lower bounds in constraints.txt to match setup.py""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "update", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session +def check_lower_bounds(session): + """Check lower bounds in setup.py are reflected in constraints file""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "check", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint(session): + """Run linters. + + Returns a failure if the linters find linting errors or sufficiently + serious code quality issues. + """ + session.install("flake8", BLACK_VERSION) + session.run( + "black", + "--check", + *LINT_PATHS, + ) + + session.run("flake8", "google", "tests") + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def blacken(session): + """Run black. Format code to uniform standard.""" + session.install(BLACK_VERSION) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def format(session): + """ + Run isort to sort imports. Then run black + to format code to uniform standard. + """ + session.install(BLACK_VERSION, ISORT_VERSION) + # Use the --fss option to sort imports using strict alphabetical order. + # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections + session.run( + "isort", + "--fss", + *LINT_PATHS, + ) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint_setup_py(session): + """Verify that setup.py is valid (including RST check).""" + session.install("setuptools", "docutils", "pygments") + session.run("python", "setup.py", "check", "--restructuredtext", "--strict") + + +def install_unittest_dependencies(session, *constraints): + standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES + session.install(*standard_deps, *constraints) + + if UNIT_TEST_EXTERNAL_DEPENDENCIES: + warnings.warn( + "'unit_test_external_dependencies' is deprecated. Instead, please " + "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", + DeprecationWarning, + ) + session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_LOCAL_DEPENDENCIES: + session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_EXTRAS_BY_PYTHON: + extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif UNIT_TEST_EXTRAS: + extras = UNIT_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=ALL_PYTHON) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def unit(session, protobuf_implementation): + # Install all test dependencies, then install this package in-place. + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + install_unittest_dependencies(session, "-c", constraints_path) + + # TODO(https://github.com/googleapis/synthtool/issues/1976): + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + f"--junitxml=unit_{session.python}_sponge_log.xml", + "--cov=google", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +def install_systemtest_dependencies(session, *constraints): + session.install("--pre", "grpcio") + + session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: + session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_LOCAL_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTRAS_BY_PYTHON: + extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif SYSTEM_TEST_EXTRAS: + extras = SYSTEM_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) +def system(session): + """Run the system test suite.""" + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + system_test_path = os.path.join("tests", "system.py") + system_test_folder_path = os.path.join("tests", "system") + + # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. + if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": + session.skip("RUN_SYSTEM_TESTS is set to false, skipping") + # Install pyopenssl for mTLS testing. + if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": + session.install("pyopenssl") + + system_test_exists = os.path.exists(system_test_path) + system_test_folder_exists = os.path.exists(system_test_folder_path) + # Sanity check: only run tests if found. + if not system_test_exists and not system_test_folder_exists: + session.skip("System tests were not found") + + install_systemtest_dependencies(session, "-c", constraints_path) + + # Run py.test against the system tests. + if system_test_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_path, + *session.posargs, + ) + if system_test_folder_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_folder_path, + *session.posargs, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def cover(session): + """Run the final coverage report. + + This outputs the coverage report aggregating coverage from the unit + test runs (not system test runs), and then erases coverage data. + """ + session.install("coverage", "pytest-cov") + session.run("coverage", "report", "--show-missing", "--fail-under=100") + + session.run("coverage", "erase") + + +@nox.session(python="3.10") +def docs(session): + """Build the docs for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "sphinx==4.5.0", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-W", # warnings as errors + "-T", # show full traceback on exception + "-N", # no colors + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python="3.10") +def docfx(session): + """Build the docfx yaml files for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "gcp-sphinx-docfx-yaml", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-T", # show full traceback on exception + "-N", # no colors + "-D", + ( + "extensions=sphinx.ext.autodoc," + "sphinx.ext.autosummary," + "docfx_yaml.extension," + "sphinx.ext.intersphinx," + "sphinx.ext.coverage," + "sphinx.ext.napoleon," + "sphinx.ext.todo," + "sphinx.ext.viewcode," + "recommonmark" + ), + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def prerelease_deps(session, protobuf_implementation): + """ + Run all tests with pre-release versions of dependencies installed + rather than the standard non pre-release versions. + Pre-release versions can be installed using + `pip install --pre `. + """ + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # Note: If a dependency is added to the `prerel_deps` list, + # the `core_dependencies_from_source` list in the `core_deps_from_source` + # nox session should also be updated. + prerel_deps = [ + "googleapis-common-protos", + "google-api-core", + "google-auth", + "grpc-google-iam-v1", + "grpcio", + "grpcio-status", + "protobuf", + "proto-plus", + ] + + for dep in prerel_deps: + session.install("--pre", "--no-deps", "--ignore-installed", dep) + # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` + # to the dictionary below once this bug is fixed. + # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add + # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below + # once this bug is fixed. + package_namespaces = { + "google-api-core": "google.api_core", + "google-auth": "google.auth", + "grpcio": "grpc", + "protobuf": "google.protobuf", + "proto-plus": "proto", + } + + version_namespace = package_namespaces.get(dep) + + print(f"Installed {dep}") + if version_namespace: + session.run( + "python", + "-c", + f"import {version_namespace}; print({version_namespace}.__version__)", + ) + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb"], +) +def core_deps_from_source(session, protobuf_implementation): + """Run all tests with core dependencies installed from source + rather than pulling the dependencies from PyPI. + """ + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and + # `grpcio-status` should be added to the list below so that they are installed from source, + # rather than PyPI. + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be + # added to the list below so that it is installed from source, rather than PyPI + # Note: If a dependency is added to the `core_dependencies_from_source` list, + # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. + core_dependencies_from_source = [ + "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", + "google-api-core @ git+https://github.com/googleapis/python-api-core.git", + "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", + "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", + "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", + ] + + for dep in core_dependencies_from_source: + session.install(dep, "--no-deps", "--ignore-installed") + print(f"Installed {dep}") + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py new file mode 100644 index 000000000000..a7c72cfdef6e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py new file mode 100644 index 000000000000..f8585e08e431 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py new file mode 100644 index 000000000000..9824d31573e0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py new file mode 100644 index 000000000000..402a855549ac --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py new file mode 100644 index 000000000000..287a588d313a --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py new file mode 100644 index 000000000000..d66aca494389 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py new file mode 100644 index 000000000000..e26eb0af7c47 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py new file mode 100644 index 000000000000..bf7d3bbb18c0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py new file mode 100644 index 000000000000..cec6128daa1e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py new file mode 100644 index 000000000000..fd210445e40b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py new file mode 100644 index 000000000000..e1030c07863a --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py new file mode 100644 index 000000000000..7e86291320dd --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py new file mode 100644 index 000000000000..1fdbf4f0c1b3 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py new file mode 100644 index 000000000000..d3b770d02f67 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py new file mode 100644 index 000000000000..a7253f2cb8e1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py new file mode 100644 index 000000000000..02dd6e6a1d0d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v1beta1 + + +def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v1beta1.DataPolicy() + data_policy.policy_tag = "policy_tag_value" + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + + request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json new file mode 100644 index 000000000000..f5896d1aac3d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json @@ -0,0 +1,1289 @@ +{ + "clientLibrary": { + "apis": [ + { + "id": "google.cloud.bigquery.datapolicies.v1beta1", + "version": "v1beta1" + } + ], + "language": "PYTHON", + "name": "google-cloud-bigquery-datapolicies", + "version": "0.1.0" + }, + "snippets": [ + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 50, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 51, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 50, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 51, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py" + } + ] +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py new file mode 100644 index 000000000000..bbdc6beba34f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py @@ -0,0 +1,183 @@ +#! /usr/bin/env python3 +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import argparse +import os +import libcst as cst +import pathlib +import sys +from typing import (Any, Callable, Dict, List, Sequence, Tuple) + + +def partition( + predicate: Callable[[Any], bool], + iterator: Sequence[Any] +) -> Tuple[List[Any], List[Any]]: + """A stable, out-of-place partition.""" + results = ([], []) + + for i in iterator: + results[int(predicate(i))].append(i) + + # Returns trueList, falseList + return results[1], results[0] + + +class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): + CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') + METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { + 'create_data_policy': ('parent', 'data_policy', ), + 'delete_data_policy': ('name', ), + 'get_data_policy': ('name', ), + 'get_iam_policy': ('resource', 'options', ), + 'list_data_policies': ('parent', 'page_size', 'page_token', ), + 'set_iam_policy': ('resource', 'policy', 'update_mask', ), + 'test_iam_permissions': ('resource', 'permissions', ), + 'update_data_policy': ('data_policy', 'update_mask', ), + } + + def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: + try: + key = original.func.attr.value + kword_params = self.METHOD_TO_PARAMS[key] + except (AttributeError, KeyError): + # Either not a method from the API or too convoluted to be sure. + return updated + + # If the existing code is valid, keyword args come after positional args. + # Therefore, all positional args must map to the first parameters. + args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) + if any(k.keyword.value == "request" for k in kwargs): + # We've already fixed this file, don't fix it again. + return updated + + kwargs, ctrl_kwargs = partition( + lambda a: a.keyword.value not in self.CTRL_PARAMS, + kwargs + ) + + args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] + ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) + for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) + + request_arg = cst.Arg( + value=cst.Dict([ + cst.DictElement( + cst.SimpleString("'{}'".format(name)), +cst.Element(value=arg.value) + ) + # Note: the args + kwargs looks silly, but keep in mind that + # the control parameters had to be stripped out, and that + # those could have been passed positionally or by keyword. + for name, arg in zip(kword_params, args + kwargs)]), + keyword=cst.Name("request") + ) + + return updated.with_changes( + args=[request_arg] + ctrl_kwargs + ) + + +def fix_files( + in_dir: pathlib.Path, + out_dir: pathlib.Path, + *, + transformer=bigquery_datapoliciesCallTransformer(), +): + """Duplicate the input dir to the output dir, fixing file method calls. + + Preconditions: + * in_dir is a real directory + * out_dir is a real, empty directory + """ + pyfile_gen = ( + pathlib.Path(os.path.join(root, f)) + for root, _, files in os.walk(in_dir) + for f in files if os.path.splitext(f)[1] == ".py" + ) + + for fpath in pyfile_gen: + with open(fpath, 'r') as f: + src = f.read() + + # Parse the code and insert method call fixes. + tree = cst.parse_module(src) + updated = tree.visit(transformer) + + # Create the path and directory structure for the new file. + updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) + updated_path.parent.mkdir(parents=True, exist_ok=True) + + # Generate the updated source file at the corresponding path. + with open(updated_path, 'w') as f: + f.write(updated.code) + + +if __name__ == '__main__': + parser = argparse.ArgumentParser( + description="""Fix up source that uses the bigquery_datapolicies client library. + +The existing sources are NOT overwritten but are copied to output_dir with changes made. + +Note: This tool operates at a best-effort level at converting positional + parameters in client method calls to keyword based parameters. + Cases where it WILL FAIL include + A) * or ** expansion in a method call. + B) Calls via function or method alias (includes free function calls) + C) Indirect or dispatched calls (e.g. the method is looked up dynamically) + + These all constitute false negatives. The tool will also detect false + positives when an API method shares a name with another method. +""") + parser.add_argument( + '-d', + '--input-directory', + required=True, + dest='input_dir', + help='the input directory to walk for python files to fix up', + ) + parser.add_argument( + '-o', + '--output-directory', + required=True, + dest='output_dir', + help='the directory to output files fixed via un-flattening', + ) + args = parser.parse_args() + input_dir = pathlib.Path(args.input_dir) + output_dir = pathlib.Path(args.output_dir) + if not input_dir.is_dir(): + print( + f"input directory '{input_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if not output_dir.is_dir(): + print( + f"output directory '{output_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if os.listdir(output_dir): + print( + f"output directory '{output_dir}' is not empty", + file=sys.stderr, + ) + sys.exit(-1) + + fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py new file mode 100644 index 000000000000..40366686e783 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py @@ -0,0 +1,99 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import io +import os +import re + +import setuptools # type: ignore + +package_root = os.path.abspath(os.path.dirname(__file__)) + +name = 'google-cloud-bigquery-datapolicies' + + +description = "Google Cloud Bigquery Datapolicies API client library" + +version = None + +with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: + version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) + assert (len(version_candidates) == 1) + version = version_candidates[0] + +if version[0] == "0": + release_status = "Development Status :: 4 - Beta" +else: + release_status = "Development Status :: 5 - Production/Stable" + +dependencies = [ + "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", + # Exclude incompatible versions of `google-auth` + # See https://github.com/googleapis/google-cloud-python/issues/12364 + "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", + "proto-plus >= 1.22.3, <2.0.0", + "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", + "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", + "grpc-google-iam-v1 >= 0.14.0, <1.0.0", +] +extras = { +} +url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" + +package_root = os.path.abspath(os.path.dirname(__file__)) + +readme_filename = os.path.join(package_root, "README.rst") +with io.open(readme_filename, encoding="utf-8") as readme_file: + readme = readme_file.read() + +packages = [ + package + for package in setuptools.find_namespace_packages() + if package.startswith("google") +] + +setuptools.setup( + name=name, + version=version, + description=description, + long_description=readme, + author="Google LLC", + author_email="googleapis-packages@google.com", + license="Apache 2.0", + url=url, + classifiers=[ + release_status, + "Intended Audience :: Developers", + "License :: OSI Approved :: Apache Software License", + "Programming Language :: Python", + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.7", + "Programming Language :: Python :: 3.8", + "Programming Language :: Python :: 3.9", + "Programming Language :: Python :: 3.10", + "Programming Language :: Python :: 3.11", + "Programming Language :: Python :: 3.12", + "Programming Language :: Python :: 3.13", + "Operating System :: OS Independent", + "Topic :: Internet", + ], + platforms="Posix; MacOS X; Windows", + packages=packages, + python_requires=">=3.7", + install_requires=dependencies, + extras_require=extras, + include_package_data=True, + zip_safe=False, +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt new file mode 100644 index 000000000000..2010e549cceb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt @@ -0,0 +1,12 @@ +# We use the constraints file for the latest Python version +# (currently this file) to check that the latest +# major versions of dependencies are supported in setup.py. +# List all library dependencies and extras in this file. +# Require the latest major version be installed for each dependency. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo>=1 +google-api-core>=2 +google-auth>=2 +proto-plus>=1 +protobuf>=6 +grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt new file mode 100644 index 000000000000..56affbd9bd75 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt @@ -0,0 +1,11 @@ +# This constraints file is used to check that lower bounds +# are correct in setup.py +# List all library dependencies and extras in this file. +# Pin the version to the lower bound. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo==1.14.0 +google-api-core==1.34.1 +google-auth==2.14.1 +proto-plus==1.22.3 +protobuf==3.20.2 +grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py new file mode 100644 index 000000000000..38239c9fe7cf --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py @@ -0,0 +1,4346 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +# try/except added for compatibility with python < 3.8 +try: + from unittest import mock + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER + import mock + +import grpc +from grpc.experimental import aio +import json +import math +import pytest +from google.api_core import api_core_version +from proto.marshal.rules.dates import DurationRule, TimestampRule +from proto.marshal.rules import wrappers + +try: + from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True +except ImportError: # pragma: NO COVER + HAS_GOOGLE_AUTH_AIO = False + +from google.api_core import client_options +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers +from google.api_core import grpc_helpers_async +from google.api_core import path_template +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials +from google.auth.exceptions import MutualTLSChannelError +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import DataPolicyServiceAsyncClient +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import transports +from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import options_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account +from google.protobuf import field_mask_pb2 # type: ignore +from google.type import expr_pb2 # type: ignore +import google.auth + + + +CRED_INFO_JSON = { + "credential_source": "/path/to/file", + "credential_type": "service account credentials", + "principal": "service-account@example.com", +} +CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) + + +async def mock_async_gen(data, chunk_size=1): + for i in range(0, len(data)): # pragma: NO COVER + chunk = data[i : i + chunk_size] + yield chunk.encode("utf-8") + +def client_cert_source_callback(): + return b"cert bytes", b"key bytes" + +# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. +# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. +def async_anonymous_credentials(): + if HAS_GOOGLE_AUTH_AIO: + return ga_credentials_async.AnonymousCredentials() + return ga_credentials.AnonymousCredentials() + +# If default endpoint is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint(client): + return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + +# If default endpoint template is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint template so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint_template(client): + return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + + +def test__get_default_mtls_endpoint(): + api_endpoint = "example.googleapis.com" + api_mtls_endpoint = "example.mtls.googleapis.com" + sandbox_endpoint = "example.sandbox.googleapis.com" + sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" + non_googleapi = "api.example.com" + + assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + +def test__read_environment_variables(): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + +def test__get_client_cert_source(): + mock_provided_cert_source = mock.Mock() + mock_default_cert_source = mock.Mock() + + assert DataPolicyServiceClient._get_client_cert_source(None, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): + assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source + +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test__get_api_endpoint(): + api_override = "foo.com" + mock_client_cert_source = mock.Mock() + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") + assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + + +def test__get_universe_domain(): + client_universe_domain = "foo.com" + universe_domain_env = "bar.com" + + assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain + assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env + assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._get_universe_domain("", None) + assert str(excinfo.value) == "Universe Domain cannot be an empty string." + +@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False) +]) +def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): + cred = mock.Mock(["get_cred_info"]) + cred.get_cred_info = mock.Mock(return_value=cred_info_json) + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=["foo"]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + if show_cred_info: + assert error.details == ["foo", CRED_INFO_STRING] + else: + assert error.details == ["foo"] + +@pytest.mark.parametrize("error_code", [401,403,404,500]) +def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): + cred = mock.Mock([]) + assert not hasattr(cred, "get_cred_info") + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=[]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + assert error.details == [] + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), +]) +def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + factory.return_value = creds + info = {"valid": True} + client = client_class.from_service_account_info(info, transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + ) + + +@pytest.mark.parametrize("transport_class,transport_name", [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), +]) +def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=True) + use_jwt.assert_called_once_with(True) + + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=False) + use_jwt.assert_not_called() + + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), +]) +def test_data_policy_service_client_from_service_account_file(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + factory.return_value = creds + client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + ) + + +def test_data_policy_service_client_get_transport_class(): + transport = DataPolicyServiceClient.get_transport_class() + available_transports = [ + transports.DataPolicyServiceGrpcTransport, + ] + assert transport in available_transports + + transport = DataPolicyServiceClient.get_transport_class("grpc") + assert transport == transports.DataPolicyServiceGrpcTransport + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): + # Check that if channel is provided we won't create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ) + client = client_class(transport=transport) + gtc.assert_not_called() + + # Check that if channel is provided via str we will create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + client = client_class(transport=transport_name) + gtc.assert_called() + + # Check the case api_endpoint is provided. + options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name, client_options=options) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client.DEFAULT_MTLS_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + # Check the case quota_project_id is provided + options = client_options.ClientOptions(quota_project_id="octopus") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id="octopus", + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + # Check the case api_endpoint is provided + options = client_options.ClientOptions(api_audience="https://language.googleapis.com") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience="https://language.googleapis.com" + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) +def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): + # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default + # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. + + # Check the case client_cert_source is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + + if use_client_cert_env == "false": + expected_client_cert_source = None + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + else: + expected_client_cert_source = client_cert_source_callback + expected_host = client.DEFAULT_MTLS_ENDPOINT + + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case ADC client cert is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + if use_client_cert_env == "false": + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_client_cert_source = None + else: + expected_host = client.DEFAULT_MTLS_ENDPOINT + expected_client_cert_source = client_cert_source_callback + + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case client_cert_source and ADC client cert are not provided. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): + mock_client_cert_source = mock.Mock() + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source == mock_client_cert_source + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + mock_client_cert_source = mock.Mock() + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source == mock_client_cert_source + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_api_endpoint(client_class): + mock_client_cert_source = client_cert_source_callback + api_override = "foo.com" + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", + # use ClientOptions.api_endpoint as the api endpoint regardless. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == api_override + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", + # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + + # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), + # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, + # and ClientOptions.universe_domain="bar.com", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. + options = client_options.ClientOptions() + universe_exists = hasattr(options, "universe_domain") + if universe_exists: + options = client_options.ClientOptions(universe_domain=mock_universe) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + else: + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) + assert client.universe_domain == (mock_universe if universe_exists else default_universe) + + # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + options = client_options.ClientOptions() + if hasattr(options, "universe_domain"): + delattr(options, "universe_domain") + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), +]) +def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): + # Check the case scopes are provided. + options = client_options.ClientOptions( + scopes=["1", "2"], + ) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=["1", "2"], + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), +]) +def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +def test_data_policy_service_client_client_options_from_dict(): + with mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + grpc_transport.return_value = None + client = DataPolicyServiceClient( + client_options={'api_endpoint': 'squid.clam.whelk'} + ) + grpc_transport.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), +]) +def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=None, + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_create_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.CreateDataPolicyRequest( + parent='parent_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.create_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.CreateDataPolicyRequest( + parent='parent_value', + ) + +def test_create_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + + request = {} + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_create_data_policy_async_from_dict(): + await test_create_data_policy_async(request_type=dict) + +def test_create_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_create_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_create_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + + +def test_create_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_update_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.UpdateDataPolicyRequest( + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.update_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.UpdateDataPolicyRequest( + ) + +def test_update_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + + request = {} + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_update_data_policy_async_from_dict(): + await test_update_data_policy_async(request_type=dict) + +def test_update_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_update_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +def test_update_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.update_data_policy( + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + + +def test_update_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.update_data_policy( + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + response = client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.delete_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + +def test_delete_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + + request = {} + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + response = await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.asyncio +async def test_delete_data_policy_async_from_dict(): + await test_delete_data_policy_async(request_type=dict) + +def test_delete_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_delete_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_delete_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_delete_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + policy_tag='policy_tag_value', + ) + response = client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +def test_get_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.GetDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.GetDataPolicyRequest( + name='name_value', + ) + +def test_get_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + + request = {} + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + response = await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY + assert response.data_policy_id == 'data_policy_id_value' + + +@pytest.mark.asyncio +async def test_get_data_policy_async_from_dict(): + await test_get_data_policy_async(request_type=dict) + +def test_get_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_get_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_get_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + response = client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +def test_list_data_policies_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.list_data_policies(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + ) + +def test_list_data_policies_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + + request = {} + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + response = await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesAsyncPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.asyncio +async def test_list_data_policies_async_from_dict(): + await test_list_data_policies_async(request_type=dict) + +def test_list_data_policies_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_list_data_policies_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_list_data_policies_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + + +def test_list_data_policies_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_pager(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + + expected_metadata = () + retry = retries.Retry() + timeout = 5 + expected_metadata = tuple(expected_metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ('parent', ''), + )), + ) + pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) + + assert pager._metadata == expected_metadata + assert pager._retry == retry + assert pager._timeout == timeout + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) +def test_list_data_policies_pages(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = list(client.list_data_policies(request={}).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.asyncio +async def test_list_data_policies_async_pager(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + async_pager = await client.list_data_policies(request={},) + assert async_pager.next_page_token == 'abc' + responses = [] + async for response in async_pager: # pragma: no branch + responses.append(response) + + assert len(responses) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in responses) + + +@pytest.mark.asyncio +async def test_list_data_policies_async_pages(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = [] + # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` + # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 + async for page_ in ( # pragma: no branch + await client.list_data_policies(request={}) + ).pages: + pages.append(page_) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_get_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + +def test_get_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + + request = {} + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_get_iam_policy_async_from_dict(): + await test_get_iam_policy_async(request_type=dict) + +def test_get_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_get_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.get_iam_policy(request={ + 'resource': 'resource_value', + 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_set_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.set_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + +def test_set_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + + request = {} + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_set_iam_policy_async_from_dict(): + await test_set_iam_policy_async(request_type=dict) + +def test_set_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_set_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_set_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.set_iam_policy(request={ + 'resource': 'resource_value', + 'policy': policy_pb2.Policy(version=774), + 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + response = client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.test_iam_permissions(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + +def test_test_iam_permissions_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + + request = {} + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + response = await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_from_dict(): + await test_test_iam_permissions_async(request_type=dict) + +def test_test_iam_permissions_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_test_iam_permissions_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + response = client.test_iam_permissions(request={ + 'resource': 'resource_value', + 'permissions': ['permissions_value'], + } + ) + call.assert_called() + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = DataPolicyServiceClient(transport=transport) + assert client.transport is transport + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + +@pytest.mark.parametrize("transport_class", [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, +]) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + +def test_transport_kind_grpc(): + transport = DataPolicyServiceClient.get_transport_class("grpc")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "grpc" + + +def test_initialize_client_w_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_grpc_asyncio(): + transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( + credentials=async_anonymous_credentials() + ) + assert transport.kind == "grpc_asyncio" + + +def test_initialize_client_w_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_create_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_update_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_delete_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, + data_policy_id='data_policy_id_value', + )) + await client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_list_data_policies_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + await client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_set_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_test_iam_permissions_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + await client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.DataPolicyServiceGrpcTransport, + ) + +def test_data_policy_service_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json" + ) + + +def test_data_policy_service_base_transport(): + # Instantiate the base transport. + with mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + Transport.return_value = None + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + 'create_data_policy', + 'update_data_policy', + 'delete_data_policy', + 'get_data_policy', + 'list_data_policies', + 'get_iam_policy', + 'set_iam_policy', + 'test_iam_permissions', + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Catch all for all remaining methods and properties + remainder = [ + 'kind', + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_data_policy_service_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with("credentials.json", + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id="octopus", + ) + + +def test_data_policy_service_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport() + adc.assert_called_once() + + +def test_data_policy_service_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + DataPolicyServiceClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_auth_gdch_credentials(transport_class): + host = 'https://language.com' + api_audience_tests = [None, 'https://language2.com'] + api_audience_expect = [host, 'https://language2.com'] + for t, e in zip(api_audience_tests, api_audience_expect): + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + gdch_mock = mock.MagicMock() + type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + adc.return_value = (gdch_mock, None) + transport_class(host=host, api_audience=t) + gdch_mock.with_gdch_audience.assert_called_once_with( + e + ) + + +@pytest.mark.parametrize( + "transport_class,grpc_helpers", + [ + (transports.DataPolicyServiceGrpcTransport, grpc_helpers), + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + ], +) +def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + grpc_helpers, "create_channel", autospec=True + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + adc.return_value = (creds, None) + transport_class( + quota_project_id="octopus", + scopes=["1", "2"] + ) + + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=creds, + credentials_file=None, + quota_project_id="octopus", + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=["1", "2"], + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( + transport_class +): + cred = ga_credentials.AnonymousCredentials() + + # Check ssl_channel_credentials is used if provided. + with mock.patch.object(transport_class, "create_channel") as mock_create_channel: + mock_ssl_channel_creds = mock.Mock() + transport_class( + host="squid.clam.whelk", + credentials=cred, + ssl_channel_credentials=mock_ssl_channel_creds + ) + mock_create_channel.assert_called_once_with( + "squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_channel_creds, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls + # is used. + with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): + with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: + transport_class( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + expected_cert, expected_key = client_cert_source_callback() + mock_ssl_cred.assert_called_once_with( + certificate_chain=expected_cert, + private_key=expected_key + ) + + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", +]) +def test_data_policy_service_host_no_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + ) + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", +]) +def test_data_policy_service_host_with_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:8000' + ) + +def test_data_policy_service_grpc_transport_channel(): + channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +def test_data_policy_service_grpc_asyncio_transport_channel(): + channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_client_cert_source( + transport_class +): + with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_ssl_cred = mock.Mock() + grpc_ssl_channel_cred.return_value = mock_ssl_cred + + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + + cred = ga_credentials.AnonymousCredentials() + with pytest.warns(DeprecationWarning): + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (cred, None) + transport = transport_class( + host="squid.clam.whelk", + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=client_cert_source_callback, + ) + adc.assert_called_once() + + grpc_ssl_channel_cred.assert_called_once_with( + certificate_chain=b"cert bytes", private_key=b"key bytes" + ) + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + assert transport._ssl_channel_credentials == mock_ssl_cred + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_adc( + transport_class +): + mock_ssl_cred = mock.Mock() + with mock.patch.multiple( + "google.auth.transport.grpc.SslCredentials", + __init__=mock.Mock(return_value=None), + ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), + ): + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + mock_cred = mock.Mock() + + with pytest.warns(DeprecationWarning): + transport = transport_class( + host="squid.clam.whelk", + credentials=mock_cred, + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=None, + ) + + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=mock_cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + + +def test_data_policy_path(): + project = "squid" + location = "clam" + data_policy = "whelk" + expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) + assert expected == actual + + +def test_parse_data_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "data_policy": "nudibranch", + } + path = DataPolicyServiceClient.data_policy_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_data_policy_path(path) + assert expected == actual + +def test_common_billing_account_path(): + billing_account = "cuttlefish" + expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + actual = DataPolicyServiceClient.common_billing_account_path(billing_account) + assert expected == actual + + +def test_parse_common_billing_account_path(): + expected = { + "billing_account": "mussel", + } + path = DataPolicyServiceClient.common_billing_account_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_billing_account_path(path) + assert expected == actual + +def test_common_folder_path(): + folder = "winkle" + expected = "folders/{folder}".format(folder=folder, ) + actual = DataPolicyServiceClient.common_folder_path(folder) + assert expected == actual + + +def test_parse_common_folder_path(): + expected = { + "folder": "nautilus", + } + path = DataPolicyServiceClient.common_folder_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_folder_path(path) + assert expected == actual + +def test_common_organization_path(): + organization = "scallop" + expected = "organizations/{organization}".format(organization=organization, ) + actual = DataPolicyServiceClient.common_organization_path(organization) + assert expected == actual + + +def test_parse_common_organization_path(): + expected = { + "organization": "abalone", + } + path = DataPolicyServiceClient.common_organization_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_organization_path(path) + assert expected == actual + +def test_common_project_path(): + project = "squid" + expected = "projects/{project}".format(project=project, ) + actual = DataPolicyServiceClient.common_project_path(project) + assert expected == actual + + +def test_parse_common_project_path(): + expected = { + "project": "clam", + } + path = DataPolicyServiceClient.common_project_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_project_path(path) + assert expected == actual + +def test_common_location_path(): + project = "whelk" + location = "octopus" + expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + actual = DataPolicyServiceClient.common_location_path(project, location) + assert expected == actual + + +def test_parse_common_location_path(): + expected = { + "project": "oyster", + "location": "nudibranch", + } + path = DataPolicyServiceClient.common_location_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_location_path(path) + assert expected == actual + + +def test_client_with_default_client_info(): + client_info = gapic_v1.client_info.ClientInfo() + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + transport_class = DataPolicyServiceClient.get_transport_class() + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + +def test_transport_close_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +@pytest.mark.asyncio +async def test_transport_close_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + async with client: + close.assert_not_called() + close.assert_called_once() + + +def test_client_ctx(): + transports = [ + 'grpc', + ] + for transport in transports: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport + ) + # Test client calls underlying transport. + with mock.patch.object(type(client.transport), "close") as close: + close.assert_not_called() + with client: + pass + close.assert_called() + +@pytest.mark.parametrize("client_class,transport_class", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), +]) +def test_api_key_credentials(client_class, transport_class): + with mock.patch.object( + google.auth._default, "get_api_key_credentials", create=True + ) as get_api_key_credentials: + mock_cred = mock.Mock() + get_api_key_credentials.return_value = mock_cred + options = client_options.ClientOptions() + options.api_key = "api_key" + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options) + patched.assert_called_once_with( + credentials=mock_cred, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc new file mode 100644 index 000000000000..0c3effcc3668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc @@ -0,0 +1,13 @@ +[run] +branch = True + +[report] +show_missing = True +omit = + google/cloud/bigquery_datapolicies/__init__.py + google/cloud/bigquery_datapolicies/gapic_version.py +exclude_lines = + # Re-enable the standard pragma + pragma: NO COVER + # Ignore debug-only repr + def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 new file mode 100644 index 000000000000..90316de21489 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 @@ -0,0 +1,34 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +[flake8] +# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): +# Resolve flake8 lint issues +ignore = E203, E231, E266, E501, W503 +exclude = + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): + # Ensure that generated code passes flake8 lint + **/gapic/** + **/services/** + **/types/** + # Exclude Protobuf gencode + *_pb2.py + + # Standard linting exemptions. + **/.nox/** + __pycache__, + .git, + *.pyc, + conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE new file mode 100644 index 000000000000..d64569567334 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in new file mode 100644 index 000000000000..dae249ec8976 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +include README.rst LICENSE +recursive-include google *.py *.pyi *.json *.proto py.typed +recursive-include tests * +global-exclude *.py[co] +global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst new file mode 100644 index 000000000000..074e1245b6d1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst @@ -0,0 +1,143 @@ +Python Client for Google Cloud Bigquery Datapolicies API +================================================= + +Quick Start +----------- + +In order to use this library, you first need to go through the following steps: + +1. `Select or create a Cloud Platform project.`_ +2. `Enable billing for your project.`_ +3. Enable the Google Cloud Bigquery Datapolicies API. +4. `Setup Authentication.`_ + +.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project +.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project +.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html + +Installation +~~~~~~~~~~~~ + +Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to +create isolated Python environments. The basic problem it addresses is one of +dependencies and versions, and indirectly permissions. + +With `virtualenv`_, it's possible to install this library without needing system +install permissions, and without clashing with the installed system +dependencies. + +.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ + + +Mac/Linux +^^^^^^^^^ + +.. code-block:: console + + python3 -m venv + source /bin/activate + /bin/pip install /path/to/library + + +Windows +^^^^^^^ + +.. code-block:: console + + python3 -m venv + \Scripts\activate + \Scripts\pip.exe install \path\to\library + + +Logging +------- + +This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. +Note the following: + +#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. +#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. +#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. + + +Simple, environment-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google +logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged +messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging +event. + +A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. + +- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. +- Invalid logging scopes: :code:`foo`, :code:`123`, etc. + +**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. + + +Examples +^^^^^^^^ + +- Enabling the default handler for all Google-based loggers + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google + +- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 + + +Advanced, code-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +You can also configure a valid logging scope using Python's standard `logging` mechanism. + + +Examples +^^^^^^^^ + +- Configuring a handler for all Google-based loggers + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + +- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google.cloud.library_v1") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + + +Logging details +~~~~~~~~~~~~~~~ + +#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root + logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set + :code:`logging.getLogger("google").propagate = True` in your code. +#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for + one library, but decide you need to also set up environment-based logging configuration for another library. + + #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual + if the code -based configuration gets applied first. + +#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get + executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. + (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css new file mode 100644 index 000000000000..b0a295464b23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css @@ -0,0 +1,20 @@ +div#python2-eol { + border-color: red; + border-width: medium; +} + +/* Ensure minimum width for 'Parameters' / 'Returns' column */ +dl.field-list > dt { + min-width: 100px +} + +/* Insert space between methods for readability */ +dl.method { + padding-top: 10px; + padding-bottom: 10px +} + +/* Insert empty space between classes */ +dl.class { + padding-bottom: 50px +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html new file mode 100644 index 000000000000..95e9c77fcfe1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html @@ -0,0 +1,50 @@ + +{% extends "!layout.html" %} +{%- block content %} +{%- if theme_fixed_sidebar|lower == 'true' %} +
+ {{ sidebar() }} + {%- block document %} +
+ {%- if render_sidebar %} +
+ {%- endif %} + + {%- block relbar_top %} + {%- if theme_show_relbar_top|tobool %} + + {%- endif %} + {% endblock %} + +
+
+ As of January 1, 2020 this library no longer supports Python 2 on the latest released version. + Library versions released prior to that date will continue to be available. For more information please + visit Python 2 support on Google Cloud. +
+ {% block body %} {% endblock %} +
+ + {%- block relbar_bottom %} + {%- if theme_show_relbar_bottom|tobool %} + + {%- endif %} + {% endblock %} + + {%- if render_sidebar %} +
+ {%- endif %} +
+ {%- endblock %} +
+
+{%- else %} +{{ super() }} +{%- endif %} +{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst new file mode 100644 index 000000000000..3bc0c68134d4 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst @@ -0,0 +1,10 @@ +DataPolicyService +----------------------------------- + +.. automodule:: google.cloud.bigquery_datapolicies_v2.services.data_policy_service + :members: + :inherited-members: + +.. automodule:: google.cloud.bigquery_datapolicies_v2.services.data_policy_service.pagers + :members: + :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst new file mode 100644 index 000000000000..fc101305404d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst @@ -0,0 +1,6 @@ +Services for Google Cloud Bigquery Datapolicies v2 API +====================================================== +.. toctree:: + :maxdepth: 2 + + data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst new file mode 100644 index 000000000000..ee2c2da88357 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst @@ -0,0 +1,6 @@ +Types for Google Cloud Bigquery Datapolicies v2 API +=================================================== + +.. automodule:: google.cloud.bigquery_datapolicies_v2.types + :members: + :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py new file mode 100644 index 000000000000..babd226a574e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py @@ -0,0 +1,385 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# +# google-cloud-bigquery-datapolicies documentation build configuration file +# +# This file is execfile()d with the current directory set to its +# containing dir. +# +# Note that not all possible configuration values are present in this +# autogenerated file. +# +# All configuration values have a default; values that are commented out +# serve to show the default. + +import sys +import os +import shlex + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +sys.path.insert(0, os.path.abspath("..")) + +# For plugins that can not read conf.py. +# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 +sys.path.insert(0, os.path.abspath(".")) + +__version__ = "" + +# -- General configuration ------------------------------------------------ + +# If your documentation needs a minimal Sphinx version, state it here. +needs_sphinx = "4.5.0" + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [ + "sphinx.ext.autodoc", + "sphinx.ext.autosummary", + "sphinx.ext.intersphinx", + "sphinx.ext.coverage", + "sphinx.ext.doctest", + "sphinx.ext.napoleon", + "sphinx.ext.todo", + "sphinx.ext.viewcode", + "recommonmark", +] + +# autodoc/autosummary flags +autoclass_content = "both" +autodoc_default_options = {"members": True} +autosummary_generate = True + + +# Add any paths that contain templates here, relative to this directory. +templates_path = ["_templates"] + +# The suffix(es) of source filenames. +# You can specify multiple suffix as a list of string: +# source_suffix = ['.rst', '.md'] +source_suffix = [".rst", ".md"] + +# The encoding of source files. +# source_encoding = 'utf-8-sig' + +# The root toctree document. +root_doc = "index" + +# General information about the project. +project = u"google-cloud-bigquery-datapolicies" +copyright = u"2025, Google, LLC" +author = u"Google APIs" + +# The version info for the project you're documenting, acts as replacement for +# |version| and |release|, also used in various other places throughout the +# built documents. +# +# The full version, including alpha/beta/rc tags. +release = __version__ +# The short X.Y version. +version = ".".join(release.split(".")[0:2]) + +# The language for content autogenerated by Sphinx. Refer to documentation +# for a list of supported languages. +# +# This is also used if you do content translation via gettext catalogs. +# Usually you set "language" from the command line for these cases. +language = None + +# There are two options for replacing |today|: either, you set today to some +# non-false value, then it is used: +# today = '' +# Else, today_fmt is used as the format for a strftime call. +# today_fmt = '%B %d, %Y' + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +exclude_patterns = [ + "_build", + "**/.nox/**/*", + "samples/AUTHORING_GUIDE.md", + "samples/CONTRIBUTING.md", + "samples/snippets/README.rst", +] + +# The reST default role (used for this markup: `text`) to use for all +# documents. +# default_role = None + +# If true, '()' will be appended to :func: etc. cross-reference text. +# add_function_parentheses = True + +# If true, the current module name will be prepended to all description +# unit titles (such as .. function::). +# add_module_names = True + +# If true, sectionauthor and moduleauthor directives will be shown in the +# output. They are ignored by default. +# show_authors = False + +# The name of the Pygments (syntax highlighting) style to use. +pygments_style = "sphinx" + +# A list of ignored prefixes for module index sorting. +# modindex_common_prefix = [] + +# If true, keep warnings as "system message" paragraphs in the built documents. +# keep_warnings = False + +# If true, `todo` and `todoList` produce output, else they produce nothing. +todo_include_todos = True + + +# -- Options for HTML output ---------------------------------------------- + +# The theme to use for HTML and HTML Help pages. See the documentation for +# a list of builtin themes. +html_theme = "alabaster" + +# Theme options are theme-specific and customize the look and feel of a theme +# further. For a list of options available for each theme, see the +# documentation. +html_theme_options = { + "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", + "github_user": "googleapis", + "github_repo": "google-cloud-python", + "github_banner": True, + "font_family": "'Roboto', Georgia, sans", + "head_font_family": "'Roboto', Georgia, serif", + "code_font_family": "'Roboto Mono', 'Consolas', monospace", +} + +# Add any paths that contain custom themes here, relative to this directory. +# html_theme_path = [] + +# The name for this set of Sphinx documents. If None, it defaults to +# " v documentation". +# html_title = None + +# A shorter title for the navigation bar. Default is the same as html_title. +# html_short_title = None + +# The name of an image file (relative to this directory) to place at the top +# of the sidebar. +# html_logo = None + +# The name of an image file (within the static path) to use as favicon of the +# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 +# pixels large. +# html_favicon = None + +# Add any paths that contain custom static files (such as style sheets) here, +# relative to this directory. They are copied after the builtin static files, +# so a file named "default.css" will overwrite the builtin "default.css". +html_static_path = ["_static"] + +# Add any extra paths that contain custom files (such as robots.txt or +# .htaccess) here, relative to this directory. These files are copied +# directly to the root of the documentation. +# html_extra_path = [] + +# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, +# using the given strftime format. +# html_last_updated_fmt = '%b %d, %Y' + +# If true, SmartyPants will be used to convert quotes and dashes to +# typographically correct entities. +# html_use_smartypants = True + +# Custom sidebar templates, maps document names to template names. +# html_sidebars = {} + +# Additional templates that should be rendered to pages, maps page names to +# template names. +# html_additional_pages = {} + +# If false, no module index is generated. +# html_domain_indices = True + +# If false, no index is generated. +# html_use_index = True + +# If true, the index is split into individual pages for each letter. +# html_split_index = False + +# If true, links to the reST sources are added to the pages. +# html_show_sourcelink = True + +# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. +# html_show_sphinx = True + +# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. +# html_show_copyright = True + +# If true, an OpenSearch description file will be output, and all pages will +# contain a tag referring to it. The value of this option must be the +# base URL from which the finished HTML is served. +# html_use_opensearch = '' + +# This is the file name suffix for HTML files (e.g. ".xhtml"). +# html_file_suffix = None + +# Language to be used for generating the HTML full-text search index. +# Sphinx supports the following languages: +# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' +# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' +# html_search_language = 'en' + +# A dictionary with options for the search language support, empty by default. +# Now only 'ja' uses this config value +# html_search_options = {'type': 'default'} + +# The name of a javascript file (relative to the configuration directory) that +# implements a search results scorer. If empty, the default will be used. +# html_search_scorer = 'scorer.js' + +# Output file base name for HTML help builder. +htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" + +# -- Options for warnings ------------------------------------------------------ + + +suppress_warnings = [ + # Temporarily suppress this to avoid "more than one target found for + # cross-reference" warning, which are intractable for us to avoid while in + # a mono-repo. + # See https://github.com/sphinx-doc/sphinx/blob + # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 + "ref.python" +] + +# -- Options for LaTeX output --------------------------------------------- + +latex_elements = { + # The paper size ('letterpaper' or 'a4paper'). + # 'papersize': 'letterpaper', + # The font size ('10pt', '11pt' or '12pt'). + # 'pointsize': '10pt', + # Additional stuff for the LaTeX preamble. + # 'preamble': '', + # Latex figure (float) alignment + # 'figure_align': 'htbp', +} + +# Grouping the document tree into LaTeX files. List of tuples +# (source start file, target name, title, +# author, documentclass [howto, manual, or own class]). +latex_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies.tex", + u"google-cloud-bigquery-datapolicies Documentation", + author, + "manual", + ) +] + +# The name of an image file (relative to this directory) to place at the top of +# the title page. +# latex_logo = None + +# For "manual" documents, if this is true, then toplevel headings are parts, +# not chapters. +# latex_use_parts = False + +# If true, show page references after internal links. +# latex_show_pagerefs = False + +# If true, show URL addresses after external links. +# latex_show_urls = False + +# Documents to append as an appendix to all manuals. +# latex_appendices = [] + +# If false, no module index is generated. +# latex_domain_indices = True + + +# -- Options for manual page output --------------------------------------- + +# One entry per manual page. List of tuples +# (source start file, name, description, authors, manual section). +man_pages = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + [author], + 1, + ) +] + +# If true, show URL addresses after external links. +# man_show_urls = False + + +# -- Options for Texinfo output ------------------------------------------- + +# Grouping the document tree into Texinfo files. List of tuples +# (source start file, target name, title, author, +# dir menu entry, description, category) +texinfo_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + author, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Library", + "APIs", + ) +] + +# Documents to append as an appendix to all manuals. +# texinfo_appendices = [] + +# If false, no module index is generated. +# texinfo_domain_indices = True + +# How to display URL addresses: 'footnote', 'no', or 'inline'. +# texinfo_show_urls = 'footnote' + +# If true, do not generate a @detailmenu in the "Top" node's menu. +# texinfo_no_detailmenu = False + + +# Example configuration for intersphinx: refer to the Python standard library. +intersphinx_mapping = { + "python": ("https://python.readthedocs.org/en/latest/", None), + "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), + "google.api_core": ( + "https://googleapis.dev/python/google-api-core/latest/", + None, + ), + "grpc": ("https://grpc.github.io/grpc/python/", None), + "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), + "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), +} + + +# Napoleon settings +napoleon_google_docstring = True +napoleon_numpy_docstring = True +napoleon_include_private_with_doc = False +napoleon_include_special_with_doc = True +napoleon_use_admonition_for_examples = False +napoleon_use_admonition_for_notes = False +napoleon_use_admonition_for_references = False +napoleon_use_ivar = False +napoleon_use_param = True +napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst new file mode 100644 index 000000000000..1cd22cd2a589 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst @@ -0,0 +1,10 @@ +.. include:: multiprocessing.rst + + +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v2/services_ + bigquery_datapolicies_v2/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst new file mode 100644 index 000000000000..536d17b2ea65 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst @@ -0,0 +1,7 @@ +.. note:: + + Because this client uses :mod:`grpc` library, it is safe to + share instances across threads. In multiprocessing scenarios, the best + practice is to create client instances *after* the invocation of + :func:`os.fork` by :class:`multiprocessing.pool.Pool` or + :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py new file mode 100644 index 000000000000..9fc7c3b9b74f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py @@ -0,0 +1,47 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies import gapic_version as package_version + +__version__ = package_version.__version__ + + +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service.client import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service.async_client import DataPolicyServiceAsyncClient + +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import AddGranteesRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import CreateDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DataMaskingPolicy +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DataPolicy +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DeleteDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import GetDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import ListDataPoliciesRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import ListDataPoliciesResponse +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import RemoveGranteesRequest +from google.cloud.bigquery_datapolicies_v2.types.datapolicy import UpdateDataPolicyRequest + +__all__ = ('DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', + 'AddGranteesRequest', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RemoveGranteesRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py new file mode 100644 index 000000000000..003a99b34841 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py @@ -0,0 +1,48 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import DataPolicyServiceClient +from .services.data_policy_service import DataPolicyServiceAsyncClient + +from .types.datapolicy import AddGranteesRequest +from .types.datapolicy import CreateDataPolicyRequest +from .types.datapolicy import DataMaskingPolicy +from .types.datapolicy import DataPolicy +from .types.datapolicy import DeleteDataPolicyRequest +from .types.datapolicy import GetDataPolicyRequest +from .types.datapolicy import ListDataPoliciesRequest +from .types.datapolicy import ListDataPoliciesResponse +from .types.datapolicy import RemoveGranteesRequest +from .types.datapolicy import UpdateDataPolicyRequest + +__all__ = ( + 'DataPolicyServiceAsyncClient', +'AddGranteesRequest', +'CreateDataPolicyRequest', +'DataMaskingPolicy', +'DataPolicy', +'DataPolicyServiceClient', +'DeleteDataPolicyRequest', +'GetDataPolicyRequest', +'ListDataPoliciesRequest', +'ListDataPoliciesResponse', +'RemoveGranteesRequest', +'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json new file mode 100644 index 000000000000..91a20781aaf6 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json @@ -0,0 +1,178 @@ + { + "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", + "language": "python", + "libraryPackage": "google.cloud.bigquery_datapolicies_v2", + "protoPackage": "google.cloud.bigquery.datapolicies.v2", + "schema": "1.0", + "services": { + "DataPolicyService": { + "clients": { + "grpc": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "grpc-async": { + "libraryClient": "DataPolicyServiceAsyncClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "rest": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + } + } + } + } +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py new file mode 100644 index 000000000000..cbf94b283c70 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py @@ -0,0 +1,15 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py new file mode 100644 index 000000000000..deca793e77bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py @@ -0,0 +1,22 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .client import DataPolicyServiceClient +from .async_client import DataPolicyServiceAsyncClient + +__all__ = ( + 'DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py new file mode 100644 index 000000000000..b742313a8cd7 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py @@ -0,0 +1,1437 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging as std_logging +from collections import OrderedDict +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union + +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + +from google.api_core.client_options import ClientOptions +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + + +try: + OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .client import DataPolicyServiceClient + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +class DataPolicyServiceAsyncClient: + """Data Policy Service provides APIs for managing the BigQuery + Data Policy. + """ + + _client: DataPolicyServiceClient + + # Copy defaults from the synchronous client for use here. + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT + DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE + _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE + + data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) + parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + policy_tag_path = staticmethod(DataPolicyServiceClient.policy_tag_path) + parse_policy_tag_path = staticmethod(DataPolicyServiceClient.parse_policy_tag_path) + routine_path = staticmethod(DataPolicyServiceClient.routine_path) + parse_routine_path = staticmethod(DataPolicyServiceClient.parse_routine_path) + common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) + parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) + parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) + common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) + parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) + parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) + parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore + + from_service_account_json = from_service_account_file + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client instance. + """ + return self._client.transport + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._client._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used + by the client instance. + """ + return self._client._universe_domain + + get_transport_class = DataPolicyServiceClient.get_transport_class + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service async client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport to use. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client = DataPolicyServiceClient( + credentials=credentials, + transport=transport, + client_options=client_options, + client_info=client_info, + + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v2.DataPolicyServiceAsyncClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._client._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "credentialsType": None, + } + ) + + async def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.CreateDataPolicyRequest, dict]]): + The request object. Request message for the + CreateDataPolicy method. + parent (:class:`str`): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (:class:`google.cloud.bigquery_datapolicies_v2.types.DataPolicy`): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy_id (:class:`str`): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + + This corresponds to the ``data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy, data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + if data_policy_id is not None: + request.data_policy_id = data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def add_grantees(self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.add_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.AddGranteesRequest, dict]]): + The request object. Request message for the AddGrantees + method. + data_policy (:class:`str`): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (:class:`MutableSequence[str]`): + Required. IAM principal that should be granted Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.AddGranteesRequest): + request = datapolicy.AddGranteesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees: + request.grantees.extend(grantees) + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.add_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def remove_grantees(self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.remove_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.RemoveGranteesRequest, dict]]): + The request object. Request message for the + RemoveGrantees method. + data_policy (:class:`str`): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (:class:`MutableSequence[str]`): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RemoveGranteesRequest): + request = datapolicy.RemoveGranteesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees: + request.grantees.extend(grantees) + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.remove_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.UpdateDataPolicyRequest, dict]]): + The request object. Request message for the + UpdateDataPolicy method. + data_policy (:class:`google.cloud.bigquery_datapolicies_v2.types.DataPolicy`): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): + Optional. The update mask applies to the resource. For + the ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.DeleteDataPolicyRequest, dict]]): + The request object. Request message for the + DeleteDataPolicy method. + name (:class:`str`): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + async def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.GetDataPolicyRequest, dict]]): + The request object. Request message for the GetDataPolicy + method. + name (:class:`str`): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest, dict]]): + The request object. Request message for the + ListDataPolicies method. + parent (:class:`str`): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__aiter__` convenience method. + response = pagers.ListDataPoliciesAsyncPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def __aenter__(self) -> "DataPolicyServiceAsyncClient": + return self + + async def __aexit__(self, exc_type, exc, tb): + await self.transport.close() + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +__all__ = ( + "DataPolicyServiceAsyncClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py new file mode 100644 index 000000000000..82e9a9ebb9ab --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py @@ -0,0 +1,1812 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from http import HTTPStatus +import json +import logging as std_logging +import os +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +import warnings + +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + +from google.api_core import client_options as client_options_lib +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc import DataPolicyServiceGrpcTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .transports.rest import DataPolicyServiceRestTransport + + +class DataPolicyServiceClientMeta(type): + """Metaclass for the DataPolicyService client. + + This provides class-level methods for building and retrieving + support objects (e.g. transport) without polluting the client instance + objects. + """ + _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + _transport_registry["grpc"] = DataPolicyServiceGrpcTransport + _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport + _transport_registry["rest"] = DataPolicyServiceRestTransport + + def get_transport_class(cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: + """Returns an appropriate transport class. + + Args: + label: The name of the desired transport. If none is + provided, then the first transport in the registry is used. + + Returns: + The transport class to use. + """ + # If a specific transport is requested, return that one. + if label: + return cls._transport_registry[label] + + # No transport is requested; return the default (that is, the first one + # in the dictionary). + return next(iter(cls._transport_registry.values())) + + +class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): + """Data Policy Service provides APIs for managing the BigQuery + Data Policy. + """ + + @staticmethod + def _get_default_mtls_endpoint(api_endpoint): + """Converts api endpoint to mTLS endpoint. + + Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to + "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. + Args: + api_endpoint (Optional[str]): the api endpoint to convert. + Returns: + str: converted mTLS api endpoint. + """ + if not api_endpoint: + return api_endpoint + + mtls_endpoint_re = re.compile( + r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" + ) + + m = mtls_endpoint_re.match(api_endpoint) + name, mtls, sandbox, googledomain = m.groups() + if mtls or not googledomain: + return api_endpoint + + if sandbox: + return api_endpoint.replace( + "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" + ) + + return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") + + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" + DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore + DEFAULT_ENDPOINT + ) + + _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" + _DEFAULT_UNIVERSE = "googleapis.com" + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_info(info) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_file( + filename) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + from_service_account_json = from_service_account_file + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client + instance. + """ + return self._transport + + @staticmethod + def data_policy_path(project: str,location: str,data_policy: str,) -> str: + """Returns a fully-qualified data_policy string.""" + return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + + @staticmethod + def parse_data_policy_path(path: str) -> Dict[str,str]: + """Parses a data_policy path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def policy_tag_path(project: str,location: str,taxonomy: str,policy_tag: str,) -> str: + """Returns a fully-qualified policy_tag string.""" + return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + + @staticmethod + def parse_policy_tag_path(path: str) -> Dict[str,str]: + """Parses a policy_tag path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def routine_path(project: str,dataset: str,routine: str,) -> str: + """Returns a fully-qualified routine string.""" + return "projects/{project}/datasets/{dataset}/routines/{routine}".format(project=project, dataset=dataset, routine=routine, ) + + @staticmethod + def parse_routine_path(path: str) -> Dict[str,str]: + """Parses a routine path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/datasets/(?P.+?)/routines/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_billing_account_path(billing_account: str, ) -> str: + """Returns a fully-qualified billing_account string.""" + return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + + @staticmethod + def parse_common_billing_account_path(path: str) -> Dict[str,str]: + """Parse a billing_account path into its component segments.""" + m = re.match(r"^billingAccounts/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_folder_path(folder: str, ) -> str: + """Returns a fully-qualified folder string.""" + return "folders/{folder}".format(folder=folder, ) + + @staticmethod + def parse_common_folder_path(path: str) -> Dict[str,str]: + """Parse a folder path into its component segments.""" + m = re.match(r"^folders/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_organization_path(organization: str, ) -> str: + """Returns a fully-qualified organization string.""" + return "organizations/{organization}".format(organization=organization, ) + + @staticmethod + def parse_common_organization_path(path: str) -> Dict[str,str]: + """Parse a organization path into its component segments.""" + m = re.match(r"^organizations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_project_path(project: str, ) -> str: + """Returns a fully-qualified project string.""" + return "projects/{project}".format(project=project, ) + + @staticmethod + def parse_common_project_path(path: str) -> Dict[str,str]: + """Parse a project path into its component segments.""" + m = re.match(r"^projects/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_location_path(project: str, location: str, ) -> str: + """Returns a fully-qualified location string.""" + return "projects/{project}/locations/{location}".format(project=project, location=location, ) + + @staticmethod + def parse_common_location_path(path: str) -> Dict[str,str]: + """Parse a location path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + """Deprecated. Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + + warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning) + if client_options is None: + client_options = client_options_lib.ClientOptions() + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + + # Figure out the client cert source to use. + client_cert_source = None + if use_client_cert == "true": + if client_options.client_cert_source: + client_cert_source = client_options.client_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + + # Figure out which api endpoint to use. + if client_options.api_endpoint is not None: + api_endpoint = client_options.api_endpoint + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + api_endpoint = cls.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = cls.DEFAULT_ENDPOINT + + return api_endpoint, client_cert_source + + @staticmethod + def _read_environment_variables(): + """Returns the environment variables used by the client. + + Returns: + Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, + GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. + + Raises: + ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not + any of ["true", "false"]. + google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT + is not any of ["auto", "never", "always"]. + """ + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() + universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + return use_client_cert == "true", use_mtls_endpoint, universe_domain_env + + @staticmethod + def _get_client_cert_source(provided_cert_source, use_cert_flag): + """Return the client cert source to be used by the client. + + Args: + provided_cert_source (bytes): The client certificate source provided. + use_cert_flag (bool): A flag indicating whether to use the client certificate. + + Returns: + bytes or None: The client cert source to be used by the client. + """ + client_cert_source = None + if use_cert_flag: + if provided_cert_source: + client_cert_source = provided_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + return client_cert_source + + @staticmethod + def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + """Return the API endpoint used by the client. + + Args: + api_override (str): The API endpoint override. If specified, this is always + the return value of this function and the other arguments are not used. + client_cert_source (bytes): The client certificate source used by the client. + universe_domain (str): The universe domain used by the client. + use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. + Possible values are "always", "auto", or "never". + + Returns: + str: The API endpoint to be used by the client. + """ + if api_override is not None: + api_endpoint = api_override + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + if universe_domain != _default_universe: + raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + return api_endpoint + + @staticmethod + def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + """Return the universe domain used by the client. + + Args: + client_universe_domain (Optional[str]): The universe domain configured via the client options. + universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. + + Returns: + str: The universe domain to be used by the client. + + Raises: + ValueError: If the universe domain is an empty string. + """ + universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE + if client_universe_domain is not None: + universe_domain = client_universe_domain + elif universe_domain_env is not None: + universe_domain = universe_domain_env + if len(universe_domain.strip()) == 0: + raise ValueError("Universe Domain cannot be an empty string.") + return universe_domain + + def _validate_universe_domain(self): + """Validates client's and credentials' universe domains are consistent. + + Returns: + bool: True iff the configured universe domain is valid. + + Raises: + ValueError: If the configured universe domain is not valid. + """ + + # NOTE (b/349488459): universe validation is disabled until further notice. + return True + + def _add_cred_info_for_auth_errors( + self, + error: core_exceptions.GoogleAPICallError + ) -> None: + """Adds credential info string to error details for 401/403/404 errors. + + Args: + error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. + """ + if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + return + + cred = self._transport._credentials + + # get_cred_info is only available in google-auth>=2.35.0 + if not hasattr(cred, "get_cred_info"): + return + + # ignore the type check since pypy test fails when get_cred_info + # is not available + cred_info = cred.get_cred_info() # type: ignore + if cred_info and hasattr(error._details, "append"): + error._details.append(json.dumps(cred_info)) + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used by the client instance. + """ + return self._universe_domain + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that the ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client_options = client_options + if isinstance(self._client_options, dict): + self._client_options = client_options_lib.from_dict(self._client_options) + if self._client_options is None: + self._client_options = client_options_lib.ClientOptions() + self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + + universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + + self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) + self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) + self._api_endpoint = None # updated below, depending on `transport` + + # Initialize the universe domain validation. + self._is_universe_domain_valid = False + + if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER + # Setup logging. + client_logging.initialize_logging() + + api_key_value = getattr(self._client_options, "api_key", None) + if api_key_value and credentials: + raise ValueError("client_options.api_key and credentials are mutually exclusive") + + # Save or instantiate the transport. + # Ordinarily, we provide the transport, but allowing a custom transport + # instance provides an extensibility point for unusual situations. + transport_provided = isinstance(transport, DataPolicyServiceTransport) + if transport_provided: + # transport is a DataPolicyServiceTransport instance. + if credentials or self._client_options.credentials_file or api_key_value: + raise ValueError("When providing a transport instance, " + "provide its credentials directly.") + if self._client_options.scopes: + raise ValueError( + "When providing a transport instance, provide its scopes " + "directly." + ) + self._transport = cast(DataPolicyServiceTransport, transport) + self._api_endpoint = self._transport.host + + self._api_endpoint = (self._api_endpoint or + DataPolicyServiceClient._get_api_endpoint( + self._client_options.api_endpoint, + self._client_cert_source, + self._universe_domain, + self._use_mtls_endpoint)) + + if not transport_provided: + import google.auth._default # type: ignore + + if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): + credentials = google.auth._default.get_api_key_credentials(api_key_value) + + transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + DataPolicyServiceClient.get_transport_class(transport) + if isinstance(transport, str) or transport is None + else cast(Callable[..., DataPolicyServiceTransport], transport) + ) + # initialize with the provided callable or the passed in class + self._transport = transport_init( + credentials=credentials, + credentials_file=self._client_options.credentials_file, + host=self._api_endpoint, + scopes=self._client_options.scopes, + client_cert_source_for_mtls=self._client_cert_source, + quota_project_id=self._client_options.quota_project_id, + client_info=client_info, + always_use_jwt_access=True, + api_audience=self._client_options.api_audience, + ) + + if "async" not in str(self._transport): + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "credentialsType": None, + } + ) + + def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.CreateDataPolicyRequest, dict]): + The request object. Request message for the + CreateDataPolicy method. + parent (str): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (google.cloud.bigquery_datapolicies_v2.types.DataPolicy): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy_id (str): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + + This corresponds to the ``data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy, data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + if data_policy_id is not None: + request.data_policy_id = data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def add_grantees(self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.add_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.AddGranteesRequest, dict]): + The request object. Request message for the AddGrantees + method. + data_policy (str): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (MutableSequence[str]): + Required. IAM principal that should be granted Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.AddGranteesRequest): + request = datapolicy.AddGranteesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees is not None: + request.grantees = grantees + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.add_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def remove_grantees(self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.remove_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.RemoveGranteesRequest, dict]): + The request object. Request message for the + RemoveGrantees method. + data_policy (str): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (MutableSequence[str]): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RemoveGranteesRequest): + request = datapolicy.RemoveGranteesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees is not None: + request.grantees = grantees + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.remove_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.UpdateDataPolicyRequest, dict]): + The request object. Request message for the + UpdateDataPolicy method. + data_policy (google.cloud.bigquery_datapolicies_v2.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + Optional. The update mask applies to the resource. For + the ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.DeleteDataPolicyRequest, dict]): + The request object. Request message for the + DeleteDataPolicy method. + name (str): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.GetDataPolicyRequest, dict]): + The request object. Request message for the GetDataPolicy + method. + name (str): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + + def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest, dict]): + The request object. Request message for the + ListDataPolicies method. + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2.services.data_policy_service.pagers.ListDataPoliciesPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__iter__` convenience method. + response = pagers.ListDataPoliciesPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def __enter__(self) -> "DataPolicyServiceClient": + return self + + def __exit__(self, type, value, traceback): + """Releases underlying transport's resources. + + .. warning:: + ONLY use as a context manager if the transport is NOT shared + with other clients! Exiting the with block will CLOSE the transport + and may cause errors in other clients! + """ + self.transport.close() + + + + + + + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + +__all__ = ( + "DataPolicyServiceClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py new file mode 100644 index 000000000000..bb0f8ad8dc28 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py @@ -0,0 +1,166 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.api_core import retry_async as retries_async +from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy + + +class ListDataPoliciesPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse` object, and + provides an ``__iter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__iter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiate the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.Retry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + + def __iter__(self) -> Iterator[datapolicy.DataPolicy]: + for page in self.pages: + yield from page.data_policies + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + + +class ListDataPoliciesAsyncPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse` object, and + provides an ``__aiter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__aiter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiates the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.AsyncRetry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: + async def async_generator(): + async for page in self.pages: + for response in page.data_policies: + yield response + + return async_generator() + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst new file mode 100644 index 000000000000..b83d156af245 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst @@ -0,0 +1,9 @@ + +transport inheritance structure +_______________________________ + +`DataPolicyServiceTransport` is the ABC for all transports. +- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). +- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). +- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). +- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py new file mode 100644 index 000000000000..2c95ef809668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py @@ -0,0 +1,38 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from typing import Dict, Type + +from .base import DataPolicyServiceTransport +from .grpc import DataPolicyServiceGrpcTransport +from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .rest import DataPolicyServiceRestTransport +from .rest import DataPolicyServiceRestInterceptor + + +# Compile a registry of transports. +_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] +_transport_registry['grpc'] = DataPolicyServiceGrpcTransport +_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry['rest'] = DataPolicyServiceRestTransport + +__all__ = ( + 'DataPolicyServiceTransport', + 'DataPolicyServiceGrpcTransport', + 'DataPolicyServiceGrpcAsyncIOTransport', + 'DataPolicyServiceRestTransport', + 'DataPolicyServiceRestInterceptor', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py new file mode 100644 index 000000000000..173ff4780171 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py @@ -0,0 +1,399 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import abc +from typing import Awaitable, Callable, Dict, Optional, Sequence, Union + +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + +import google.auth # type: ignore +import google.api_core +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceTransport(abc.ABC): + """Abstract transport class for DataPolicyService.""" + + AUTH_SCOPES = ( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', + ) + + DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + + def __init__( + self, *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A list of scopes. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + """ + + scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} + + # Save the scopes. + self._scopes = scopes + if not hasattr(self, "_ignore_credentials"): + self._ignore_credentials: bool = False + + # If no credentials are provided, then determine the appropriate + # defaults. + if credentials and credentials_file: + raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + + if credentials_file is not None: + credentials, _ = google.auth.load_credentials_from_file( + credentials_file, + **scopes_kwargs, + quota_project_id=quota_project_id + ) + elif credentials is None and not self._ignore_credentials: + credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + # Don't apply audience if the credentials file passed from user. + if hasattr(credentials, "with_gdch_audience"): + credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + + # If the credentials are service account credentials, then always try to use self signed JWT. + if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + credentials = credentials.with_always_use_jwt_access(True) + + # Save the credentials. + self._credentials = credentials + + # Save the hostname. Default to port 443 (HTTPS) if none is specified. + if ':' not in host: + host += ':443' + self._host = host + + @property + def host(self): + return self._host + + def _prep_wrapped_messages(self, client_info): + # Precompute the wrapped methods. + self._wrapped_methods = { + self.create_data_policy: gapic_v1.method.wrap_method( + self.create_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.add_grantees: gapic_v1.method.wrap_method( + self.add_grantees, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.remove_grantees: gapic_v1.method.wrap_method( + self.remove_grantees, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.update_data_policy: gapic_v1.method.wrap_method( + self.update_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.delete_data_policy: gapic_v1.method.wrap_method( + self.delete_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_data_policy: gapic_v1.method.wrap_method( + self.get_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.list_data_policies: gapic_v1.method.wrap_method( + self.list_data_policies, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_iam_policy: gapic_v1.method.wrap_method( + self.get_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.set_iam_policy: gapic_v1.method.wrap_method( + self.set_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.test_iam_permissions: gapic_v1.method.wrap_method( + self.test_iam_permissions, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + } + + def close(self): + """Closes resources associated with the transport. + + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! + """ + raise NotImplementedError() + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[ + empty_pb2.Empty, + Awaitable[empty_pb2.Empty] + ]]: + raise NotImplementedError() + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse] + ]]: + raise NotImplementedError() + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse] + ]]: + raise NotImplementedError() + + @property + def kind(self) -> str: + raise NotImplementedError() + + +__all__ = ( + 'DataPolicyServiceTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py new file mode 100644 index 000000000000..b25e0df3504e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py @@ -0,0 +1,598 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json +import logging as std_logging +import pickle +import warnings +from typing import Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import grpc_helpers +from google.api_core import gapic_v1 +import google.auth # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER + def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = response.result() + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response for {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": client_call_details.method, + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): + """gRPC backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + _stubs: Dict[str, Callable] + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if a ``channel`` instance is provided. + channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, grpc.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientInterceptor() + self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> grpc.Channel: + """Create and return a gRPC channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + grpc.Channel: A gRPC channel object. + + Raises: + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + + return grpc_helpers.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + @property + def grpc_channel(self) -> grpc.Channel: + """Return the channel designed to connect to this service. + """ + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the add grantees method over gRPC. + + Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + Returns: + Callable[[~.AddGranteesRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'add_grantees' not in self._stubs: + self._stubs['add_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees', + request_serializer=datapolicy.AddGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['add_grantees'] + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the remove grantees method over gRPC. + + Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + Returns: + Callable[[~.RemoveGranteesRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'remove_grantees' not in self._stubs: + self._stubs['remove_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees', + request_serializer=datapolicy.RemoveGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['remove_grantees'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + ~.Empty]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + ~.ListDataPoliciesResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + ~.TestIamPermissionsResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def close(self): + self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc" + + +__all__ = ( + 'DataPolicyServiceGrpcTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py new file mode 100644 index 000000000000..e15854aae44c --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py @@ -0,0 +1,774 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import inspect +import json +import pickle +import logging as std_logging +import warnings +from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers_async +from google.api_core import exceptions as core_exceptions +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore +from grpc.experimental import aio # type: ignore + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .grpc import DataPolicyServiceGrpcTransport + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER + async def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = await continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = await response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = await response + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response to rpc {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": str(client_call_details.method), + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): + """gRPC AsyncIO backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + + _grpc_channel: aio.Channel + _stubs: Dict[str, Callable] = {} + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> aio.Channel: + """Create and return a gRPC AsyncIO channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + aio.Channel: A gRPC AsyncIO channel object. + """ + + return grpc_helpers_async.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, aio.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientAIOInterceptor() + self._grpc_channel._unary_unary_interceptors.append(self._interceptor) + self._logged_channel = self._grpc_channel + self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @property + def grpc_channel(self) -> aio.Channel: + """Create the channel designed to connect to this service. + + This property caches on the instance; repeated calls return + the same channel. + """ + # Return the channel from cache. + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the add grantees method over gRPC. + + Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + Returns: + Callable[[~.AddGranteesRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'add_grantees' not in self._stubs: + self._stubs['add_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees', + request_serializer=datapolicy.AddGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['add_grantees'] + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the remove grantees method over gRPC. + + Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + Returns: + Callable[[~.RemoveGranteesRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'remove_grantees' not in self._stubs: + self._stubs['remove_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees', + request_serializer=datapolicy.RemoveGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['remove_grantees'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Awaitable[empty_pb2.Empty]]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + Awaitable[~.Empty]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse]]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + Awaitable[~.ListDataPoliciesResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + Awaitable[~.TestIamPermissionsResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def _prep_wrapped_messages(self, client_info): + """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + self._wrapped_methods = { + self.create_data_policy: self._wrap_method( + self.create_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.add_grantees: self._wrap_method( + self.add_grantees, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.remove_grantees: self._wrap_method( + self.remove_grantees, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.update_data_policy: self._wrap_method( + self.update_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.delete_data_policy: self._wrap_method( + self.delete_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_data_policy: self._wrap_method( + self.get_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.list_data_policies: self._wrap_method( + self.list_data_policies, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_iam_policy: self._wrap_method( + self.get_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.set_iam_policy: self._wrap_method( + self.set_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.test_iam_permissions: self._wrap_method( + self.test_iam_permissions, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + } + + def _wrap_method(self, func, *args, **kwargs): + if self._wrap_with_kind: # pragma: NO COVER + kwargs["kind"] = self.kind + return gapic_v1.method_async.wrap_method(func, *args, **kwargs) + + def close(self): + return self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc_asyncio" + + +__all__ = ( + 'DataPolicyServiceGrpcAsyncIOTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py new file mode 100644 index 000000000000..25ff8efd6094 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py @@ -0,0 +1,2008 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging +import json # type: ignore + +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.api_core import rest_helpers +from google.api_core import rest_streaming +from google.api_core import gapic_v1 +import google.protobuf + +from google.protobuf import json_format + +from requests import __version__ as requests_version +import dataclasses +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +from .rest_base import _BaseDataPolicyServiceRestTransport +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = logging.getLogger(__name__) + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=f"requests@{requests_version}", +) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceRestInterceptor: + """Interceptor for DataPolicyService. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the DataPolicyServiceRestTransport. + + .. code-block:: python + class MyCustomDataPolicyServiceInterceptor(DataPolicyServiceRestInterceptor): + def pre_add_grantees(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_add_grantees(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_create_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_delete_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def pre_get_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_get_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_data_policies(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_data_policies(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_remove_grantees(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_remove_grantees(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_set_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_set_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_test_iam_permissions(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_test_iam_permissions(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_update_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + transport = DataPolicyServiceRestTransport(interceptor=MyCustomDataPolicyServiceInterceptor()) + client = DataPolicyServiceClient(transport=transport) + + + """ + def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for add_grantees + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for add_grantees + + DEPRECATED. Please use the `post_add_grantees_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_add_grantees` interceptor runs + before the `post_add_grantees_with_metadata` interceptor. + """ + return response + + def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for add_grantees + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_add_grantees_with_metadata` + interceptor in new development instead of the `post_add_grantees` interceptor. + When both interceptors are used, this `post_add_grantees_with_metadata` interceptor runs after the + `post_add_grantees` interceptor. The (possibly modified) response returned by + `post_add_grantees` will be passed to + `post_add_grantees_with_metadata`. + """ + return response, metadata + + def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for create_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for create_data_policy + + DEPRECATED. Please use the `post_create_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_create_data_policy` interceptor runs + before the `post_create_data_policy_with_metadata` interceptor. + """ + return response + + def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for create_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_create_data_policy_with_metadata` + interceptor in new development instead of the `post_create_data_policy` interceptor. + When both interceptors are used, this `post_create_data_policy_with_metadata` interceptor runs after the + `post_create_data_policy` interceptor. The (possibly modified) response returned by + `post_create_data_policy` will be passed to + `post_create_data_policy_with_metadata`. + """ + return response, metadata + + def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for delete_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for get_data_policy + + DEPRECATED. Please use the `post_get_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_data_policy` interceptor runs + before the `post_get_data_policy_with_metadata` interceptor. + """ + return response + + def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_data_policy_with_metadata` + interceptor in new development instead of the `post_get_data_policy` interceptor. + When both interceptors are used, this `post_get_data_policy_with_metadata` interceptor runs after the + `post_get_data_policy` interceptor. The (possibly modified) response returned by + `post_get_data_policy` will be passed to + `post_get_data_policy_with_metadata`. + """ + return response, metadata + + def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for get_iam_policy + + DEPRECATED. Please use the `post_get_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_iam_policy` interceptor runs + before the `post_get_iam_policy_with_metadata` interceptor. + """ + return response + + def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_iam_policy_with_metadata` + interceptor in new development instead of the `post_get_iam_policy` interceptor. + When both interceptors are used, this `post_get_iam_policy_with_metadata` interceptor runs after the + `post_get_iam_policy` interceptor. The (possibly modified) response returned by + `post_get_iam_policy` will be passed to + `post_get_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for list_data_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: + """Post-rpc interceptor for list_data_policies + + DEPRECATED. Please use the `post_list_data_policies_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_list_data_policies` interceptor runs + before the `post_list_data_policies_with_metadata` interceptor. + """ + return response + + def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for list_data_policies + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_list_data_policies_with_metadata` + interceptor in new development instead of the `post_list_data_policies` interceptor. + When both interceptors are used, this `post_list_data_policies_with_metadata` interceptor runs after the + `post_list_data_policies` interceptor. The (possibly modified) response returned by + `post_list_data_policies` will be passed to + `post_list_data_policies_with_metadata`. + """ + return response, metadata + + def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for remove_grantees + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for remove_grantees + + DEPRECATED. Please use the `post_remove_grantees_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_remove_grantees` interceptor runs + before the `post_remove_grantees_with_metadata` interceptor. + """ + return response + + def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for remove_grantees + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_remove_grantees_with_metadata` + interceptor in new development instead of the `post_remove_grantees` interceptor. + When both interceptors are used, this `post_remove_grantees_with_metadata` interceptor runs after the + `post_remove_grantees` interceptor. The (possibly modified) response returned by + `post_remove_grantees` will be passed to + `post_remove_grantees_with_metadata`. + """ + return response, metadata + + def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for set_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for set_iam_policy + + DEPRECATED. Please use the `post_set_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_set_iam_policy` interceptor runs + before the `post_set_iam_policy_with_metadata` interceptor. + """ + return response + + def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for set_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_set_iam_policy_with_metadata` + interceptor in new development instead of the `post_set_iam_policy` interceptor. + When both interceptors are used, this `post_set_iam_policy_with_metadata` interceptor runs after the + `post_set_iam_policy` interceptor. The (possibly modified) response returned by + `post_set_iam_policy` will be passed to + `post_set_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for test_iam_permissions + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: + """Post-rpc interceptor for test_iam_permissions + + DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_test_iam_permissions` interceptor runs + before the `post_test_iam_permissions_with_metadata` interceptor. + """ + return response + + def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for test_iam_permissions + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_test_iam_permissions_with_metadata` + interceptor in new development instead of the `post_test_iam_permissions` interceptor. + When both interceptors are used, this `post_test_iam_permissions_with_metadata` interceptor runs after the + `post_test_iam_permissions` interceptor. The (possibly modified) response returned by + `post_test_iam_permissions` will be passed to + `post_test_iam_permissions_with_metadata`. + """ + return response, metadata + + def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for update_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for update_data_policy + + DEPRECATED. Please use the `post_update_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_update_data_policy` interceptor runs + before the `post_update_data_policy_with_metadata` interceptor. + """ + return response + + def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for update_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_update_data_policy_with_metadata` + interceptor in new development instead of the `post_update_data_policy` interceptor. + When both interceptors are used, this `post_update_data_policy_with_metadata` interceptor runs after the + `post_update_data_policy` interceptor. The (possibly modified) response returned by + `post_update_data_policy` will be passed to + `post_update_data_policy_with_metadata`. + """ + return response, metadata + + +@dataclasses.dataclass +class DataPolicyServiceRestStub: + _session: AuthorizedSession + _host: str + _interceptor: DataPolicyServiceRestInterceptor + + +class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): + """REST backend synchronous transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[ + ], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + interceptor: Optional[DataPolicyServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + url_scheme=url_scheme, + api_audience=api_audience + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST) + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or DataPolicyServiceRestInterceptor() + self._prep_wrapped_messages(client_info) + + class _AddGrantees(_BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.AddGrantees") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.AddGranteesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the add grantees method over HTTP. + + Args: + request (~.datapolicy.AddGranteesRequest): + The request object. Request message for the AddGrantees + method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + + request, metadata = self._interceptor.pre_add_grantees(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.AddGrantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "AddGrantees", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._AddGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_add_grantees(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_add_grantees_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.add_grantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "AddGrantees", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.CreateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.CreateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the create data policy method over HTTP. + + Args: + request (~.datapolicy.CreateDataPolicyRequest): + The request object. Request message for the + CreateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_create_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.CreateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "CreateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_create_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.create_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "CreateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.DeleteDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ): + r"""Call the delete data policy method over HTTP. + + Args: + request (~.datapolicy.DeleteDataPolicyRequest): + The request object. Request message for the + DeleteDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.DeleteDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "DeleteDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.GetDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the get data policy method over HTTP. + + Args: + request (~.datapolicy.GetDataPolicyRequest): + The request object. Request message for the GetDataPolicy + method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.GetDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "GetDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.get_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "GetDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.GetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the get iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.GetIamPolicyRequest): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.GetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "GetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.get_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "GetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.ListDataPolicies") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.ListDataPoliciesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.ListDataPoliciesResponse: + r"""Call the list data policies method over HTTP. + + Args: + request (~.datapolicy.ListDataPoliciesRequest): + The request object. Request message for the + ListDataPolicies method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.ListDataPoliciesResponse: + Response message for the + ListDataPolicies method. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + + request, metadata = self._interceptor.pre_list_data_policies(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.ListDataPolicies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "ListDataPolicies", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.ListDataPoliciesResponse() + pb_resp = datapolicy.ListDataPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_list_data_policies(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.list_data_policies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "ListDataPolicies", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _RemoveGrantees(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.RemoveGrantees") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.RemoveGranteesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the remove grantees method over HTTP. + + Args: + request (~.datapolicy.RemoveGranteesRequest): + The request object. Request message for the + RemoveGrantees method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + + request, metadata = self._interceptor.pre_remove_grantees(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.RemoveGrantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "RemoveGrantees", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._RemoveGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_remove_grantees(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_remove_grantees_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.remove_grantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "RemoveGrantees", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.SetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.SetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the set iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.SetIamPolicyRequest): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.SetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "SetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_set_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.set_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "SetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.TestIamPermissions") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.TestIamPermissionsRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Call the test iam permissions method over HTTP. + + Args: + request (~.iam_policy_pb2.TestIamPermissionsRequest): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.iam_policy_pb2.TestIamPermissionsResponse: + Response message for ``TestIamPermissions`` method. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + + request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.TestIamPermissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "TestIamPermissions", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = iam_policy_pb2.TestIamPermissionsResponse() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_test_iam_permissions(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.test_iam_permissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "TestIamPermissions", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.UpdateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the update data policy method over HTTP. + + Args: + request (~.datapolicy.UpdateDataPolicyRequest): + The request object. Request message for the + UpdateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_update_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.UpdateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_update_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.update_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__=( + 'DataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py new file mode 100644 index 000000000000..a0c18a96c174 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py @@ -0,0 +1,534 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json # type: ignore +from google.api_core import path_template +from google.api_core import gapic_v1 + +from google.protobuf import json_format +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +import re +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union + + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): + """Base REST backend transport for DataPolicyService. + + Note: This class is not meant to be used directly. Use its sync and + async sub-classes instead. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[Any] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[Any]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience + ) + + class _BaseAddGrantees: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.AddGranteesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseCreateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{parent=projects/*/locations/*}/dataPolicies', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.CreateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseDeleteDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'delete', + 'uri': '/v2/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.DeleteDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v2/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.GetDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseListDataPolicies: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v2/{parent=projects/*/locations/*}/dataPolicies', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.ListDataPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseRemoveGrantees: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.RemoveGranteesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseSetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseTestIamPermissions: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseUpdateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'patch', + 'uri': '/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}', + 'body': 'data_policy', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.UpdateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + +__all__=( + '_BaseDataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py new file mode 100644 index 000000000000..b090af352c68 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py @@ -0,0 +1,40 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .datapolicy import ( + AddGranteesRequest, + CreateDataPolicyRequest, + DataMaskingPolicy, + DataPolicy, + DeleteDataPolicyRequest, + GetDataPolicyRequest, + ListDataPoliciesRequest, + ListDataPoliciesResponse, + RemoveGranteesRequest, + UpdateDataPolicyRequest, +) + +__all__ = ( + 'AddGranteesRequest', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RemoveGranteesRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py new file mode 100644 index 000000000000..8c88d06257e2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py @@ -0,0 +1,543 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from __future__ import annotations + +from typing import MutableMapping, MutableSequence + +import proto # type: ignore + +from google.protobuf import field_mask_pb2 # type: ignore + + +__protobuf__ = proto.module( + package='google.cloud.bigquery.datapolicies.v2', + manifest={ + 'CreateDataPolicyRequest', + 'UpdateDataPolicyRequest', + 'AddGranteesRequest', + 'RemoveGranteesRequest', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'DataPolicy', + 'DataMaskingPolicy', + }, +) + + +class CreateDataPolicyRequest(proto.Message): + r"""Request message for the CreateDataPolicy method. + + Attributes: + parent (str): + Required. Resource name of the project that the data policy + will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + data_policy_id (str): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + data_policy (google.cloud.bigquery_datapolicies_v2.types.DataPolicy): + Required. The data policy to create. The ``name`` field does + not need to be provided for the data policy creation. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=2, + ) + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=3, + message='DataPolicy', + ) + + +class UpdateDataPolicyRequest(proto.Message): + r"""Request message for the UpdateDataPolicy method. + + Attributes: + data_policy (google.cloud.bigquery_datapolicies_v2.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` field. + Other fields are updated to the specified values based on + the field masks. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + Optional. The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are allowed + to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are not + allowed. + allow_missing (bool): + Optional. If set to true, and the data policy is not found, + a new data policy will be created. In this situation, + update_mask is ignored. + """ + + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + update_mask: field_mask_pb2.FieldMask = proto.Field( + proto.MESSAGE, + number=2, + message=field_mask_pb2.FieldMask, + ) + allow_missing: bool = proto.Field( + proto.BOOL, + number=3, + ) + + +class AddGranteesRequest(proto.Message): + r"""Request message for the AddGrantees method. + + Attributes: + data_policy (str): + Required. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + grantees (MutableSequence[str]): + Required. IAM principal that should be granted Fine Grained + Access to the underlying data goverened by the data policy. + The target data policy is determined by the ``data_policy`` + field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + """ + + data_policy: str = proto.Field( + proto.STRING, + number=1, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=2, + ) + + +class RemoveGranteesRequest(proto.Message): + r"""Request message for the RemoveGrantees method. + + Attributes: + data_policy (str): + Required. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + grantees (MutableSequence[str]): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the data + policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + """ + + data_policy: str = proto.Field( + proto.STRING, + number=1, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=2, + ) + + +class DeleteDataPolicyRequest(proto.Message): + r"""Request message for the DeleteDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the data policy to delete. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class GetDataPolicyRequest(proto.Message): + r"""Request message for the GetDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the requested data policy. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class ListDataPoliciesRequest(proto.Message): + r"""Request message for the ListDataPolicies method. + + Attributes: + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + page_size (int): + Optional. The maximum number of data policies + to return. Must be a value between 1 and 1000. + If not set, defaults to 50. + page_token (str): + Optional. The ``nextPageToken`` value returned from a + previous list request, if any. If not set, defaults to an + empty string. + filter (str): + Optional. Filters the data policies by policy tags that they + are associated with. Currently filter only supports + "policy_tag" based filtering and OR based predicates. Sample + filter can be "policy_tag: + projects/1/locations/us/taxonomies/2/policyTags/3". You may + also use wildcard such as "policy_tag: + projects/1/locations/us/taxonomies/2*". Please note that OR + predicates cannot be used with wildcard filters. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + page_size: int = proto.Field( + proto.INT32, + number=2, + ) + page_token: str = proto.Field( + proto.STRING, + number=3, + ) + filter: str = proto.Field( + proto.STRING, + number=4, + ) + + +class ListDataPoliciesResponse(proto.Message): + r"""Response message for the ListDataPolicies method. + + Attributes: + data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v2.types.DataPolicy]): + Data policies that belong to the requested + project. + next_page_token (str): + Token used to retrieve the next page of + results, or empty if there are no more results. + """ + + @property + def raw_page(self): + return self + + data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + next_page_token: str = proto.Field( + proto.STRING, + number=2, + ) + + +class DataPolicy(proto.Message): + r"""Represents the label-policy binding. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + data_masking_policy (google.cloud.bigquery_datapolicies_v2.types.DataMaskingPolicy): + Optional. The data masking policy that specifies the data + masking rule to use. It must be set if the data policy type + is DATA_MASKING_POLICY. + + This field is a member of `oneof`_ ``policy``. + name (str): + Identifier. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + data_policy_id (str): + Output only. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + etag (str): + The etag for this Data Policy. + This field is used for UpdateDataPolicy calls. + If Data Policy exists, this field is required + and must match the server's etag. It will also + be populated in the response of GetDataPolicy, + CreateDataPolicy, and UpdateDataPolicy calls. + + This field is a member of `oneof`_ ``_etag``. + data_policy_type (google.cloud.bigquery_datapolicies_v2.types.DataPolicy.DataPolicyType): + Required. Type of data policy. + policy_tag (str): + Output only. Policy tag resource name, in the format of + ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. + policy_tag is supported only for V1 data policies. + grantees (MutableSequence[str]): + Optional. The list of IAM principals that have Fine Grained + Access to the underlying data goverened by this data policy. + + Uses the `IAM V2 principal + syntax `__ + Only supports principal types users, groups, + serviceaccounts, cloudidentity. This field is supported in + V2 Data Policy only. In case of V1 data policies (i.e. + verion = 1 and policy_tag is set), this field is not + populated. + version (google.cloud.bigquery_datapolicies_v2.types.DataPolicy.Version): + Output only. The version of the Data Policy + resource. + """ + class DataPolicyType(proto.Enum): + r"""A list of supported data policy types. + + Values: + DATA_POLICY_TYPE_UNSPECIFIED (0): + Default value for the data policy type. This + should not be used. + DATA_MASKING_POLICY (1): + Used to create a data policy for data + masking. + RAW_DATA_ACCESS_POLICY (2): + Used to create a data policy for raw data + access. + COLUMN_LEVEL_SECURITY_POLICY (3): + Used to create a data policy for column-level + security, without data masking. This is + deprecated in V2 api and only present to support + GET and LIST operations for V1 data policies in + V2 api. + """ + DATA_POLICY_TYPE_UNSPECIFIED = 0 + DATA_MASKING_POLICY = 1 + RAW_DATA_ACCESS_POLICY = 2 + COLUMN_LEVEL_SECURITY_POLICY = 3 + + class Version(proto.Enum): + r"""The supported versions for the Data Policy resource. + + Values: + VERSION_UNSPECIFIED (0): + Default value for the data policy version. + This should not be used. + V1 (1): + V1 data policy version. V1 Data Policies will + be present in V2 List api response, but can not + be created/updated/deleted from V2 api. + V2 (2): + V2 data policy version. + """ + VERSION_UNSPECIFIED = 0 + V1 = 1 + V2 = 2 + + data_masking_policy: 'DataMaskingPolicy' = proto.Field( + proto.MESSAGE, + number=7, + oneof='policy', + message='DataMaskingPolicy', + ) + name: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=2, + ) + etag: str = proto.Field( + proto.STRING, + number=11, + optional=True, + ) + data_policy_type: DataPolicyType = proto.Field( + proto.ENUM, + number=3, + enum=DataPolicyType, + ) + policy_tag: str = proto.Field( + proto.STRING, + number=4, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=8, + ) + version: Version = proto.Field( + proto.ENUM, + number=9, + enum=Version, + ) + + +class DataMaskingPolicy(proto.Message): + r"""The policy used to specify data masking rule. + + This message has `oneof`_ fields (mutually exclusive fields). + For each oneof, at most one member field can be set at the same time. + Setting any member of the oneof automatically clears all other + members. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + predefined_expression (google.cloud.bigquery_datapolicies_v2.types.DataMaskingPolicy.PredefinedExpression): + Optional. A predefined masking expression. + + This field is a member of `oneof`_ ``masking_expression``. + routine (str): + Optional. The name of the BigQuery routine that contains the + custom masking routine, in the format of + ``projects/{project_number}/datasets/{dataset_id}/routines/{routine_id}``. + + This field is a member of `oneof`_ ``masking_expression``. + """ + class PredefinedExpression(proto.Enum): + r"""The available masking rules. Learn more here: + https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. + + Values: + PREDEFINED_EXPRESSION_UNSPECIFIED (0): + Default, unspecified predefined expression. + No masking will take place since no expression + is specified. + SHA256 (1): + Masking expression to replace data with + SHA-256 hash. + ALWAYS_NULL (2): + Masking expression to replace data with + NULLs. + DEFAULT_MASKING_VALUE (3): + Masking expression to replace data with their default + masking values. The default masking values for each type + listed as below: + + - STRING: "" + - BYTES: b'' + - INTEGER: 0 + - FLOAT: 0.0 + - NUMERIC: 0 + - BOOLEAN: FALSE + - TIMESTAMP: 1970-01-01 00:00:00 UTC + - DATE: 1970-01-01 + - TIME: 00:00:00 + - DATETIME: 1970-01-01T00:00:00 + - GEOGRAPHY: POINT(0 0) + - BIGNUMERIC: 0 + - ARRAY: [] + - STRUCT: NOT_APPLICABLE + - JSON: NULL + LAST_FOUR_CHARACTERS (4): + Masking expression shows the last four characters of text. + The masking behavior is as follows: + + - If text length > 4 characters: Replace text with XXXXX, + append last four characters of original text. + - If text length <= 4 characters: Apply SHA-256 hash. + FIRST_FOUR_CHARACTERS (5): + Masking expression shows the first four characters of text. + The masking behavior is as follows: + + - If text length > 4 characters: Replace text with XXXXX, + prepend first four characters of original text. + - If text length <= 4 characters: Apply SHA-256 hash. + EMAIL_MASK (6): + Masking expression for email addresses. The masking behavior + is as follows: + + - Syntax-valid email address: Replace username with XXXXX. + For example, cloudysanfrancisco@gmail.com becomes + XXXXX@gmail.com. + - Syntax-invalid email address: Apply SHA-256 hash. + + For more information, see `Email + mask `__. + DATE_YEAR_MASK (7): + Masking expression to only show the year of ``Date``, + ``DateTime`` and ``TimeStamp``. For example, with the year + 2076: + + - DATE : 2076-01-01 + - DATETIME : 2076-01-01T00:00:00 + - TIMESTAMP : 2076-01-01 00:00:00 UTC + + Truncation occurs according to the UTC time zone. To change + this, adjust the default time zone using the ``time_zone`` + system variable. For more information, see `System variables + reference `__. + RANDOM_HASH (8): + Masking expression that uses hashing to mask + column data. It differs from SHA256 in that a + unique random value is generated for each query + and is added to the hash input, resulting in the + hash / masked result to be different for each + query. Hence the name "random hash". + """ + PREDEFINED_EXPRESSION_UNSPECIFIED = 0 + SHA256 = 1 + ALWAYS_NULL = 2 + DEFAULT_MASKING_VALUE = 3 + LAST_FOUR_CHARACTERS = 4 + FIRST_FOUR_CHARACTERS = 5 + EMAIL_MASK = 6 + DATE_YEAR_MASK = 7 + RANDOM_HASH = 8 + + predefined_expression: PredefinedExpression = proto.Field( + proto.ENUM, + number=1, + oneof='masking_expression', + enum=PredefinedExpression, + ) + routine: str = proto.Field( + proto.STRING, + number=2, + oneof='masking_expression', + ) + + +__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini new file mode 100644 index 000000000000..574c5aed394b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini @@ -0,0 +1,3 @@ +[mypy] +python_version = 3.7 +namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py new file mode 100644 index 000000000000..25d78ab7c0ff --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py @@ -0,0 +1,591 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +import pathlib +import re +import shutil + +from typing import Dict, List +import warnings + +import nox + +BLACK_VERSION = "black[jupyter]==23.7.0" +ISORT_VERSION = "isort==5.11.0" + +LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] + +ALL_PYTHON = [ + "3.7", + "3.8", + "3.9", + "3.10", + "3.11", + "3.12", + "3.13", +] + +DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] + +CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() + +LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" +PACKAGE_NAME = "google-cloud-bigquery-datapolicies" + +UNIT_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "asyncmock", + "pytest", + "pytest-cov", + "pytest-asyncio", +] +UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_DEPENDENCIES: List[str] = [] +UNIT_TEST_EXTRAS: List[str] = [] +UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] +SYSTEM_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "pytest", + "google-cloud-testutils", +] +SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_EXTRAS: List[str] = [] +SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +nox.options.sessions = [ + "unit", + "system", + "cover", + "lint", + "lint_setup_py", + "blacken", + "docs", +] + +# Error if a python version is missing +nox.options.error_on_missing_interpreters = True + + +@nox.session(python=ALL_PYTHON) +def mypy(session): + """Run the type checker.""" + session.install( + "mypy", + "types-requests", + "types-protobuf", + ) + session.install(".") + session.run( + "mypy", + "-p", + "google", + ) + + +@nox.session +def update_lower_bounds(session): + """Update lower bounds in constraints.txt to match setup.py""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "update", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session +def check_lower_bounds(session): + """Check lower bounds in setup.py are reflected in constraints file""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "check", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint(session): + """Run linters. + + Returns a failure if the linters find linting errors or sufficiently + serious code quality issues. + """ + session.install("flake8", BLACK_VERSION) + session.run( + "black", + "--check", + *LINT_PATHS, + ) + + session.run("flake8", "google", "tests") + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def blacken(session): + """Run black. Format code to uniform standard.""" + session.install(BLACK_VERSION) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def format(session): + """ + Run isort to sort imports. Then run black + to format code to uniform standard. + """ + session.install(BLACK_VERSION, ISORT_VERSION) + # Use the --fss option to sort imports using strict alphabetical order. + # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections + session.run( + "isort", + "--fss", + *LINT_PATHS, + ) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint_setup_py(session): + """Verify that setup.py is valid (including RST check).""" + session.install("setuptools", "docutils", "pygments") + session.run("python", "setup.py", "check", "--restructuredtext", "--strict") + + +def install_unittest_dependencies(session, *constraints): + standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES + session.install(*standard_deps, *constraints) + + if UNIT_TEST_EXTERNAL_DEPENDENCIES: + warnings.warn( + "'unit_test_external_dependencies' is deprecated. Instead, please " + "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", + DeprecationWarning, + ) + session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_LOCAL_DEPENDENCIES: + session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_EXTRAS_BY_PYTHON: + extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif UNIT_TEST_EXTRAS: + extras = UNIT_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=ALL_PYTHON) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def unit(session, protobuf_implementation): + # Install all test dependencies, then install this package in-place. + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + install_unittest_dependencies(session, "-c", constraints_path) + + # TODO(https://github.com/googleapis/synthtool/issues/1976): + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + f"--junitxml=unit_{session.python}_sponge_log.xml", + "--cov=google", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +def install_systemtest_dependencies(session, *constraints): + session.install("--pre", "grpcio") + + session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: + session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_LOCAL_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTRAS_BY_PYTHON: + extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif SYSTEM_TEST_EXTRAS: + extras = SYSTEM_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) +def system(session): + """Run the system test suite.""" + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + system_test_path = os.path.join("tests", "system.py") + system_test_folder_path = os.path.join("tests", "system") + + # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. + if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": + session.skip("RUN_SYSTEM_TESTS is set to false, skipping") + # Install pyopenssl for mTLS testing. + if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": + session.install("pyopenssl") + + system_test_exists = os.path.exists(system_test_path) + system_test_folder_exists = os.path.exists(system_test_folder_path) + # Sanity check: only run tests if found. + if not system_test_exists and not system_test_folder_exists: + session.skip("System tests were not found") + + install_systemtest_dependencies(session, "-c", constraints_path) + + # Run py.test against the system tests. + if system_test_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_path, + *session.posargs, + ) + if system_test_folder_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_folder_path, + *session.posargs, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def cover(session): + """Run the final coverage report. + + This outputs the coverage report aggregating coverage from the unit + test runs (not system test runs), and then erases coverage data. + """ + session.install("coverage", "pytest-cov") + session.run("coverage", "report", "--show-missing", "--fail-under=100") + + session.run("coverage", "erase") + + +@nox.session(python="3.10") +def docs(session): + """Build the docs for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "sphinx==4.5.0", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-W", # warnings as errors + "-T", # show full traceback on exception + "-N", # no colors + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python="3.10") +def docfx(session): + """Build the docfx yaml files for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "gcp-sphinx-docfx-yaml", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-T", # show full traceback on exception + "-N", # no colors + "-D", + ( + "extensions=sphinx.ext.autodoc," + "sphinx.ext.autosummary," + "docfx_yaml.extension," + "sphinx.ext.intersphinx," + "sphinx.ext.coverage," + "sphinx.ext.napoleon," + "sphinx.ext.todo," + "sphinx.ext.viewcode," + "recommonmark" + ), + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def prerelease_deps(session, protobuf_implementation): + """ + Run all tests with pre-release versions of dependencies installed + rather than the standard non pre-release versions. + Pre-release versions can be installed using + `pip install --pre `. + """ + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # Note: If a dependency is added to the `prerel_deps` list, + # the `core_dependencies_from_source` list in the `core_deps_from_source` + # nox session should also be updated. + prerel_deps = [ + "googleapis-common-protos", + "google-api-core", + "google-auth", + "grpc-google-iam-v1", + "grpcio", + "grpcio-status", + "protobuf", + "proto-plus", + ] + + for dep in prerel_deps: + session.install("--pre", "--no-deps", "--ignore-installed", dep) + # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` + # to the dictionary below once this bug is fixed. + # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add + # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below + # once this bug is fixed. + package_namespaces = { + "google-api-core": "google.api_core", + "google-auth": "google.auth", + "grpcio": "grpc", + "protobuf": "google.protobuf", + "proto-plus": "proto", + } + + version_namespace = package_namespaces.get(dep) + + print(f"Installed {dep}") + if version_namespace: + session.run( + "python", + "-c", + f"import {version_namespace}; print({version_namespace}.__version__)", + ) + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb"], +) +def core_deps_from_source(session, protobuf_implementation): + """Run all tests with core dependencies installed from source + rather than pulling the dependencies from PyPI. + """ + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and + # `grpcio-status` should be added to the list below so that they are installed from source, + # rather than PyPI. + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be + # added to the list below so that it is installed from source, rather than PyPI + # Note: If a dependency is added to the `core_dependencies_from_source` list, + # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. + core_dependencies_from_source = [ + "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", + "google-api-core @ git+https://github.com/googleapis/python-api-core.git", + "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", + "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", + "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", + ] + + for dep in core_dependencies_from_source: + session.install(dep, "--no-deps", "--ignore-installed") + print(f"Installed {dep}") + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py new file mode 100644 index 000000000000..af2712cff9f0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AddGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.add_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py new file mode 100644 index 000000000000..6cd49e5cd9c5 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AddGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.add_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py new file mode 100644 index 000000000000..331a1e48be58 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py @@ -0,0 +1,58 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py new file mode 100644 index 000000000000..d8f482313281 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py @@ -0,0 +1,58 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py new file mode 100644 index 000000000000..6d4414b98d48 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py new file mode 100644 index 000000000000..f7f1bbefc0e1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py new file mode 100644 index 000000000000..f8f1f9c9b8f6 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py new file mode 100644 index 000000000000..2d76f73a270a --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py new file mode 100644 index 000000000000..3d95b8bbf22e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py new file mode 100644 index 000000000000..e3b226193346 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py new file mode 100644 index 000000000000..5c5d90cde7b2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py new file mode 100644 index 000000000000..78c9bb4be49c --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py new file mode 100644 index 000000000000..84e2366021a7 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RemoveGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.remove_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py new file mode 100644 index 000000000000..abf59d10d52f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RemoveGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.remove_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py new file mode 100644 index 000000000000..e07cb06780f5 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py new file mode 100644 index 000000000000..4115d9092f23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py new file mode 100644 index 000000000000..d307beb79314 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py new file mode 100644 index 000000000000..26945c881179 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py new file mode 100644 index 000000000000..d9543cde9b8b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py new file mode 100644 index 000000000000..b111ed9c5c7f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2 + + +def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "RANDOM_HASH" + data_policy.data_policy_type = "COLUMN_LEVEL_SECURITY_POLICY" + + request = bigquery_datapolicies_v2.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json new file mode 100644 index 000000000000..0574ba92f65f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json @@ -0,0 +1,1635 @@ +{ + "clientLibrary": { + "apis": [ + { + "id": "google.cloud.bigquery.datapolicies.v2", + "version": "v2" + } + ], + "language": "PYTHON", + "name": "google-cloud-bigquery-datapolicies", + "version": "0.1.0" + }, + "snippets": [ + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.add_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.AddGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "AddGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.AddGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "add_grantees" + }, + "description": "Sample for AddGrantees", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.add_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.AddGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "AddGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.AddGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "add_grantees" + }, + "description": "Sample for AddGrantees", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_AddGrantees_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy" + }, + { + "name": "data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_async", + "segments": [ + { + "end": 57, + "start": 27, + "type": "FULL" + }, + { + "end": 57, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 51, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 54, + "start": 52, + "type": "REQUEST_EXECUTION" + }, + { + "end": 58, + "start": 55, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy" + }, + { + "name": "data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_CreateDataPolicy_sync", + "segments": [ + { + "end": 57, + "start": 27, + "type": "FULL" + }, + { + "end": 57, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 51, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 54, + "start": 52, + "type": "REQUEST_EXECUTION" + }, + { + "end": 58, + "start": 55, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_async", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_DeleteDataPolicy_sync", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_GetDataPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_GetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.pagers.ListDataPoliciesPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_ListDataPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.remove_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.RemoveGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RemoveGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.RemoveGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "remove_grantees" + }, + "description": "Sample for RemoveGrantees", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.remove_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.RemoveGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RemoveGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.RemoveGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "remove_grantees" + }, + "description": "Sample for RemoveGrantees", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_RemoveGrantees_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_SetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_async", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_TestIamPermissions_sync", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceAsyncClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_async", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2.DataPolicyServiceClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2_generated_DataPolicyService_UpdateDataPolicy_sync", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py" + } + ] +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py new file mode 100644 index 000000000000..79e820cb8488 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py @@ -0,0 +1,185 @@ +#! /usr/bin/env python3 +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import argparse +import os +import libcst as cst +import pathlib +import sys +from typing import (Any, Callable, Dict, List, Sequence, Tuple) + + +def partition( + predicate: Callable[[Any], bool], + iterator: Sequence[Any] +) -> Tuple[List[Any], List[Any]]: + """A stable, out-of-place partition.""" + results = ([], []) + + for i in iterator: + results[int(predicate(i))].append(i) + + # Returns trueList, falseList + return results[1], results[0] + + +class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): + CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') + METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { + 'add_grantees': ('data_policy', 'grantees', ), + 'create_data_policy': ('parent', 'data_policy_id', 'data_policy', ), + 'delete_data_policy': ('name', ), + 'get_data_policy': ('name', ), + 'get_iam_policy': ('resource', 'options', ), + 'list_data_policies': ('parent', 'page_size', 'page_token', 'filter', ), + 'remove_grantees': ('data_policy', 'grantees', ), + 'set_iam_policy': ('resource', 'policy', 'update_mask', ), + 'test_iam_permissions': ('resource', 'permissions', ), + 'update_data_policy': ('data_policy', 'update_mask', 'allow_missing', ), + } + + def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: + try: + key = original.func.attr.value + kword_params = self.METHOD_TO_PARAMS[key] + except (AttributeError, KeyError): + # Either not a method from the API or too convoluted to be sure. + return updated + + # If the existing code is valid, keyword args come after positional args. + # Therefore, all positional args must map to the first parameters. + args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) + if any(k.keyword.value == "request" for k in kwargs): + # We've already fixed this file, don't fix it again. + return updated + + kwargs, ctrl_kwargs = partition( + lambda a: a.keyword.value not in self.CTRL_PARAMS, + kwargs + ) + + args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] + ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) + for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) + + request_arg = cst.Arg( + value=cst.Dict([ + cst.DictElement( + cst.SimpleString("'{}'".format(name)), +cst.Element(value=arg.value) + ) + # Note: the args + kwargs looks silly, but keep in mind that + # the control parameters had to be stripped out, and that + # those could have been passed positionally or by keyword. + for name, arg in zip(kword_params, args + kwargs)]), + keyword=cst.Name("request") + ) + + return updated.with_changes( + args=[request_arg] + ctrl_kwargs + ) + + +def fix_files( + in_dir: pathlib.Path, + out_dir: pathlib.Path, + *, + transformer=bigquery_datapoliciesCallTransformer(), +): + """Duplicate the input dir to the output dir, fixing file method calls. + + Preconditions: + * in_dir is a real directory + * out_dir is a real, empty directory + """ + pyfile_gen = ( + pathlib.Path(os.path.join(root, f)) + for root, _, files in os.walk(in_dir) + for f in files if os.path.splitext(f)[1] == ".py" + ) + + for fpath in pyfile_gen: + with open(fpath, 'r') as f: + src = f.read() + + # Parse the code and insert method call fixes. + tree = cst.parse_module(src) + updated = tree.visit(transformer) + + # Create the path and directory structure for the new file. + updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) + updated_path.parent.mkdir(parents=True, exist_ok=True) + + # Generate the updated source file at the corresponding path. + with open(updated_path, 'w') as f: + f.write(updated.code) + + +if __name__ == '__main__': + parser = argparse.ArgumentParser( + description="""Fix up source that uses the bigquery_datapolicies client library. + +The existing sources are NOT overwritten but are copied to output_dir with changes made. + +Note: This tool operates at a best-effort level at converting positional + parameters in client method calls to keyword based parameters. + Cases where it WILL FAIL include + A) * or ** expansion in a method call. + B) Calls via function or method alias (includes free function calls) + C) Indirect or dispatched calls (e.g. the method is looked up dynamically) + + These all constitute false negatives. The tool will also detect false + positives when an API method shares a name with another method. +""") + parser.add_argument( + '-d', + '--input-directory', + required=True, + dest='input_dir', + help='the input directory to walk for python files to fix up', + ) + parser.add_argument( + '-o', + '--output-directory', + required=True, + dest='output_dir', + help='the directory to output files fixed via un-flattening', + ) + args = parser.parse_args() + input_dir = pathlib.Path(args.input_dir) + output_dir = pathlib.Path(args.output_dir) + if not input_dir.is_dir(): + print( + f"input directory '{input_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if not output_dir.is_dir(): + print( + f"output directory '{output_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if os.listdir(output_dir): + print( + f"output directory '{output_dir}' is not empty", + file=sys.stderr, + ) + sys.exit(-1) + + fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py new file mode 100644 index 000000000000..40366686e783 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py @@ -0,0 +1,99 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import io +import os +import re + +import setuptools # type: ignore + +package_root = os.path.abspath(os.path.dirname(__file__)) + +name = 'google-cloud-bigquery-datapolicies' + + +description = "Google Cloud Bigquery Datapolicies API client library" + +version = None + +with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: + version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) + assert (len(version_candidates) == 1) + version = version_candidates[0] + +if version[0] == "0": + release_status = "Development Status :: 4 - Beta" +else: + release_status = "Development Status :: 5 - Production/Stable" + +dependencies = [ + "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", + # Exclude incompatible versions of `google-auth` + # See https://github.com/googleapis/google-cloud-python/issues/12364 + "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", + "proto-plus >= 1.22.3, <2.0.0", + "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", + "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", + "grpc-google-iam-v1 >= 0.14.0, <1.0.0", +] +extras = { +} +url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" + +package_root = os.path.abspath(os.path.dirname(__file__)) + +readme_filename = os.path.join(package_root, "README.rst") +with io.open(readme_filename, encoding="utf-8") as readme_file: + readme = readme_file.read() + +packages = [ + package + for package in setuptools.find_namespace_packages() + if package.startswith("google") +] + +setuptools.setup( + name=name, + version=version, + description=description, + long_description=readme, + author="Google LLC", + author_email="googleapis-packages@google.com", + license="Apache 2.0", + url=url, + classifiers=[ + release_status, + "Intended Audience :: Developers", + "License :: OSI Approved :: Apache Software License", + "Programming Language :: Python", + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.7", + "Programming Language :: Python :: 3.8", + "Programming Language :: Python :: 3.9", + "Programming Language :: Python :: 3.10", + "Programming Language :: Python :: 3.11", + "Programming Language :: Python :: 3.12", + "Programming Language :: Python :: 3.13", + "Operating System :: OS Independent", + "Topic :: Internet", + ], + platforms="Posix; MacOS X; Windows", + packages=packages, + python_requires=">=3.7", + install_requires=dependencies, + extras_require=extras, + include_package_data=True, + zip_safe=False, +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt new file mode 100644 index 000000000000..2010e549cceb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt @@ -0,0 +1,12 @@ +# We use the constraints file for the latest Python version +# (currently this file) to check that the latest +# major versions of dependencies are supported in setup.py. +# List all library dependencies and extras in this file. +# Require the latest major version be installed for each dependency. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo>=1 +google-api-core>=2 +google-auth>=2 +proto-plus>=1 +protobuf>=6 +grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt new file mode 100644 index 000000000000..56affbd9bd75 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt @@ -0,0 +1,11 @@ +# This constraints file is used to check that lower bounds +# are correct in setup.py +# List all library dependencies and extras in this file. +# Pin the version to the lower bound. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo==1.14.0 +google-api-core==1.34.1 +google-auth==2.14.1 +proto-plus==1.22.3 +protobuf==3.20.2 +grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py new file mode 100644 index 000000000000..5370751479c3 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py @@ -0,0 +1,8343 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +# try/except added for compatibility with python < 3.8 +try: + from unittest import mock + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER + import mock + +import grpc +from grpc.experimental import aio +from collections.abc import Iterable, AsyncIterable +from google.protobuf import json_format +import json +import math +import pytest +from google.api_core import api_core_version +from proto.marshal.rules.dates import DurationRule, TimestampRule +from proto.marshal.rules import wrappers +from requests import Response +from requests import Request, PreparedRequest +from requests.sessions import Session +from google.protobuf import json_format + +try: + from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True +except ImportError: # pragma: NO COVER + HAS_GOOGLE_AUTH_AIO = False + +from google.api_core import client_options +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers +from google.api_core import grpc_helpers_async +from google.api_core import path_template +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials +from google.auth.exceptions import MutualTLSChannelError +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import DataPolicyServiceAsyncClient +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import transports +from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import options_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account +from google.protobuf import field_mask_pb2 # type: ignore +from google.type import expr_pb2 # type: ignore +import google.auth + + + +CRED_INFO_JSON = { + "credential_source": "/path/to/file", + "credential_type": "service account credentials", + "principal": "service-account@example.com", +} +CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) + + +async def mock_async_gen(data, chunk_size=1): + for i in range(0, len(data)): # pragma: NO COVER + chunk = data[i : i + chunk_size] + yield chunk.encode("utf-8") + +def client_cert_source_callback(): + return b"cert bytes", b"key bytes" + +# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. +# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. +def async_anonymous_credentials(): + if HAS_GOOGLE_AUTH_AIO: + return ga_credentials_async.AnonymousCredentials() + return ga_credentials.AnonymousCredentials() + +# If default endpoint is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint(client): + return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + +# If default endpoint template is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint template so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint_template(client): + return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + + +def test__get_default_mtls_endpoint(): + api_endpoint = "example.googleapis.com" + api_mtls_endpoint = "example.mtls.googleapis.com" + sandbox_endpoint = "example.sandbox.googleapis.com" + sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" + non_googleapi = "api.example.com" + + assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + +def test__read_environment_variables(): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + +def test__get_client_cert_source(): + mock_provided_cert_source = mock.Mock() + mock_default_cert_source = mock.Mock() + + assert DataPolicyServiceClient._get_client_cert_source(None, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): + assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source + +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test__get_api_endpoint(): + api_override = "foo.com" + mock_client_cert_source = mock.Mock() + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") + assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + + +def test__get_universe_domain(): + client_universe_domain = "foo.com" + universe_domain_env = "bar.com" + + assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain + assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env + assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._get_universe_domain("", None) + assert str(excinfo.value) == "Universe Domain cannot be an empty string." + +@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False) +]) +def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): + cred = mock.Mock(["get_cred_info"]) + cred.get_cred_info = mock.Mock(return_value=cred_info_json) + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=["foo"]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + if show_cred_info: + assert error.details == ["foo", CRED_INFO_STRING] + else: + assert error.details == ["foo"] + +@pytest.mark.parametrize("error_code", [401,403,404,500]) +def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): + cred = mock.Mock([]) + assert not hasattr(cred, "get_cred_info") + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=[]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + assert error.details == [] + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + factory.return_value = creds + info = {"valid": True} + client = client_class.from_service_account_info(info, transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +@pytest.mark.parametrize("transport_class,transport_name", [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=True) + use_jwt.assert_called_once_with(True) + + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=False) + use_jwt.assert_not_called() + + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_file(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + factory.return_value = creds + client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +def test_data_policy_service_client_get_transport_class(): + transport = DataPolicyServiceClient.get_transport_class() + available_transports = [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceRestTransport, + ] + assert transport in available_transports + + transport = DataPolicyServiceClient.get_transport_class("grpc") + assert transport == transports.DataPolicyServiceGrpcTransport + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): + # Check that if channel is provided we won't create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ) + client = client_class(transport=transport) + gtc.assert_not_called() + + # Check that if channel is provided via str we will create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + client = client_class(transport=transport_name) + gtc.assert_called() + + # Check the case api_endpoint is provided. + options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name, client_options=options) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client.DEFAULT_MTLS_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + # Check the case quota_project_id is provided + options = client_options.ClientOptions(quota_project_id="octopus") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id="octopus", + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + # Check the case api_endpoint is provided + options = client_options.ClientOptions(api_audience="https://language.googleapis.com") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience="https://language.googleapis.com" + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) +def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): + # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default + # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. + + # Check the case client_cert_source is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + + if use_client_cert_env == "false": + expected_client_cert_source = None + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + else: + expected_client_cert_source = client_cert_source_callback + expected_host = client.DEFAULT_MTLS_ENDPOINT + + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case ADC client cert is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + if use_client_cert_env == "false": + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_client_cert_source = None + else: + expected_host = client.DEFAULT_MTLS_ENDPOINT + expected_client_cert_source = client_cert_source_callback + + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case client_cert_source and ADC client cert are not provided. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): + mock_client_cert_source = mock.Mock() + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source == mock_client_cert_source + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + mock_client_cert_source = mock.Mock() + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source == mock_client_cert_source + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_api_endpoint(client_class): + mock_client_cert_source = client_cert_source_callback + api_override = "foo.com" + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", + # use ClientOptions.api_endpoint as the api endpoint regardless. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == api_override + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", + # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + + # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), + # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, + # and ClientOptions.universe_domain="bar.com", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. + options = client_options.ClientOptions() + universe_exists = hasattr(options, "universe_domain") + if universe_exists: + options = client_options.ClientOptions(universe_domain=mock_universe) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + else: + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) + assert client.universe_domain == (mock_universe if universe_exists else default_universe) + + # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + options = client_options.ClientOptions() + if hasattr(options, "universe_domain"): + delattr(options, "universe_domain") + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): + # Check the case scopes are provided. + options = client_options.ClientOptions( + scopes=["1", "2"], + ) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=["1", "2"], + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), +]) +def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +def test_data_policy_service_client_client_options_from_dict(): + with mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + grpc_transport.return_value = None + client = DataPolicyServiceClient( + client_options={'api_endpoint': 'squid.clam.whelk'} + ) + grpc_transport.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), +]) +def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=None, + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_create_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.CreateDataPolicyRequest( + parent='parent_value', + data_policy_id='data_policy_id_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.create_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.CreateDataPolicyRequest( + parent='parent_value', + data_policy_id='data_policy_id_value', + ) + +def test_create_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + + request = {} + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_create_data_policy_async_from_dict(): + await test_create_data_policy_async(request_type=dict) + +def test_create_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_create_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_create_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].data_policy_id + mock_val = 'data_policy_id_value' + assert arg == mock_val + + +def test_create_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].data_policy_id + mock_val = 'data_policy_id_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.AddGranteesRequest, + dict, +]) +def test_add_grantees(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.AddGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_add_grantees_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.AddGranteesRequest( + data_policy='data_policy_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.add_grantees(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.AddGranteesRequest( + data_policy='data_policy_value', + ) + +def test_add_grantees_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.add_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc + request = {} + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.add_grantees in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.add_grantees] = mock_rpc + + request = {} + await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.AddGranteesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.AddGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_add_grantees_async_from_dict(): + await test_add_grantees_async(request_type=dict) + +def test_add_grantees_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.AddGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_add_grantees_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.AddGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +def test_add_grantees_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.add_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + + +def test_add_grantees_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + +@pytest.mark.asyncio +async def test_add_grantees_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.add_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + +@pytest.mark.asyncio +async def test_add_grantees_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RemoveGranteesRequest, + dict, +]) +def test_remove_grantees(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.RemoveGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_remove_grantees_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.RemoveGranteesRequest( + data_policy='data_policy_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.remove_grantees(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.RemoveGranteesRequest( + data_policy='data_policy_value', + ) + +def test_remove_grantees_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.remove_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc + request = {} + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.remove_grantees in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.remove_grantees] = mock_rpc + + request = {} + await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RemoveGranteesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.RemoveGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_remove_grantees_async_from_dict(): + await test_remove_grantees_async(request_type=dict) + +def test_remove_grantees_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RemoveGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_remove_grantees_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RemoveGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +def test_remove_grantees_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.remove_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + + +def test_remove_grantees_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + +@pytest.mark.asyncio +async def test_remove_grantees_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.remove_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + +@pytest.mark.asyncio +async def test_remove_grantees_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_update_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.UpdateDataPolicyRequest( + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.update_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.UpdateDataPolicyRequest( + ) + +def test_update_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + + request = {} + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_update_data_policy_async_from_dict(): + await test_update_data_policy_async(request_type=dict) + +def test_update_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_update_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +def test_update_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.update_data_policy( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + + +def test_update_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.update_data_policy( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + response = client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.delete_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + +def test_delete_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + + request = {} + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + response = await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.asyncio +async def test_delete_data_policy_async_from_dict(): + await test_delete_data_policy_async(request_type=dict) + +def test_delete_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_delete_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_delete_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_delete_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_get_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.GetDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.GetDataPolicyRequest( + name='name_value', + ) + +def test_get_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + + request = {} + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_get_data_policy_async_from_dict(): + await test_get_data_policy_async(request_type=dict) + +def test_get_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_get_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_get_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + response = client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +def test_list_data_policies_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + filter='filter_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.list_data_policies(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + filter='filter_value', + ) + +def test_list_data_policies_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + + request = {} + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + response = await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesAsyncPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.asyncio +async def test_list_data_policies_async_from_dict(): + await test_list_data_policies_async(request_type=dict) + +def test_list_data_policies_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_list_data_policies_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_list_data_policies_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + + +def test_list_data_policies_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_pager(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + + expected_metadata = () + retry = retries.Retry() + timeout = 5 + expected_metadata = tuple(expected_metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ('parent', ''), + )), + ) + pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) + + assert pager._metadata == expected_metadata + assert pager._retry == retry + assert pager._timeout == timeout + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) +def test_list_data_policies_pages(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = list(client.list_data_policies(request={}).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.asyncio +async def test_list_data_policies_async_pager(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + async_pager = await client.list_data_policies(request={},) + assert async_pager.next_page_token == 'abc' + responses = [] + async for response in async_pager: # pragma: no branch + responses.append(response) + + assert len(responses) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in responses) + + +@pytest.mark.asyncio +async def test_list_data_policies_async_pages(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = [] + # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` + # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 + async for page_ in ( # pragma: no branch + await client.list_data_policies(request={}) + ).pages: + pages.append(page_) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_get_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + +def test_get_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + + request = {} + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_get_iam_policy_async_from_dict(): + await test_get_iam_policy_async(request_type=dict) + +def test_get_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_get_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.get_iam_policy(request={ + 'resource': 'resource_value', + 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_set_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.set_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + +def test_set_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + + request = {} + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_set_iam_policy_async_from_dict(): + await test_set_iam_policy_async(request_type=dict) + +def test_set_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_set_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_set_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.set_iam_policy(request={ + 'resource': 'resource_value', + 'policy': policy_pb2.Policy(version=774), + 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + response = client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.test_iam_permissions(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + +def test_test_iam_permissions_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + + request = {} + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + response = await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_from_dict(): + await test_test_iam_permissions_async(request_type=dict) + +def test_test_iam_permissions_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_test_iam_permissions_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + response = client.test_iam_permissions(request={ + 'resource': 'resource_value', + 'permissions': ['permissions_value'], + } + ) + call.assert_called() + + +def test_create_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["data_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + jsonified_request["dataPolicyId"] = 'data_policy_id_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + assert "dataPolicyId" in jsonified_request + assert jsonified_request["dataPolicyId"] == 'data_policy_id_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.create_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_create_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.create_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("parent", "dataPolicyId", "dataPolicy", ))) + + +def test_create_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.create_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + +def test_add_grantees_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.add_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc + + request = {} + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["data_policy"] = "" + request_init["grantees"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["dataPolicy"] = 'data_policy_value' + jsonified_request["grantees"] = 'grantees_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "dataPolicy" in jsonified_request + assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert "grantees" in jsonified_request + assert jsonified_request["grantees"] == 'grantees_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.add_grantees(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_add_grantees_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.add_grantees._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + + +def test_add_grantees_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.add_grantees(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" % client.transport._host, args[1]) + + +def test_add_grantees_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +def test_remove_grantees_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.remove_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc + + request = {} + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGranteesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["data_policy"] = "" + request_init["grantees"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["dataPolicy"] = 'data_policy_value' + jsonified_request["grantees"] = 'grantees_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "dataPolicy" in jsonified_request + assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert "grantees" in jsonified_request + assert jsonified_request["grantees"] == 'grantees_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.remove_grantees(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_remove_grantees_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.remove_grantees._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + + +def test_remove_grantees_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.remove_grantees(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" % client.transport._host, args[1]) + + +def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +def test_update_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("allow_missing", "update_mask", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "patch", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.update_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_update_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.update_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("allowMissing", "updateMask", )) & set(("dataPolicy", ))) + + +def test_update_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + + # get truthy value for each flattened field + mock_args = dict( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.update_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +def test_delete_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = None + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "delete", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.delete_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_delete_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.delete_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_delete_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.delete_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +def test_get_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_get_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.get_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +def test_list_data_policies_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("filter", "page_size", "page_token", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.list_data_policies(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_list_data_policies_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.list_data_policies._get_unset_required_fields({}) + assert set(unset_fields) == (set(("filter", "pageSize", "pageToken", )) & set(("parent", ))) + + +def test_list_data_policies_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.list_data_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_rest_pager(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + #with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode('UTF-8') + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + pager = client.list_data_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) + + pages = list(client.list_data_policies(request=sample_request).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + + +def test_get_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", ))) + + +def test_set_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.set_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_set_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.set_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) + + +def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request_init["permissions"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + jsonified_request["permissions"] = 'permissions_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + assert "permissions" in jsonified_request + assert jsonified_request["permissions"] == 'permissions_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.test_iam_permissions(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_test_iam_permissions_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = DataPolicyServiceClient(transport=transport) + assert client.transport is transport + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + +@pytest.mark.parametrize("transport_class", [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, +]) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + +def test_transport_kind_grpc(): + transport = DataPolicyServiceClient.get_transport_class("grpc")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "grpc" + + +def test_initialize_client_w_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_add_grantees_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_remove_grantees_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_grpc_asyncio(): + transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( + credentials=async_anonymous_credentials() + ) + assert transport.kind == "grpc_asyncio" + + +def test_initialize_client_w_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_create_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_add_grantees_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_remove_grantees_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_update_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_delete_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_list_data_policies_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + await client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_set_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_test_iam_permissions_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + await client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_rest(): + transport = DataPolicyServiceClient.get_transport_class("rest")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "rest" + + +def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.create_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.create_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.CreateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.add_grantees(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.AddGranteesRequest, + dict, +]) +def test_add_grantees_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.add_grantees(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_add_grantees_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_add_grantees") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.AddGranteesRequest.pb(datapolicy.AddGranteesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.AddGranteesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.add_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGranteesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.remove_grantees(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RemoveGranteesRequest, + dict, +]) +def test_remove_grantees_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.remove_grantees(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_remove_grantees_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.RemoveGranteesRequest.pb(datapolicy.RemoveGranteesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.RemoveGranteesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.remove_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.update_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request_init["data_policy"] = {'data_masking_policy': {'predefined_expression': 1, 'routine': 'routine_value'}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_id': 'data_policy_id_value', 'etag': 'etag_value', 'data_policy_type': 1, 'policy_tag': 'policy_tag_value', 'grantees': ['grantees_value1', 'grantees_value2'], 'version': 1} + # The version of a generated dependency at test runtime may differ from the version used during generation. + # Delete any fields which are not present in the current runtime dependency + # See https://github.com/googleapis/gapic-generator-python/issues/1748 + + # Determine if the message type is proto-plus or protobuf + test_field = datapolicy.UpdateDataPolicyRequest.meta.fields["data_policy"] + + def get_message_fields(field): + # Given a field which is a message (composite type), return a list with + # all the fields of the message. + # If the field is not a composite type, return an empty list. + message_fields = [] + + if hasattr(field, "message") and field.message: + is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") + + if is_field_type_proto_plus_type: + message_fields = field.message.meta.fields.values() + # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types + else: # pragma: NO COVER + message_fields = field.message.DESCRIPTOR.fields + return message_fields + + runtime_nested_fields = [ + (field.name, nested_field.name) + for field in get_message_fields(test_field) + for nested_field in get_message_fields(field) + ] + + subfields_not_in_runtime = [] + + # For each item in the sample request, create a list of sub fields which are not present at runtime + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for field, value in request_init["data_policy"].items(): # pragma: NO COVER + result = None + is_repeated = False + # For repeated fields + if isinstance(value, list) and len(value): + is_repeated = True + result = value[0] + # For fields where the type is another message + if isinstance(value, dict): + result = value + + if result and hasattr(result, "keys"): + for subfield in result.keys(): + if (field, subfield) not in runtime_nested_fields: + subfields_not_in_runtime.append( + {"field": field, "subfield": subfield, "is_repeated": is_repeated} + ) + + # Remove fields from the sample request which are not present in the runtime version of the dependency + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + field = subfield_to_delete.get("field") + field_repeated = subfield_to_delete.get("is_repeated") + subfield = subfield_to_delete.get("subfield") + if subfield: + if field_repeated: + for i in range(0, len(request_init["data_policy"][field])): + del request_init["data_policy"][field][i][subfield] + else: + del request_init["data_policy"][field][subfield] + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.update_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.UpdateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.delete_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = '' + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.delete_data_policy(request) + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: + pre.assert_not_called() + pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + request = datapolicy.DeleteDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + + client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + + +def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.GetDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.list_data_policies(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.list_data_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_data_policies_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) + req.return_value.content = return_value + + request = datapolicy.ListDataPoliciesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.ListDataPoliciesResponse() + post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata + + client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.GetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.GetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.set_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.set_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_set_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.SetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.SetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.test_iam_permissions(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.test_iam_permissions(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_test_iam_permissions_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.TestIamPermissionsRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) + req.return_value.content = return_value + + request = iam_policy_pb2.TestIamPermissionsRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = iam_policy_pb2.TestIamPermissionsResponse() + post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata + + client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + +def test_initialize_client_w_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_add_grantees_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_remove_grantees_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.DataPolicyServiceGrpcTransport, + ) + +def test_data_policy_service_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json" + ) + + +def test_data_policy_service_base_transport(): + # Instantiate the base transport. + with mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + Transport.return_value = None + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + 'create_data_policy', + 'add_grantees', + 'remove_grantees', + 'update_data_policy', + 'delete_data_policy', + 'get_data_policy', + 'list_data_policies', + 'get_iam_policy', + 'set_iam_policy', + 'test_iam_permissions', + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Catch all for all remaining methods and properties + remainder = [ + 'kind', + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_data_policy_service_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with("credentials.json", + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id="octopus", + ) + + +def test_data_policy_service_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport() + adc.assert_called_once() + + +def test_data_policy_service_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + DataPolicyServiceClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, + ], +) +def test_data_policy_service_transport_auth_gdch_credentials(transport_class): + host = 'https://language.com' + api_audience_tests = [None, 'https://language2.com'] + api_audience_expect = [host, 'https://language2.com'] + for t, e in zip(api_audience_tests, api_audience_expect): + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + gdch_mock = mock.MagicMock() + type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + adc.return_value = (gdch_mock, None) + transport_class(host=host, api_audience=t) + gdch_mock.with_gdch_audience.assert_called_once_with( + e + ) + + +@pytest.mark.parametrize( + "transport_class,grpc_helpers", + [ + (transports.DataPolicyServiceGrpcTransport, grpc_helpers), + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + ], +) +def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + grpc_helpers, "create_channel", autospec=True + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + adc.return_value = (creds, None) + transport_class( + quota_project_id="octopus", + scopes=["1", "2"] + ) + + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=creds, + credentials_file=None, + quota_project_id="octopus", + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=["1", "2"], + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( + transport_class +): + cred = ga_credentials.AnonymousCredentials() + + # Check ssl_channel_credentials is used if provided. + with mock.patch.object(transport_class, "create_channel") as mock_create_channel: + mock_ssl_channel_creds = mock.Mock() + transport_class( + host="squid.clam.whelk", + credentials=cred, + ssl_channel_credentials=mock_ssl_channel_creds + ) + mock_create_channel.assert_called_once_with( + "squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_channel_creds, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls + # is used. + with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): + with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: + transport_class( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + expected_cert, expected_key = client_cert_source_callback() + mock_ssl_cred.assert_called_once_with( + certificate_chain=expected_cert, + private_key=expected_key + ) + +def test_data_policy_service_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: + transports.DataPolicyServiceRestTransport ( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_no_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com' + ) + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_with_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:8000' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com:8000' + ) + +@pytest.mark.parametrize("transport_name", [ + "rest", +]) +def test_data_policy_service_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = DataPolicyServiceClient( + credentials=creds1, + transport=transport_name, + ) + client2 = DataPolicyServiceClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.create_data_policy._session + session2 = client2.transport.create_data_policy._session + assert session1 != session2 + session1 = client1.transport.add_grantees._session + session2 = client2.transport.add_grantees._session + assert session1 != session2 + session1 = client1.transport.remove_grantees._session + session2 = client2.transport.remove_grantees._session + assert session1 != session2 + session1 = client1.transport.update_data_policy._session + session2 = client2.transport.update_data_policy._session + assert session1 != session2 + session1 = client1.transport.delete_data_policy._session + session2 = client2.transport.delete_data_policy._session + assert session1 != session2 + session1 = client1.transport.get_data_policy._session + session2 = client2.transport.get_data_policy._session + assert session1 != session2 + session1 = client1.transport.list_data_policies._session + session2 = client2.transport.list_data_policies._session + assert session1 != session2 + session1 = client1.transport.get_iam_policy._session + session2 = client2.transport.get_iam_policy._session + assert session1 != session2 + session1 = client1.transport.set_iam_policy._session + session2 = client2.transport.set_iam_policy._session + assert session1 != session2 + session1 = client1.transport.test_iam_permissions._session + session2 = client2.transport.test_iam_permissions._session + assert session1 != session2 +def test_data_policy_service_grpc_transport_channel(): + channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +def test_data_policy_service_grpc_asyncio_transport_channel(): + channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_client_cert_source( + transport_class +): + with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_ssl_cred = mock.Mock() + grpc_ssl_channel_cred.return_value = mock_ssl_cred + + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + + cred = ga_credentials.AnonymousCredentials() + with pytest.warns(DeprecationWarning): + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (cred, None) + transport = transport_class( + host="squid.clam.whelk", + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=client_cert_source_callback, + ) + adc.assert_called_once() + + grpc_ssl_channel_cred.assert_called_once_with( + certificate_chain=b"cert bytes", private_key=b"key bytes" + ) + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + assert transport._ssl_channel_credentials == mock_ssl_cred + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_adc( + transport_class +): + mock_ssl_cred = mock.Mock() + with mock.patch.multiple( + "google.auth.transport.grpc.SslCredentials", + __init__=mock.Mock(return_value=None), + ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), + ): + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + mock_cred = mock.Mock() + + with pytest.warns(DeprecationWarning): + transport = transport_class( + host="squid.clam.whelk", + credentials=mock_cred, + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=None, + ) + + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=mock_cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + + +def test_data_policy_path(): + project = "squid" + location = "clam" + data_policy = "whelk" + expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) + assert expected == actual + + +def test_parse_data_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "data_policy": "nudibranch", + } + path = DataPolicyServiceClient.data_policy_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_data_policy_path(path) + assert expected == actual + +def test_policy_tag_path(): + project = "cuttlefish" + location = "mussel" + taxonomy = "winkle" + policy_tag = "nautilus" + expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + actual = DataPolicyServiceClient.policy_tag_path(project, location, taxonomy, policy_tag) + assert expected == actual + + +def test_parse_policy_tag_path(): + expected = { + "project": "scallop", + "location": "abalone", + "taxonomy": "squid", + "policy_tag": "clam", + } + path = DataPolicyServiceClient.policy_tag_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_policy_tag_path(path) + assert expected == actual + +def test_routine_path(): + project = "whelk" + dataset = "octopus" + routine = "oyster" + expected = "projects/{project}/datasets/{dataset}/routines/{routine}".format(project=project, dataset=dataset, routine=routine, ) + actual = DataPolicyServiceClient.routine_path(project, dataset, routine) + assert expected == actual + + +def test_parse_routine_path(): + expected = { + "project": "nudibranch", + "dataset": "cuttlefish", + "routine": "mussel", + } + path = DataPolicyServiceClient.routine_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_routine_path(path) + assert expected == actual + +def test_common_billing_account_path(): + billing_account = "winkle" + expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + actual = DataPolicyServiceClient.common_billing_account_path(billing_account) + assert expected == actual + + +def test_parse_common_billing_account_path(): + expected = { + "billing_account": "nautilus", + } + path = DataPolicyServiceClient.common_billing_account_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_billing_account_path(path) + assert expected == actual + +def test_common_folder_path(): + folder = "scallop" + expected = "folders/{folder}".format(folder=folder, ) + actual = DataPolicyServiceClient.common_folder_path(folder) + assert expected == actual + + +def test_parse_common_folder_path(): + expected = { + "folder": "abalone", + } + path = DataPolicyServiceClient.common_folder_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_folder_path(path) + assert expected == actual + +def test_common_organization_path(): + organization = "squid" + expected = "organizations/{organization}".format(organization=organization, ) + actual = DataPolicyServiceClient.common_organization_path(organization) + assert expected == actual + + +def test_parse_common_organization_path(): + expected = { + "organization": "clam", + } + path = DataPolicyServiceClient.common_organization_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_organization_path(path) + assert expected == actual + +def test_common_project_path(): + project = "whelk" + expected = "projects/{project}".format(project=project, ) + actual = DataPolicyServiceClient.common_project_path(project) + assert expected == actual + + +def test_parse_common_project_path(): + expected = { + "project": "octopus", + } + path = DataPolicyServiceClient.common_project_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_project_path(path) + assert expected == actual + +def test_common_location_path(): + project = "oyster" + location = "nudibranch" + expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + actual = DataPolicyServiceClient.common_location_path(project, location) + assert expected == actual + + +def test_parse_common_location_path(): + expected = { + "project": "cuttlefish", + "location": "mussel", + } + path = DataPolicyServiceClient.common_location_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_location_path(path) + assert expected == actual + + +def test_client_with_default_client_info(): + client_info = gapic_v1.client_info.ClientInfo() + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + transport_class = DataPolicyServiceClient.get_transport_class() + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + +def test_transport_close_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +@pytest.mark.asyncio +async def test_transport_close_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + async with client: + close.assert_not_called() + close.assert_called_once() + + +def test_transport_close_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +def test_client_ctx(): + transports = [ + 'rest', + 'grpc', + ] + for transport in transports: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport + ) + # Test client calls underlying transport. + with mock.patch.object(type(client.transport), "close") as close: + close.assert_not_called() + with client: + pass + close.assert_called() + +@pytest.mark.parametrize("client_class,transport_class", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), +]) +def test_api_key_credentials(client_class, transport_class): + with mock.patch.object( + google.auth._default, "get_api_key_credentials", create=True + ) as get_api_key_credentials: + mock_cred = mock.Mock() + get_api_key_credentials.return_value = mock_cred + options = client_options.ClientOptions() + options.api_key = "api_key" + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options) + patched.assert_called_once_with( + credentials=mock_cred, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc new file mode 100644 index 000000000000..0c3effcc3668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc @@ -0,0 +1,13 @@ +[run] +branch = True + +[report] +show_missing = True +omit = + google/cloud/bigquery_datapolicies/__init__.py + google/cloud/bigquery_datapolicies/gapic_version.py +exclude_lines = + # Re-enable the standard pragma + pragma: NO COVER + # Ignore debug-only repr + def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 new file mode 100644 index 000000000000..90316de21489 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 @@ -0,0 +1,34 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +[flake8] +# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): +# Resolve flake8 lint issues +ignore = E203, E231, E266, E501, W503 +exclude = + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): + # Ensure that generated code passes flake8 lint + **/gapic/** + **/services/** + **/types/** + # Exclude Protobuf gencode + *_pb2.py + + # Standard linting exemptions. + **/.nox/** + __pycache__, + .git, + *.pyc, + conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE new file mode 100644 index 000000000000..d64569567334 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in new file mode 100644 index 000000000000..dae249ec8976 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +include README.rst LICENSE +recursive-include google *.py *.pyi *.json *.proto py.typed +recursive-include tests * +global-exclude *.py[co] +global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst new file mode 100644 index 000000000000..074e1245b6d1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst @@ -0,0 +1,143 @@ +Python Client for Google Cloud Bigquery Datapolicies API +================================================= + +Quick Start +----------- + +In order to use this library, you first need to go through the following steps: + +1. `Select or create a Cloud Platform project.`_ +2. `Enable billing for your project.`_ +3. Enable the Google Cloud Bigquery Datapolicies API. +4. `Setup Authentication.`_ + +.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project +.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project +.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html + +Installation +~~~~~~~~~~~~ + +Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to +create isolated Python environments. The basic problem it addresses is one of +dependencies and versions, and indirectly permissions. + +With `virtualenv`_, it's possible to install this library without needing system +install permissions, and without clashing with the installed system +dependencies. + +.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ + + +Mac/Linux +^^^^^^^^^ + +.. code-block:: console + + python3 -m venv + source /bin/activate + /bin/pip install /path/to/library + + +Windows +^^^^^^^ + +.. code-block:: console + + python3 -m venv + \Scripts\activate + \Scripts\pip.exe install \path\to\library + + +Logging +------- + +This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. +Note the following: + +#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. +#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. +#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. + + +Simple, environment-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google +logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged +messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging +event. + +A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. + +- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. +- Invalid logging scopes: :code:`foo`, :code:`123`, etc. + +**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. + + +Examples +^^^^^^^^ + +- Enabling the default handler for all Google-based loggers + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google + +- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: console + + export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 + + +Advanced, code-based configuration +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +You can also configure a valid logging scope using Python's standard `logging` mechanism. + + +Examples +^^^^^^^^ + +- Configuring a handler for all Google-based loggers + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + +- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): + +.. code-block:: python + + import logging + + from google.cloud.translate_v3 import translate + + base_logger = logging.getLogger("google.cloud.library_v1") + base_logger.addHandler(logging.StreamHandler()) + base_logger.setLevel(logging.DEBUG) + + +Logging details +~~~~~~~~~~~~~~~ + +#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root + logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set + :code:`logging.getLogger("google").propagate = True` in your code. +#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for + one library, but decide you need to also set up environment-based logging configuration for another library. + + #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual + if the code -based configuration gets applied first. + +#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get + executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. + (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css new file mode 100644 index 000000000000..b0a295464b23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css @@ -0,0 +1,20 @@ +div#python2-eol { + border-color: red; + border-width: medium; +} + +/* Ensure minimum width for 'Parameters' / 'Returns' column */ +dl.field-list > dt { + min-width: 100px +} + +/* Insert space between methods for readability */ +dl.method { + padding-top: 10px; + padding-bottom: 10px +} + +/* Insert empty space between classes */ +dl.class { + padding-bottom: 50px +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html new file mode 100644 index 000000000000..95e9c77fcfe1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html @@ -0,0 +1,50 @@ + +{% extends "!layout.html" %} +{%- block content %} +{%- if theme_fixed_sidebar|lower == 'true' %} +
+ {{ sidebar() }} + {%- block document %} +
+ {%- if render_sidebar %} +
+ {%- endif %} + + {%- block relbar_top %} + {%- if theme_show_relbar_top|tobool %} + + {%- endif %} + {% endblock %} + +
+
+ As of January 1, 2020 this library no longer supports Python 2 on the latest released version. + Library versions released prior to that date will continue to be available. For more information please + visit Python 2 support on Google Cloud. +
+ {% block body %} {% endblock %} +
+ + {%- block relbar_bottom %} + {%- if theme_show_relbar_bottom|tobool %} + + {%- endif %} + {% endblock %} + + {%- if render_sidebar %} +
+ {%- endif %} +
+ {%- endblock %} +
+
+{%- else %} +{{ super() }} +{%- endif %} +{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst new file mode 100644 index 000000000000..a78889920da3 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst @@ -0,0 +1,10 @@ +DataPolicyService +----------------------------------- + +.. automodule:: google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service + :members: + :inherited-members: + +.. automodule:: google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.pagers + :members: + :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst new file mode 100644 index 000000000000..b324cc451c10 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst @@ -0,0 +1,6 @@ +Services for Google Cloud Bigquery Datapolicies v2beta1 API +=========================================================== +.. toctree:: + :maxdepth: 2 + + data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst new file mode 100644 index 000000000000..5f863cd021f1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst @@ -0,0 +1,6 @@ +Types for Google Cloud Bigquery Datapolicies v2beta1 API +======================================================== + +.. automodule:: google.cloud.bigquery_datapolicies_v2beta1.types + :members: + :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py new file mode 100644 index 000000000000..babd226a574e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py @@ -0,0 +1,385 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# +# google-cloud-bigquery-datapolicies documentation build configuration file +# +# This file is execfile()d with the current directory set to its +# containing dir. +# +# Note that not all possible configuration values are present in this +# autogenerated file. +# +# All configuration values have a default; values that are commented out +# serve to show the default. + +import sys +import os +import shlex + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +sys.path.insert(0, os.path.abspath("..")) + +# For plugins that can not read conf.py. +# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 +sys.path.insert(0, os.path.abspath(".")) + +__version__ = "" + +# -- General configuration ------------------------------------------------ + +# If your documentation needs a minimal Sphinx version, state it here. +needs_sphinx = "4.5.0" + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [ + "sphinx.ext.autodoc", + "sphinx.ext.autosummary", + "sphinx.ext.intersphinx", + "sphinx.ext.coverage", + "sphinx.ext.doctest", + "sphinx.ext.napoleon", + "sphinx.ext.todo", + "sphinx.ext.viewcode", + "recommonmark", +] + +# autodoc/autosummary flags +autoclass_content = "both" +autodoc_default_options = {"members": True} +autosummary_generate = True + + +# Add any paths that contain templates here, relative to this directory. +templates_path = ["_templates"] + +# The suffix(es) of source filenames. +# You can specify multiple suffix as a list of string: +# source_suffix = ['.rst', '.md'] +source_suffix = [".rst", ".md"] + +# The encoding of source files. +# source_encoding = 'utf-8-sig' + +# The root toctree document. +root_doc = "index" + +# General information about the project. +project = u"google-cloud-bigquery-datapolicies" +copyright = u"2025, Google, LLC" +author = u"Google APIs" + +# The version info for the project you're documenting, acts as replacement for +# |version| and |release|, also used in various other places throughout the +# built documents. +# +# The full version, including alpha/beta/rc tags. +release = __version__ +# The short X.Y version. +version = ".".join(release.split(".")[0:2]) + +# The language for content autogenerated by Sphinx. Refer to documentation +# for a list of supported languages. +# +# This is also used if you do content translation via gettext catalogs. +# Usually you set "language" from the command line for these cases. +language = None + +# There are two options for replacing |today|: either, you set today to some +# non-false value, then it is used: +# today = '' +# Else, today_fmt is used as the format for a strftime call. +# today_fmt = '%B %d, %Y' + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +exclude_patterns = [ + "_build", + "**/.nox/**/*", + "samples/AUTHORING_GUIDE.md", + "samples/CONTRIBUTING.md", + "samples/snippets/README.rst", +] + +# The reST default role (used for this markup: `text`) to use for all +# documents. +# default_role = None + +# If true, '()' will be appended to :func: etc. cross-reference text. +# add_function_parentheses = True + +# If true, the current module name will be prepended to all description +# unit titles (such as .. function::). +# add_module_names = True + +# If true, sectionauthor and moduleauthor directives will be shown in the +# output. They are ignored by default. +# show_authors = False + +# The name of the Pygments (syntax highlighting) style to use. +pygments_style = "sphinx" + +# A list of ignored prefixes for module index sorting. +# modindex_common_prefix = [] + +# If true, keep warnings as "system message" paragraphs in the built documents. +# keep_warnings = False + +# If true, `todo` and `todoList` produce output, else they produce nothing. +todo_include_todos = True + + +# -- Options for HTML output ---------------------------------------------- + +# The theme to use for HTML and HTML Help pages. See the documentation for +# a list of builtin themes. +html_theme = "alabaster" + +# Theme options are theme-specific and customize the look and feel of a theme +# further. For a list of options available for each theme, see the +# documentation. +html_theme_options = { + "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", + "github_user": "googleapis", + "github_repo": "google-cloud-python", + "github_banner": True, + "font_family": "'Roboto', Georgia, sans", + "head_font_family": "'Roboto', Georgia, serif", + "code_font_family": "'Roboto Mono', 'Consolas', monospace", +} + +# Add any paths that contain custom themes here, relative to this directory. +# html_theme_path = [] + +# The name for this set of Sphinx documents. If None, it defaults to +# " v documentation". +# html_title = None + +# A shorter title for the navigation bar. Default is the same as html_title. +# html_short_title = None + +# The name of an image file (relative to this directory) to place at the top +# of the sidebar. +# html_logo = None + +# The name of an image file (within the static path) to use as favicon of the +# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 +# pixels large. +# html_favicon = None + +# Add any paths that contain custom static files (such as style sheets) here, +# relative to this directory. They are copied after the builtin static files, +# so a file named "default.css" will overwrite the builtin "default.css". +html_static_path = ["_static"] + +# Add any extra paths that contain custom files (such as robots.txt or +# .htaccess) here, relative to this directory. These files are copied +# directly to the root of the documentation. +# html_extra_path = [] + +# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, +# using the given strftime format. +# html_last_updated_fmt = '%b %d, %Y' + +# If true, SmartyPants will be used to convert quotes and dashes to +# typographically correct entities. +# html_use_smartypants = True + +# Custom sidebar templates, maps document names to template names. +# html_sidebars = {} + +# Additional templates that should be rendered to pages, maps page names to +# template names. +# html_additional_pages = {} + +# If false, no module index is generated. +# html_domain_indices = True + +# If false, no index is generated. +# html_use_index = True + +# If true, the index is split into individual pages for each letter. +# html_split_index = False + +# If true, links to the reST sources are added to the pages. +# html_show_sourcelink = True + +# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. +# html_show_sphinx = True + +# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. +# html_show_copyright = True + +# If true, an OpenSearch description file will be output, and all pages will +# contain a tag referring to it. The value of this option must be the +# base URL from which the finished HTML is served. +# html_use_opensearch = '' + +# This is the file name suffix for HTML files (e.g. ".xhtml"). +# html_file_suffix = None + +# Language to be used for generating the HTML full-text search index. +# Sphinx supports the following languages: +# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' +# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' +# html_search_language = 'en' + +# A dictionary with options for the search language support, empty by default. +# Now only 'ja' uses this config value +# html_search_options = {'type': 'default'} + +# The name of a javascript file (relative to the configuration directory) that +# implements a search results scorer. If empty, the default will be used. +# html_search_scorer = 'scorer.js' + +# Output file base name for HTML help builder. +htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" + +# -- Options for warnings ------------------------------------------------------ + + +suppress_warnings = [ + # Temporarily suppress this to avoid "more than one target found for + # cross-reference" warning, which are intractable for us to avoid while in + # a mono-repo. + # See https://github.com/sphinx-doc/sphinx/blob + # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 + "ref.python" +] + +# -- Options for LaTeX output --------------------------------------------- + +latex_elements = { + # The paper size ('letterpaper' or 'a4paper'). + # 'papersize': 'letterpaper', + # The font size ('10pt', '11pt' or '12pt'). + # 'pointsize': '10pt', + # Additional stuff for the LaTeX preamble. + # 'preamble': '', + # Latex figure (float) alignment + # 'figure_align': 'htbp', +} + +# Grouping the document tree into LaTeX files. List of tuples +# (source start file, target name, title, +# author, documentclass [howto, manual, or own class]). +latex_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies.tex", + u"google-cloud-bigquery-datapolicies Documentation", + author, + "manual", + ) +] + +# The name of an image file (relative to this directory) to place at the top of +# the title page. +# latex_logo = None + +# For "manual" documents, if this is true, then toplevel headings are parts, +# not chapters. +# latex_use_parts = False + +# If true, show page references after internal links. +# latex_show_pagerefs = False + +# If true, show URL addresses after external links. +# latex_show_urls = False + +# Documents to append as an appendix to all manuals. +# latex_appendices = [] + +# If false, no module index is generated. +# latex_domain_indices = True + + +# -- Options for manual page output --------------------------------------- + +# One entry per manual page. List of tuples +# (source start file, name, description, authors, manual section). +man_pages = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + [author], + 1, + ) +] + +# If true, show URL addresses after external links. +# man_show_urls = False + + +# -- Options for Texinfo output ------------------------------------------- + +# Grouping the document tree into Texinfo files. List of tuples +# (source start file, target name, title, author, +# dir menu entry, description, category) +texinfo_documents = [ + ( + root_doc, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Documentation", + author, + "google-cloud-bigquery-datapolicies", + "google-cloud-bigquery-datapolicies Library", + "APIs", + ) +] + +# Documents to append as an appendix to all manuals. +# texinfo_appendices = [] + +# If false, no module index is generated. +# texinfo_domain_indices = True + +# How to display URL addresses: 'footnote', 'no', or 'inline'. +# texinfo_show_urls = 'footnote' + +# If true, do not generate a @detailmenu in the "Top" node's menu. +# texinfo_no_detailmenu = False + + +# Example configuration for intersphinx: refer to the Python standard library. +intersphinx_mapping = { + "python": ("https://python.readthedocs.org/en/latest/", None), + "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), + "google.api_core": ( + "https://googleapis.dev/python/google-api-core/latest/", + None, + ), + "grpc": ("https://grpc.github.io/grpc/python/", None), + "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), + "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), +} + + +# Napoleon settings +napoleon_google_docstring = True +napoleon_numpy_docstring = True +napoleon_include_private_with_doc = False +napoleon_include_special_with_doc = True +napoleon_use_admonition_for_examples = False +napoleon_use_admonition_for_notes = False +napoleon_use_admonition_for_references = False +napoleon_use_ivar = False +napoleon_use_param = True +napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst new file mode 100644 index 000000000000..43d478357e99 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst @@ -0,0 +1,10 @@ +.. include:: multiprocessing.rst + + +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v2beta1/services_ + bigquery_datapolicies_v2beta1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst new file mode 100644 index 000000000000..536d17b2ea65 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst @@ -0,0 +1,7 @@ +.. note:: + + Because this client uses :mod:`grpc` library, it is safe to + share instances across threads. In multiprocessing scenarios, the best + practice is to create client instances *after* the invocation of + :func:`os.fork` by :class:`multiprocessing.pool.Pool` or + :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py new file mode 100644 index 000000000000..566b0336c528 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py @@ -0,0 +1,47 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies import gapic_version as package_version + +__version__ = package_version.__version__ + + +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.client import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient + +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import AddGranteesRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import CreateDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DataMaskingPolicy +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DataPolicy +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DeleteDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import GetDataPolicyRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import ListDataPoliciesRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import ListDataPoliciesResponse +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import RemoveGranteesRequest +from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import UpdateDataPolicyRequest + +__all__ = ('DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', + 'AddGranteesRequest', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RemoveGranteesRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py new file mode 100644 index 000000000000..7f1e264b4154 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py @@ -0,0 +1,48 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import DataPolicyServiceClient +from .services.data_policy_service import DataPolicyServiceAsyncClient + +from .types.datapolicy import AddGranteesRequest +from .types.datapolicy import CreateDataPolicyRequest +from .types.datapolicy import DataMaskingPolicy +from .types.datapolicy import DataPolicy +from .types.datapolicy import DeleteDataPolicyRequest +from .types.datapolicy import GetDataPolicyRequest +from .types.datapolicy import ListDataPoliciesRequest +from .types.datapolicy import ListDataPoliciesResponse +from .types.datapolicy import RemoveGranteesRequest +from .types.datapolicy import UpdateDataPolicyRequest + +__all__ = ( + 'DataPolicyServiceAsyncClient', +'AddGranteesRequest', +'CreateDataPolicyRequest', +'DataMaskingPolicy', +'DataPolicy', +'DataPolicyServiceClient', +'DeleteDataPolicyRequest', +'GetDataPolicyRequest', +'ListDataPoliciesRequest', +'ListDataPoliciesResponse', +'RemoveGranteesRequest', +'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json new file mode 100644 index 000000000000..9c66272e873b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json @@ -0,0 +1,178 @@ + { + "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", + "language": "python", + "libraryPackage": "google.cloud.bigquery_datapolicies_v2beta1", + "protoPackage": "google.cloud.bigquery.datapolicies.v2beta1", + "schema": "1.0", + "services": { + "DataPolicyService": { + "clients": { + "grpc": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "grpc-async": { + "libraryClient": "DataPolicyServiceAsyncClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + }, + "rest": { + "libraryClient": "DataPolicyServiceClient", + "rpcs": { + "AddGrantees": { + "methods": [ + "add_grantees" + ] + }, + "CreateDataPolicy": { + "methods": [ + "create_data_policy" + ] + }, + "DeleteDataPolicy": { + "methods": [ + "delete_data_policy" + ] + }, + "GetDataPolicy": { + "methods": [ + "get_data_policy" + ] + }, + "GetIamPolicy": { + "methods": [ + "get_iam_policy" + ] + }, + "ListDataPolicies": { + "methods": [ + "list_data_policies" + ] + }, + "RemoveGrantees": { + "methods": [ + "remove_grantees" + ] + }, + "SetIamPolicy": { + "methods": [ + "set_iam_policy" + ] + }, + "TestIamPermissions": { + "methods": [ + "test_iam_permissions" + ] + }, + "UpdateDataPolicy": { + "methods": [ + "update_data_policy" + ] + } + } + } + } + } + } +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py new file mode 100644 index 000000000000..20a9cd975b02 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py @@ -0,0 +1,16 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed new file mode 100644 index 000000000000..ff02bfbdb46b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed @@ -0,0 +1,2 @@ +# Marker file for PEP 561. +# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py new file mode 100644 index 000000000000..cbf94b283c70 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py @@ -0,0 +1,15 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py new file mode 100644 index 000000000000..deca793e77bb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py @@ -0,0 +1,22 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .client import DataPolicyServiceClient +from .async_client import DataPolicyServiceAsyncClient + +__all__ = ( + 'DataPolicyServiceClient', + 'DataPolicyServiceAsyncClient', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py new file mode 100644 index 000000000000..adb45a8f8b3f --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py @@ -0,0 +1,1435 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging as std_logging +from collections import OrderedDict +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union + +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + +from google.api_core.client_options import ClientOptions +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + + +try: + OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .client import DataPolicyServiceClient + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +class DataPolicyServiceAsyncClient: + """Data Policy Service provides APIs for managing the BigQuery + Data Policy. + """ + + _client: DataPolicyServiceClient + + # Copy defaults from the synchronous client for use here. + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT + DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE + _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE + + data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) + parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + policy_tag_path = staticmethod(DataPolicyServiceClient.policy_tag_path) + parse_policy_tag_path = staticmethod(DataPolicyServiceClient.parse_policy_tag_path) + common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) + parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) + parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) + common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) + parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) + parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) + parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceAsyncClient: The constructed client. + """ + return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore + + from_service_account_json = from_service_account_file + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client instance. + """ + return self._client.transport + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._client._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used + by the client instance. + """ + return self._client._universe_domain + + get_transport_class = DataPolicyServiceClient.get_transport_class + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service async client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport to use. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client = DataPolicyServiceClient( + credentials=credentials, + transport=transport, + client_options=client_options, + client_info=client_info, + + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceAsyncClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._client._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "credentialsType": None, + } + ) + + async def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.CreateDataPolicyRequest, dict]]): + The request object. Request message for the + CreateDataPolicy method. + parent (:class:`str`): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (:class:`google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy`): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy_id (:class:`str`): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + + This corresponds to the ``data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy, data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + if data_policy_id is not None: + request.data_policy_id = data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def add_grantees(self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.add_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.AddGranteesRequest, dict]]): + The request object. Request message for the AddGrantees + method. + data_policy (:class:`str`): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (:class:`MutableSequence[str]`): + Required. IAM principal that should be granted Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.AddGranteesRequest): + request = datapolicy.AddGranteesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees: + request.grantees.extend(grantees) + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.add_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def remove_grantees(self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.remove_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.RemoveGranteesRequest, dict]]): + The request object. Request message for the + RemoveGrantees method. + data_policy (:class:`str`): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (:class:`MutableSequence[str]`): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RemoveGranteesRequest): + request = datapolicy.RemoveGranteesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees: + request.grantees.extend(grantees) + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.remove_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.UpdateDataPolicyRequest, dict]]): + The request object. Request message for the + UpdateDataPolicy method. + data_policy (:class:`google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy`): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): + Optional. The update mask applies to the resource. For + the ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.DeleteDataPolicyRequest, dict]]): + The request object. Request message for the + DeleteDataPolicy method. + name (:class:`str`): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + async def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.GetDataPolicyRequest, dict]]): + The request object. Request message for the GetDataPolicy + method. + name (:class:`str`): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + + Args: + request (Optional[Union[google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest, dict]]): + The request object. Request message for the + ListDataPolicies method. + parent (:class:`str`): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError("If the `request` argument is set, then none of " + "the individual field arguments should be set.") + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__aiter__` convenience method. + response = pagers.ListDataPoliciesAsyncPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + if isinstance(request, dict): + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._client._validate_universe_domain() + + # Send the request. + response = await rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + async def __aenter__(self) -> "DataPolicyServiceAsyncClient": + return self + + async def __aexit__(self, exc_type, exc, tb): + await self.transport.close() + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +__all__ = ( + "DataPolicyServiceAsyncClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py new file mode 100644 index 000000000000..ba6b7f24524a --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py @@ -0,0 +1,1801 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from http import HTTPStatus +import json +import logging as std_logging +import os +import re +from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +import warnings + +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + +from google.api_core import client_options as client_options_lib +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import field_mask_pb2 # type: ignore +from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .transports.grpc import DataPolicyServiceGrpcTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .transports.rest import DataPolicyServiceRestTransport + + +class DataPolicyServiceClientMeta(type): + """Metaclass for the DataPolicyService client. + + This provides class-level methods for building and retrieving + support objects (e.g. transport) without polluting the client instance + objects. + """ + _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + _transport_registry["grpc"] = DataPolicyServiceGrpcTransport + _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport + _transport_registry["rest"] = DataPolicyServiceRestTransport + + def get_transport_class(cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: + """Returns an appropriate transport class. + + Args: + label: The name of the desired transport. If none is + provided, then the first transport in the registry is used. + + Returns: + The transport class to use. + """ + # If a specific transport is requested, return that one. + if label: + return cls._transport_registry[label] + + # No transport is requested; return the default (that is, the first one + # in the dictionary). + return next(iter(cls._transport_registry.values())) + + +class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): + """Data Policy Service provides APIs for managing the BigQuery + Data Policy. + """ + + @staticmethod + def _get_default_mtls_endpoint(api_endpoint): + """Converts api endpoint to mTLS endpoint. + + Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to + "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. + Args: + api_endpoint (Optional[str]): the api endpoint to convert. + Returns: + str: converted mTLS api endpoint. + """ + if not api_endpoint: + return api_endpoint + + mtls_endpoint_re = re.compile( + r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" + ) + + m = mtls_endpoint_re.match(api_endpoint) + name, mtls, sandbox, googledomain = m.groups() + if mtls or not googledomain: + return api_endpoint + + if sandbox: + return api_endpoint.replace( + "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" + ) + + return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") + + # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. + DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" + DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore + DEFAULT_ENDPOINT + ) + + _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" + _DEFAULT_UNIVERSE = "googleapis.com" + + @classmethod + def from_service_account_info(cls, info: dict, *args, **kwargs): + """Creates an instance of this client using the provided credentials + info. + + Args: + info (dict): The service account private key info. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_info(info) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + @classmethod + def from_service_account_file(cls, filename: str, *args, **kwargs): + """Creates an instance of this client using the provided credentials + file. + + Args: + filename (str): The path to the service account private key json + file. + args: Additional arguments to pass to the constructor. + kwargs: Additional arguments to pass to the constructor. + + Returns: + DataPolicyServiceClient: The constructed client. + """ + credentials = service_account.Credentials.from_service_account_file( + filename) + kwargs["credentials"] = credentials + return cls(*args, **kwargs) + + from_service_account_json = from_service_account_file + + @property + def transport(self) -> DataPolicyServiceTransport: + """Returns the transport used by the client instance. + + Returns: + DataPolicyServiceTransport: The transport used by the client + instance. + """ + return self._transport + + @staticmethod + def data_policy_path(project: str,location: str,data_policy: str,) -> str: + """Returns a fully-qualified data_policy string.""" + return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + + @staticmethod + def parse_data_policy_path(path: str) -> Dict[str,str]: + """Parses a data_policy path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def policy_tag_path(project: str,location: str,taxonomy: str,policy_tag: str,) -> str: + """Returns a fully-qualified policy_tag string.""" + return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + + @staticmethod + def parse_policy_tag_path(path: str) -> Dict[str,str]: + """Parses a policy_tag path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_billing_account_path(billing_account: str, ) -> str: + """Returns a fully-qualified billing_account string.""" + return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + + @staticmethod + def parse_common_billing_account_path(path: str) -> Dict[str,str]: + """Parse a billing_account path into its component segments.""" + m = re.match(r"^billingAccounts/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_folder_path(folder: str, ) -> str: + """Returns a fully-qualified folder string.""" + return "folders/{folder}".format(folder=folder, ) + + @staticmethod + def parse_common_folder_path(path: str) -> Dict[str,str]: + """Parse a folder path into its component segments.""" + m = re.match(r"^folders/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_organization_path(organization: str, ) -> str: + """Returns a fully-qualified organization string.""" + return "organizations/{organization}".format(organization=organization, ) + + @staticmethod + def parse_common_organization_path(path: str) -> Dict[str,str]: + """Parse a organization path into its component segments.""" + m = re.match(r"^organizations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_project_path(project: str, ) -> str: + """Returns a fully-qualified project string.""" + return "projects/{project}".format(project=project, ) + + @staticmethod + def parse_common_project_path(path: str) -> Dict[str,str]: + """Parse a project path into its component segments.""" + m = re.match(r"^projects/(?P.+?)$", path) + return m.groupdict() if m else {} + + @staticmethod + def common_location_path(project: str, location: str, ) -> str: + """Returns a fully-qualified location string.""" + return "projects/{project}/locations/{location}".format(project=project, location=location, ) + + @staticmethod + def parse_common_location_path(path: str) -> Dict[str,str]: + """Parse a location path into its component segments.""" + m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) + return m.groupdict() if m else {} + + @classmethod + def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + """Deprecated. Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variable is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + + warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning) + if client_options is None: + client_options = client_options_lib.ClientOptions() + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + + # Figure out the client cert source to use. + client_cert_source = None + if use_client_cert == "true": + if client_options.client_cert_source: + client_cert_source = client_options.client_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + + # Figure out which api endpoint to use. + if client_options.api_endpoint is not None: + api_endpoint = client_options.api_endpoint + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + api_endpoint = cls.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = cls.DEFAULT_ENDPOINT + + return api_endpoint, client_cert_source + + @staticmethod + def _read_environment_variables(): + """Returns the environment variables used by the client. + + Returns: + Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, + GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. + + Raises: + ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not + any of ["true", "false"]. + google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT + is not any of ["auto", "never", "always"]. + """ + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() + universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") + if use_client_cert not in ("true", "false"): + raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + return use_client_cert == "true", use_mtls_endpoint, universe_domain_env + + @staticmethod + def _get_client_cert_source(provided_cert_source, use_cert_flag): + """Return the client cert source to be used by the client. + + Args: + provided_cert_source (bytes): The client certificate source provided. + use_cert_flag (bool): A flag indicating whether to use the client certificate. + + Returns: + bytes or None: The client cert source to be used by the client. + """ + client_cert_source = None + if use_cert_flag: + if provided_cert_source: + client_cert_source = provided_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + return client_cert_source + + @staticmethod + def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + """Return the API endpoint used by the client. + + Args: + api_override (str): The API endpoint override. If specified, this is always + the return value of this function and the other arguments are not used. + client_cert_source (bytes): The client certificate source used by the client. + universe_domain (str): The universe domain used by the client. + use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. + Possible values are "always", "auto", or "never". + + Returns: + str: The API endpoint to be used by the client. + """ + if api_override is not None: + api_endpoint = api_override + elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + if universe_domain != _default_universe: + raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + return api_endpoint + + @staticmethod + def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + """Return the universe domain used by the client. + + Args: + client_universe_domain (Optional[str]): The universe domain configured via the client options. + universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. + + Returns: + str: The universe domain to be used by the client. + + Raises: + ValueError: If the universe domain is an empty string. + """ + universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE + if client_universe_domain is not None: + universe_domain = client_universe_domain + elif universe_domain_env is not None: + universe_domain = universe_domain_env + if len(universe_domain.strip()) == 0: + raise ValueError("Universe Domain cannot be an empty string.") + return universe_domain + + def _validate_universe_domain(self): + """Validates client's and credentials' universe domains are consistent. + + Returns: + bool: True iff the configured universe domain is valid. + + Raises: + ValueError: If the configured universe domain is not valid. + """ + + # NOTE (b/349488459): universe validation is disabled until further notice. + return True + + def _add_cred_info_for_auth_errors( + self, + error: core_exceptions.GoogleAPICallError + ) -> None: + """Adds credential info string to error details for 401/403/404 errors. + + Args: + error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. + """ + if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + return + + cred = self._transport._credentials + + # get_cred_info is only available in google-auth>=2.35.0 + if not hasattr(cred, "get_cred_info"): + return + + # ignore the type check since pypy test fails when get_cred_info + # is not available + cred_info = cred.get_cred_info() # type: ignore + if cred_info and hasattr(error._details, "append"): + error._details.append(json.dumps(cred_info)) + + @property + def api_endpoint(self): + """Return the API endpoint used by the client instance. + + Returns: + str: The API endpoint used by the client instance. + """ + return self._api_endpoint + + @property + def universe_domain(self) -> str: + """Return the universe domain used by the client instance. + + Returns: + str: The universe domain used by the client instance. + """ + return self._universe_domain + + def __init__(self, *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: + """Instantiates the data policy service client. + + Args: + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): + The transport to use, or a Callable that constructs and returns a new transport. + If a Callable is given, it will be called with the same set of initialization + arguments as used in the DataPolicyServiceTransport constructor. + If set to None, a transport is chosen automatically. + client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): + Custom options for the client. + + 1. The ``api_endpoint`` property can be used to override the + default endpoint provided by the client when ``transport`` is + not explicitly provided. Only if this property is not set and + ``transport`` was not explicitly provided, the endpoint is + determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment + variable, which have one of the following values: + "always" (always use the default mTLS endpoint), "never" (always + use the default regular endpoint) and "auto" (auto-switch to the + default mTLS endpoint if client certificate is present; this is + the default value). + + 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable + is "true", then the ``client_cert_source`` property can be used + to provide a client certificate for mTLS transport. If + not provided, the default SSL client certificate will be used if + present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not + set, no client certificate will be used. + + 3. The ``universe_domain`` property can be used to override the + default "googleapis.com" universe. Note that the ``api_endpoint`` + property still takes precedence; and ``universe_domain`` is + currently not supported for mTLS. + + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + """ + self._client_options = client_options + if isinstance(self._client_options, dict): + self._client_options = client_options_lib.from_dict(self._client_options) + if self._client_options is None: + self._client_options = client_options_lib.ClientOptions() + self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + + universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + + self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) + self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) + self._api_endpoint = None # updated below, depending on `transport` + + # Initialize the universe domain validation. + self._is_universe_domain_valid = False + + if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER + # Setup logging. + client_logging.initialize_logging() + + api_key_value = getattr(self._client_options, "api_key", None) + if api_key_value and credentials: + raise ValueError("client_options.api_key and credentials are mutually exclusive") + + # Save or instantiate the transport. + # Ordinarily, we provide the transport, but allowing a custom transport + # instance provides an extensibility point for unusual situations. + transport_provided = isinstance(transport, DataPolicyServiceTransport) + if transport_provided: + # transport is a DataPolicyServiceTransport instance. + if credentials or self._client_options.credentials_file or api_key_value: + raise ValueError("When providing a transport instance, " + "provide its credentials directly.") + if self._client_options.scopes: + raise ValueError( + "When providing a transport instance, provide its scopes " + "directly." + ) + self._transport = cast(DataPolicyServiceTransport, transport) + self._api_endpoint = self._transport.host + + self._api_endpoint = (self._api_endpoint or + DataPolicyServiceClient._get_api_endpoint( + self._client_options.api_endpoint, + self._client_cert_source, + self._universe_domain, + self._use_mtls_endpoint)) + + if not transport_provided: + import google.auth._default # type: ignore + + if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): + credentials = google.auth._default.get_api_key_credentials(api_key_value) + + transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + DataPolicyServiceClient.get_transport_class(transport) + if isinstance(transport, str) or transport is None + else cast(Callable[..., DataPolicyServiceTransport], transport) + ) + # initialize with the provided callable or the passed in class + self._transport = transport_init( + credentials=credentials, + credentials_file=self._client_options.credentials_file, + host=self._api_endpoint, + scopes=self._client_options.scopes, + client_cert_source_for_mtls=self._client_cert_source, + quota_project_id=self._client_options.quota_project_id, + client_info=client_info, + always_use_jwt_access=True, + api_audience=self._client_options.api_audience, + ) + + if "async" not in str(self._transport): + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + _LOGGER.debug( + "Created client `google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient`.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", + "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), + } if hasattr(self._transport, "_credentials") else { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "credentialsType": None, + } + ) + + def create_data_policy(self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.CreateDataPolicyRequest, dict]): + The request object. Request message for the + CreateDataPolicy method. + parent (str): + Required. Resource name of the project that the data + policy will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy): + Required. The data policy to create. The ``name`` field + does not need to be provided for the data policy + creation. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + data_policy_id (str): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + + This corresponds to the ``data_policy_id`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent, data_policy, data_policy_id] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.CreateDataPolicyRequest): + request = datapolicy.CreateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + if data_policy is not None: + request.data_policy = data_policy + if data_policy_id is not None: + request.data_policy_id = data_policy_id + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.create_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def add_grantees(self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.add_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.AddGranteesRequest, dict]): + The request object. Request message for the AddGrantees + method. + data_policy (str): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (MutableSequence[str]): + Required. IAM principal that should be granted Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.AddGranteesRequest): + request = datapolicy.AddGranteesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees is not None: + request.grantees = grantees + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.add_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def remove_grantees(self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.remove_grantees(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.RemoveGranteesRequest, dict]): + The request object. Request message for the + RemoveGrantees method. + data_policy (str): + Required. Resource name of this data policy, in the + format of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + grantees (MutableSequence[str]): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the + data policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + + This corresponds to the ``grantees`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, grantees] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.RemoveGranteesRequest): + request = datapolicy.RemoveGranteesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if grantees is not None: + request.grantees = grantees + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.remove_grantees] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy", request.data_policy), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def update_data_policy(self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.UpdateDataPolicyRequest, dict]): + The request object. Request message for the + UpdateDataPolicy method. + data_policy (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` + field. Other fields are updated to the specified values + based on the field masks. + + This corresponds to the ``data_policy`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + Optional. The update mask applies to the resource. For + the ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are + allowed to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are + not allowed. + + This corresponds to the ``update_mask`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [data_policy, update_mask] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.UpdateDataPolicyRequest): + request = datapolicy.UpdateDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if data_policy is not None: + request.data_policy = data_policy + if update_mask is not None: + request.update_mask = update_mask + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.update_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("data_policy.name", request.data_policy.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def delete_data_policy(self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: + r"""Deletes the data policy specified by its resource + name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.DeleteDataPolicyRequest, dict]): + The request object. Request message for the + DeleteDataPolicy method. + name (str): + Required. Resource name of the data policy to delete. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.DeleteDataPolicyRequest): + request = datapolicy.DeleteDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + def get_data_policy(self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: + r"""Gets the data policy specified by its resource name. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.GetDataPolicyRequest, dict]): + The request object. Request message for the GetDataPolicy + method. + name (str): + Required. Resource name of the requested data policy. + Format is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + + This corresponds to the ``name`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy: + Represents the label-policy binding. + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [name] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.GetDataPolicyRequest): + request = datapolicy.GetDataPolicyRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if name is not None: + request.name = name + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_data_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("name", request.name), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def list_data_policies(self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: + r"""List all of the data policies in the specified parent + project. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + + def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + + Args: + request (Union[google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest, dict]): + The request object. Request message for the + ListDataPolicies method. + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + + This corresponds to the ``parent`` field + on the ``request`` instance; if ``request`` is provided, this + should not be set. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.pagers.ListDataPoliciesPager: + Response message for the + ListDataPolicies method. + Iterating over this object will yield + results and resolve additional pages + automatically. + + """ + # Create or coerce a protobuf request object. + # - Quick check: If we got a request object, we should *not* have + # gotten any keyword arguments that map to the request. + flattened_params = [parent] + has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + if request is not None and has_flattened_params: + raise ValueError('If the `request` argument is set, then none of ' + 'the individual field arguments should be set.') + + # - Use the request object if provided (there's no risk of modifying the input as + # there are no flattened fields), or create one. + if not isinstance(request, datapolicy.ListDataPoliciesRequest): + request = datapolicy.ListDataPoliciesRequest(request) + # If we have keyword arguments corresponding to fields on the + # request, apply these. + if parent is not None: + request.parent = parent + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.list_data_policies] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("parent", request.parent), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # This method is paged; wrap the response in a pager, which provides + # an `__iter__` convenience method. + response = pagers.ListDataPoliciesPager( + method=rpc, + request=request, + response=response, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def get_iam_policy(self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Gets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.GetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.GetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def set_iam_policy(self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: + r"""Sets the IAM policy for the specified data policy. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which specifies access + controls for Google Cloud resources. + + A Policy is a collection of bindings. A binding binds + one or more members, or principals, to a single role. + Principals can be user accounts, service accounts, + Google groups, and domains (such as G Suite). A role + is a named list of permissions; each role can be an + IAM predefined role or a user-created custom role. + + For some types of Google Cloud resources, a binding + can also specify a condition, which is a logical + expression that allows access to a resource only if + the expression evaluates to true. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the [IAM + documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). + + **JSON example:** + + :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` + + **YAML example:** + + :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` + + For a description of IAM and its features, see the + [IAM + documentation](\ https://cloud.google.com/iam/docs/). + + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.SetIamPolicyRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.SetIamPolicyRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def test_iam_permissions(self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Returns the caller's permission on the specified data + policy resource. + + .. code-block:: python + + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html + from google.cloud import bigquery_datapolicies_v2beta1 + from google.iam.v1 import iam_policy_pb2 # type: ignore + + def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + + Args: + request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: + Response message for TestIamPermissions method. + """ + # Create or coerce a protobuf request object. + if isinstance(request, dict): + # - The request isn't a proto-plus wrapped type, + # so it must be constructed via keyword expansion. + request = iam_policy_pb2.TestIamPermissionsRequest(**request) + elif not request: + # Null request, just make one. + request = iam_policy_pb2.TestIamPermissionsRequest() + + # Wrap the RPC method; this adds retry and timeout information, + # and friendly error handling. + rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] + + # Certain fields should be provided within the metadata header; + # add these here. + metadata = tuple(metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ("resource", request.resource), + )), + ) + + # Validate the universe domain. + self._validate_universe_domain() + + # Send the request. + response = rpc( + request, + retry=retry, + timeout=timeout, + metadata=metadata, + ) + + # Done; return the response. + return response + + def __enter__(self) -> "DataPolicyServiceClient": + return self + + def __exit__(self, type, value, traceback): + """Releases underlying transport's resources. + + .. warning:: + ONLY use as a context manager if the transport is NOT shared + with other clients! Exiting the with block will CLOSE the transport + and may cause errors in other clients! + """ + self.transport.close() + + + + + + + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + +__all__ = ( + "DataPolicyServiceClient", +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py new file mode 100644 index 000000000000..37d84c39fda2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py @@ -0,0 +1,166 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.api_core import retry_async as retries_async +from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy + + +class ListDataPoliciesPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse` object, and + provides an ``__iter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__iter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiate the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.Retry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + + def __iter__(self) -> Iterator[datapolicy.DataPolicy]: + for page in self.pages: + yield from page.data_policies + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + + +class ListDataPoliciesAsyncPager: + """A pager for iterating through ``list_data_policies`` requests. + + This class thinly wraps an initial + :class:`google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse` object, and + provides an ``__aiter__`` method to iterate through its + ``data_policies`` field. + + If there are more pages, the ``__aiter__`` method will make additional + ``ListDataPolicies`` requests and continue to iterate + through the ``data_policies`` field on the + corresponding responses. + + All the usual :class:`google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse` + attributes are available on the pager. If multiple requests are made, only + the most recent response is retained, and thus used for attribute lookup. + """ + def __init__(self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + """Instantiates the pager. + + Args: + method (Callable): The method that was originally called, and + which instantiated this pager. + request (google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest): + The initial request object. + response (google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesResponse): + The initial response object. + retry (google.api_core.retry.AsyncRetry): Designation of what errors, + if any, should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + self._method = method + self._request = datapolicy.ListDataPoliciesRequest(request) + self._response = response + self._retry = retry + self._timeout = timeout + self._metadata = metadata + + def __getattr__(self, name: str) -> Any: + return getattr(self._response, name) + + @property + async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: + yield self._response + while self._response.next_page_token: + self._request.page_token = self._response.next_page_token + self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: + async def async_generator(): + async for page in self.pages: + for response in page.data_policies: + yield response + + return async_generator() + + def __repr__(self) -> str: + return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst new file mode 100644 index 000000000000..b83d156af245 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst @@ -0,0 +1,9 @@ + +transport inheritance structure +_______________________________ + +`DataPolicyServiceTransport` is the ABC for all transports. +- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). +- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). +- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). +- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py new file mode 100644 index 000000000000..2c95ef809668 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py @@ -0,0 +1,38 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from collections import OrderedDict +from typing import Dict, Type + +from .base import DataPolicyServiceTransport +from .grpc import DataPolicyServiceGrpcTransport +from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport +from .rest import DataPolicyServiceRestTransport +from .rest import DataPolicyServiceRestInterceptor + + +# Compile a registry of transports. +_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] +_transport_registry['grpc'] = DataPolicyServiceGrpcTransport +_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry['rest'] = DataPolicyServiceRestTransport + +__all__ = ( + 'DataPolicyServiceTransport', + 'DataPolicyServiceGrpcTransport', + 'DataPolicyServiceGrpcAsyncIOTransport', + 'DataPolicyServiceRestTransport', + 'DataPolicyServiceRestInterceptor', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py new file mode 100644 index 000000000000..0191e15330e0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py @@ -0,0 +1,399 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import abc +from typing import Awaitable, Callable, Dict, Optional, Sequence, Union + +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + +import google.auth # type: ignore +import google.api_core +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceTransport(abc.ABC): + """Abstract transport class for DataPolicyService.""" + + AUTH_SCOPES = ( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', + ) + + DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + + def __init__( + self, *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A list of scopes. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + """ + + scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} + + # Save the scopes. + self._scopes = scopes + if not hasattr(self, "_ignore_credentials"): + self._ignore_credentials: bool = False + + # If no credentials are provided, then determine the appropriate + # defaults. + if credentials and credentials_file: + raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + + if credentials_file is not None: + credentials, _ = google.auth.load_credentials_from_file( + credentials_file, + **scopes_kwargs, + quota_project_id=quota_project_id + ) + elif credentials is None and not self._ignore_credentials: + credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + # Don't apply audience if the credentials file passed from user. + if hasattr(credentials, "with_gdch_audience"): + credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + + # If the credentials are service account credentials, then always try to use self signed JWT. + if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + credentials = credentials.with_always_use_jwt_access(True) + + # Save the credentials. + self._credentials = credentials + + # Save the hostname. Default to port 443 (HTTPS) if none is specified. + if ':' not in host: + host += ':443' + self._host = host + + @property + def host(self): + return self._host + + def _prep_wrapped_messages(self, client_info): + # Precompute the wrapped methods. + self._wrapped_methods = { + self.create_data_policy: gapic_v1.method.wrap_method( + self.create_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.add_grantees: gapic_v1.method.wrap_method( + self.add_grantees, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.remove_grantees: gapic_v1.method.wrap_method( + self.remove_grantees, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.update_data_policy: gapic_v1.method.wrap_method( + self.update_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.delete_data_policy: gapic_v1.method.wrap_method( + self.delete_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_data_policy: gapic_v1.method.wrap_method( + self.get_data_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.list_data_policies: gapic_v1.method.wrap_method( + self.list_data_policies, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_iam_policy: gapic_v1.method.wrap_method( + self.get_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.set_iam_policy: gapic_v1.method.wrap_method( + self.set_iam_policy, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.test_iam_permissions: gapic_v1.method.wrap_method( + self.test_iam_permissions, + default_retry=retries.Retry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + } + + def close(self): + """Closes resources associated with the transport. + + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! + """ + raise NotImplementedError() + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[ + empty_pb2.Empty, + Awaitable[empty_pb2.Empty] + ]]: + raise NotImplementedError() + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[ + datapolicy.DataPolicy, + Awaitable[datapolicy.DataPolicy] + ]]: + raise NotImplementedError() + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse] + ]]: + raise NotImplementedError() + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[ + policy_pb2.Policy, + Awaitable[policy_pb2.Policy] + ]]: + raise NotImplementedError() + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse] + ]]: + raise NotImplementedError() + + @property + def kind(self) -> str: + raise NotImplementedError() + + +__all__ = ( + 'DataPolicyServiceTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py new file mode 100644 index 000000000000..5765b0af6257 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py @@ -0,0 +1,598 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json +import logging as std_logging +import pickle +import warnings +from typing import Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import grpc_helpers +from google.api_core import gapic_v1 +import google.auth # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER + def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = response.result() + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response for {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": client_call_details.method, + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): + """gRPC backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + _stubs: Dict[str, Callable] + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if a ``channel`` instance is provided. + channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, grpc.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientInterceptor() + self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> grpc.Channel: + """Create and return a gRPC channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is mutually exclusive with credentials. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + grpc.Channel: A gRPC channel object. + + Raises: + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + + return grpc_helpers.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + @property + def grpc_channel(self) -> grpc.Channel: + """Return the channel designed to connect to this service. + """ + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the add grantees method over gRPC. + + Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + Returns: + Callable[[~.AddGranteesRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'add_grantees' not in self._stubs: + self._stubs['add_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees', + request_serializer=datapolicy.AddGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['add_grantees'] + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the remove grantees method over gRPC. + + Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + Returns: + Callable[[~.RemoveGranteesRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'remove_grantees' not in self._stubs: + self._stubs['remove_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees', + request_serializer=datapolicy.RemoveGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['remove_grantees'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + ~.Empty]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + ~.DataPolicy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + ~.ListDataPoliciesResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + ~.Policy]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + ~.TestIamPermissionsResponse]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def close(self): + self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc" + + +__all__ = ( + 'DataPolicyServiceGrpcTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py new file mode 100644 index 000000000000..6859c56a7aef --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py @@ -0,0 +1,774 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import inspect +import json +import pickle +import logging as std_logging +import warnings +from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union + +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers_async +from google.api_core import exceptions as core_exceptions +from google.api_core import retry_async as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.protobuf.json_format import MessageToJson +import google.protobuf.message + +import grpc # type: ignore +import proto # type: ignore +from grpc.experimental import aio # type: ignore + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO +from .grpc import DataPolicyServiceGrpcTransport + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = std_logging.getLogger(__name__) + + +class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER + async def intercept_unary_unary(self, continuation, client_call_details, request): + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + if logging_enabled: # pragma: NO COVER + request_metadata = client_call_details.metadata + if isinstance(request, proto.Message): + request_payload = type(request).to_json(request) + elif isinstance(request, google.protobuf.message.Message): + request_payload = MessageToJson(request) + else: + request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" + + request_metadata = { + key: value.decode("utf-8") if isinstance(value, bytes) else value + for key, value in request_metadata + } + grpc_request = { + "payload": request_payload, + "requestMethod": "grpc", + "metadata": dict(request_metadata), + } + _LOGGER.debug( + f"Sending request for {client_call_details.method}", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "request": grpc_request, + "metadata": grpc_request["metadata"], + }, + ) + response = await continuation(client_call_details, request) + if logging_enabled: # pragma: NO COVER + response_metadata = await response.trailing_metadata() + # Convert gRPC metadata `` to list of tuples + metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + result = await response + if isinstance(result, proto.Message): + response_payload = type(result).to_json(result) + elif isinstance(result, google.protobuf.message.Message): + response_payload = MessageToJson(result) + else: + response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" + grpc_response = { + "payload": response_payload, + "metadata": metadata, + "status": "OK", + } + _LOGGER.debug( + f"Received response to rpc {client_call_details.method}.", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": str(client_call_details.method), + "response": grpc_response, + "metadata": grpc_response["metadata"], + }, + ) + return response + + +class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): + """gRPC AsyncIO backend transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends protocol buffers over the wire using gRPC (which is built on + top of HTTP/2); the ``grpcio`` package must be installed. + """ + + _grpc_channel: aio.Channel + _stubs: Dict[str, Callable] = {} + + @classmethod + def create_channel(cls, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs) -> aio.Channel: + """Create and return a gRPC AsyncIO channel object. + Args: + host (Optional[str]): The host for the channel to use. + credentials (Optional[~.Credentials]): The + authorization credentials to attach to requests. These + credentials identify this application to the service. If + none are specified, the client will attempt to ascertain + the credentials from the environment. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + kwargs (Optional[dict]): Keyword arguments, which are passed to the + channel creation. + Returns: + aio.Channel: A gRPC AsyncIO channel object. + """ + + return grpc_helpers_async.create_channel( + host, + credentials=credentials, + credentials_file=credentials_file, + quota_project_id=quota_project_id, + default_scopes=cls.AUTH_SCOPES, + scopes=scopes, + default_host=cls.DEFAULT_HOST, + **kwargs + ) + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + This argument is ignored if a ``channel`` instance is provided. + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if a ``channel`` instance is provided. + scopes (Optional[Sequence[str]]): A optional list of scopes needed for this + service. These are only used when credentials are not specified and + are passed to :func:`google.auth.default`. + channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): + A ``Channel`` instance through which to make calls, or a Callable + that constructs and returns one. If set to None, ``self.create_channel`` + is used to create the channel. If a Callable is given, it will be called + with the same arguments as used in ``self.create_channel``. + api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. + If provided, it overrides the ``host`` argument and tries to create + a mutual TLS channel with client SSL credentials from + ``client_cert_source`` or application default SSL credentials. + client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): + Deprecated. A callback to provide client SSL certificate bytes and + private key bytes, both in PEM format. It is ignored if + ``api_mtls_endpoint`` is None. + ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials + for the grpc channel. It is ignored if a ``channel`` instance is provided. + client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): + A callback to provide client certificate bytes and private key bytes, + both in PEM format. It is used to configure a mutual TLS channel. It is + ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you're developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + + Raises: + google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport + creation failed for any reason. + google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` + and ``credentials_file`` are passed. + """ + self._grpc_channel = None + self._ssl_channel_credentials = ssl_channel_credentials + self._stubs: Dict[str, Callable] = {} + + if api_mtls_endpoint: + warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) + if client_cert_source: + warnings.warn("client_cert_source is deprecated", DeprecationWarning) + + if isinstance(channel, aio.Channel): + # Ignore credentials if a channel was passed. + credentials = None + self._ignore_credentials = True + # If a channel was explicitly provided, set it. + self._grpc_channel = channel + self._ssl_channel_credentials = None + else: + if api_mtls_endpoint: + host = api_mtls_endpoint + + # Create SSL credentials with client_cert_source or application + # default SSL credentials. + if client_cert_source: + cert, key = client_cert_source() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + else: + self._ssl_channel_credentials = SslCredentials().ssl_credentials + + else: + if client_cert_source_for_mtls and not ssl_channel_credentials: + cert, key = client_cert_source_for_mtls() + self._ssl_channel_credentials = grpc.ssl_channel_credentials( + certificate_chain=cert, private_key=key + ) + + # The base transport sets the host, credentials and scopes + super().__init__( + host=host, + credentials=credentials, + credentials_file=credentials_file, + scopes=scopes, + quota_project_id=quota_project_id, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + + if not self._grpc_channel: + # initialize with the provided callable or the default channel + channel_init = channel or type(self).create_channel + self._grpc_channel = channel_init( + self._host, + # use the credentials which are saved + credentials=self._credentials, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, + scopes=self._scopes, + ssl_credentials=self._ssl_channel_credentials, + quota_project_id=quota_project_id, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + self._interceptor = _LoggingClientAIOInterceptor() + self._grpc_channel._unary_unary_interceptors.append(self._interceptor) + self._logged_channel = self._grpc_channel + self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + # Wrap messages. This must be done after self._logged_channel exists + self._prep_wrapped_messages(client_info) + + @property + def grpc_channel(self) -> aio.Channel: + """Create the channel designed to connect to this service. + + This property caches on the instance; repeated calls return + the same channel. + """ + # Return the channel from cache. + return self._grpc_channel + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the create data policy method over gRPC. + + Creates a new data policy under a project with the given + ``data_policy_id`` (used as the display name), and data policy + type. + + Returns: + Callable[[~.CreateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'create_data_policy' not in self._stubs: + self._stubs['create_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy', + request_serializer=datapolicy.CreateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['create_data_policy'] + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the add grantees method over gRPC. + + Adds new grantees to a data policy. + The new grantees will be added to the existing grantees. + If the request contains a duplicate grantee, the grantee + will be ignored. If the request contains a grantee that + already exists, the grantee will be ignored. + + Returns: + Callable[[~.AddGranteesRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'add_grantees' not in self._stubs: + self._stubs['add_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees', + request_serializer=datapolicy.AddGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['add_grantees'] + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the remove grantees method over gRPC. + + Removes grantees from a data policy. + The grantees will be removed from the existing grantees. + If the request contains a grantee that does not exist, + the grantee will be ignored. + + Returns: + Callable[[~.RemoveGranteesRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'remove_grantees' not in self._stubs: + self._stubs['remove_grantees'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees', + request_serializer=datapolicy.RemoveGranteesRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['remove_grantees'] + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the update data policy method over gRPC. + + Updates the metadata for an existing data policy. The + target data policy can be specified by the resource + name. + + Returns: + Callable[[~.UpdateDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'update_data_policy' not in self._stubs: + self._stubs['update_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy', + request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['update_data_policy'] + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Awaitable[empty_pb2.Empty]]: + r"""Return a callable for the delete data policy method over gRPC. + + Deletes the data policy specified by its resource + name. + + Returns: + Callable[[~.DeleteDataPolicyRequest], + Awaitable[~.Empty]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'delete_data_policy' not in self._stubs: + self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy', + request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, + response_deserializer=empty_pb2.Empty.FromString, + ) + return self._stubs['delete_data_policy'] + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Awaitable[datapolicy.DataPolicy]]: + r"""Return a callable for the get data policy method over gRPC. + + Gets the data policy specified by its resource name. + + Returns: + Callable[[~.GetDataPolicyRequest], + Awaitable[~.DataPolicy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_data_policy' not in self._stubs: + self._stubs['get_data_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy', + request_serializer=datapolicy.GetDataPolicyRequest.serialize, + response_deserializer=datapolicy.DataPolicy.deserialize, + ) + return self._stubs['get_data_policy'] + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse]]: + r"""Return a callable for the list data policies method over gRPC. + + List all of the data policies in the specified parent + project. + + Returns: + Callable[[~.ListDataPoliciesRequest], + Awaitable[~.ListDataPoliciesResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'list_data_policies' not in self._stubs: + self._stubs['list_data_policies'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies', + request_serializer=datapolicy.ListDataPoliciesRequest.serialize, + response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, + ) + return self._stubs['list_data_policies'] + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the get iam policy method over gRPC. + + Gets the IAM policy for the specified data policy. + + Returns: + Callable[[~.GetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'get_iam_policy' not in self._stubs: + self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy', + request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['get_iam_policy'] + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Awaitable[policy_pb2.Policy]]: + r"""Return a callable for the set iam policy method over gRPC. + + Sets the IAM policy for the specified data policy. + + Returns: + Callable[[~.SetIamPolicyRequest], + Awaitable[~.Policy]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'set_iam_policy' not in self._stubs: + self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy', + request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, + response_deserializer=policy_pb2.Policy.FromString, + ) + return self._stubs['set_iam_policy'] + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + r"""Return a callable for the test iam permissions method over gRPC. + + Returns the caller's permission on the specified data + policy resource. + + Returns: + Callable[[~.TestIamPermissionsRequest], + Awaitable[~.TestIamPermissionsResponse]]: + A function that, when called, will call the underlying RPC + on the server. + """ + # Generate a "stub function" on-the-fly which will actually make + # the request. + # gRPC handles serialization and deserialization, so we just need + # to pass in the functions for each. + if 'test_iam_permissions' not in self._stubs: + self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( + '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions', + request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, + response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, + ) + return self._stubs['test_iam_permissions'] + + def _prep_wrapped_messages(self, client_info): + """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + self._wrapped_methods = { + self.create_data_policy: self._wrap_method( + self.create_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.add_grantees: self._wrap_method( + self.add_grantees, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.remove_grantees: self._wrap_method( + self.remove_grantees, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.update_data_policy: self._wrap_method( + self.update_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.delete_data_policy: self._wrap_method( + self.delete_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_data_policy: self._wrap_method( + self.get_data_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.list_data_policies: self._wrap_method( + self.list_data_policies, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.get_iam_policy: self._wrap_method( + self.get_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.set_iam_policy: self._wrap_method( + self.set_iam_policy, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + self.test_iam_permissions: self._wrap_method( + self.test_iam_permissions, + default_retry=retries.AsyncRetry( + initial=1.0, + maximum=60.0, + multiplier=1.3, + predicate=retries.if_exception_type( + core_exceptions.DeadlineExceeded, + core_exceptions.ResourceExhausted, + core_exceptions.ServiceUnavailable, + ), + deadline=64.0, + ), + default_timeout=64.0, + client_info=client_info, + ), + } + + def _wrap_method(self, func, *args, **kwargs): + if self._wrap_with_kind: # pragma: NO COVER + kwargs["kind"] = self.kind + return gapic_v1.method_async.wrap_method(func, *args, **kwargs) + + def close(self): + return self._logged_channel.close() + + @property + def kind(self) -> str: + return "grpc_asyncio" + + +__all__ = ( + 'DataPolicyServiceGrpcAsyncIOTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py new file mode 100644 index 000000000000..8a958bfae26e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py @@ -0,0 +1,2008 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging +import json # type: ignore + +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.api_core import rest_helpers +from google.api_core import rest_streaming +from google.api_core import gapic_v1 +import google.protobuf + +from google.protobuf import json_format + +from requests import __version__ as requests_version +import dataclasses +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +from .rest_base import _BaseDataPolicyServiceRestTransport +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object, None] # type: ignore + +try: + from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER +except ImportError: # pragma: NO COVER + CLIENT_LOGGING_SUPPORTED = False + +_LOGGER = logging.getLogger(__name__) + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=f"requests@{requests_version}", +) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER + DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ + + +class DataPolicyServiceRestInterceptor: + """Interceptor for DataPolicyService. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the DataPolicyServiceRestTransport. + + .. code-block:: python + class MyCustomDataPolicyServiceInterceptor(DataPolicyServiceRestInterceptor): + def pre_add_grantees(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_add_grantees(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_create_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_delete_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def pre_get_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_get_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_data_policies(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_data_policies(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_remove_grantees(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_remove_grantees(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_set_iam_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_set_iam_policy(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_test_iam_permissions(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_test_iam_permissions(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_update_data_policy(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_data_policy(self, response): + logging.log(f"Received response: {response}") + return response + + transport = DataPolicyServiceRestTransport(interceptor=MyCustomDataPolicyServiceInterceptor()) + client = DataPolicyServiceClient(transport=transport) + + + """ + def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for add_grantees + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for add_grantees + + DEPRECATED. Please use the `post_add_grantees_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_add_grantees` interceptor runs + before the `post_add_grantees_with_metadata` interceptor. + """ + return response + + def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for add_grantees + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_add_grantees_with_metadata` + interceptor in new development instead of the `post_add_grantees` interceptor. + When both interceptors are used, this `post_add_grantees_with_metadata` interceptor runs after the + `post_add_grantees` interceptor. The (possibly modified) response returned by + `post_add_grantees` will be passed to + `post_add_grantees_with_metadata`. + """ + return response, metadata + + def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for create_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for create_data_policy + + DEPRECATED. Please use the `post_create_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_create_data_policy` interceptor runs + before the `post_create_data_policy_with_metadata` interceptor. + """ + return response + + def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for create_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_create_data_policy_with_metadata` + interceptor in new development instead of the `post_create_data_policy` interceptor. + When both interceptors are used, this `post_create_data_policy_with_metadata` interceptor runs after the + `post_create_data_policy` interceptor. The (possibly modified) response returned by + `post_create_data_policy` will be passed to + `post_create_data_policy_with_metadata`. + """ + return response, metadata + + def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for delete_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for get_data_policy + + DEPRECATED. Please use the `post_get_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_data_policy` interceptor runs + before the `post_get_data_policy_with_metadata` interceptor. + """ + return response + + def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_data_policy_with_metadata` + interceptor in new development instead of the `post_get_data_policy` interceptor. + When both interceptors are used, this `post_get_data_policy_with_metadata` interceptor runs after the + `post_get_data_policy` interceptor. The (possibly modified) response returned by + `post_get_data_policy` will be passed to + `post_get_data_policy_with_metadata`. + """ + return response, metadata + + def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for get_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for get_iam_policy + + DEPRECATED. Please use the `post_get_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_get_iam_policy` interceptor runs + before the `post_get_iam_policy_with_metadata` interceptor. + """ + return response + + def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for get_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_get_iam_policy_with_metadata` + interceptor in new development instead of the `post_get_iam_policy` interceptor. + When both interceptors are used, this `post_get_iam_policy_with_metadata` interceptor runs after the + `post_get_iam_policy` interceptor. The (possibly modified) response returned by + `post_get_iam_policy` will be passed to + `post_get_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for list_data_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: + """Post-rpc interceptor for list_data_policies + + DEPRECATED. Please use the `post_list_data_policies_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_list_data_policies` interceptor runs + before the `post_list_data_policies_with_metadata` interceptor. + """ + return response + + def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for list_data_policies + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_list_data_policies_with_metadata` + interceptor in new development instead of the `post_list_data_policies` interceptor. + When both interceptors are used, this `post_list_data_policies_with_metadata` interceptor runs after the + `post_list_data_policies` interceptor. The (possibly modified) response returned by + `post_list_data_policies` will be passed to + `post_list_data_policies_with_metadata`. + """ + return response, metadata + + def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for remove_grantees + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for remove_grantees + + DEPRECATED. Please use the `post_remove_grantees_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_remove_grantees` interceptor runs + before the `post_remove_grantees_with_metadata` interceptor. + """ + return response + + def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for remove_grantees + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_remove_grantees_with_metadata` + interceptor in new development instead of the `post_remove_grantees` interceptor. + When both interceptors are used, this `post_remove_grantees_with_metadata` interceptor runs after the + `post_remove_grantees` interceptor. The (possibly modified) response returned by + `post_remove_grantees` will be passed to + `post_remove_grantees_with_metadata`. + """ + return response, metadata + + def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for set_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: + """Post-rpc interceptor for set_iam_policy + + DEPRECATED. Please use the `post_set_iam_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_set_iam_policy` interceptor runs + before the `post_set_iam_policy_with_metadata` interceptor. + """ + return response + + def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for set_iam_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_set_iam_policy_with_metadata` + interceptor in new development instead of the `post_set_iam_policy` interceptor. + When both interceptors are used, this `post_set_iam_policy_with_metadata` interceptor runs after the + `post_set_iam_policy` interceptor. The (possibly modified) response returned by + `post_set_iam_policy` will be passed to + `post_set_iam_policy_with_metadata`. + """ + return response, metadata + + def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for test_iam_permissions + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: + """Post-rpc interceptor for test_iam_permissions + + DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_test_iam_permissions` interceptor runs + before the `post_test_iam_permissions_with_metadata` interceptor. + """ + return response + + def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for test_iam_permissions + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_test_iam_permissions_with_metadata` + interceptor in new development instead of the `post_test_iam_permissions` interceptor. + When both interceptors are used, this `post_test_iam_permissions_with_metadata` interceptor runs after the + `post_test_iam_permissions` interceptor. The (possibly modified) response returned by + `post_test_iam_permissions` will be passed to + `post_test_iam_permissions_with_metadata`. + """ + return response, metadata + + def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + """Pre-rpc interceptor for update_data_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the DataPolicyService server. + """ + return request, metadata + + def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + """Post-rpc interceptor for update_data_policy + + DEPRECATED. Please use the `post_update_data_policy_with_metadata` + interceptor instead. + + Override in a subclass to read or manipulate the response + after it is returned by the DataPolicyService server but before + it is returned to user code. This `post_update_data_policy` interceptor runs + before the `post_update_data_policy_with_metadata` interceptor. + """ + return response + + def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + """Post-rpc interceptor for update_data_policy + + Override in a subclass to read or manipulate the response or metadata after it + is returned by the DataPolicyService server but before it is returned to user code. + + We recommend only using this `post_update_data_policy_with_metadata` + interceptor in new development instead of the `post_update_data_policy` interceptor. + When both interceptors are used, this `post_update_data_policy_with_metadata` interceptor runs after the + `post_update_data_policy` interceptor. The (possibly modified) response returned by + `post_update_data_policy` will be passed to + `post_update_data_policy_with_metadata`. + """ + return response, metadata + + +@dataclasses.dataclass +class DataPolicyServiceRestStub: + _session: AuthorizedSession + _host: str + _interceptor: DataPolicyServiceRestInterceptor + + +class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): + """REST backend synchronous transport for DataPolicyService. + + Data Policy Service provides APIs for managing the BigQuery + Data Policy. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[ + ], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + interceptor: Optional[DataPolicyServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + url_scheme=url_scheme, + api_audience=api_audience + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST) + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or DataPolicyServiceRestInterceptor() + self._prep_wrapped_messages(client_info) + + class _AddGrantees(_BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.AddGrantees") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.AddGranteesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the add grantees method over HTTP. + + Args: + request (~.datapolicy.AddGranteesRequest): + The request object. Request message for the AddGrantees + method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + + request, metadata = self._interceptor.pre_add_grantees(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.AddGrantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "AddGrantees", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._AddGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_add_grantees(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_add_grantees_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.add_grantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "AddGrantees", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.CreateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.CreateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the create data policy method over HTTP. + + Args: + request (~.datapolicy.CreateDataPolicyRequest): + The request object. Request message for the + CreateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_create_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.CreateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "CreateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_create_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.create_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "CreateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.DeleteDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ): + r"""Call the delete data policy method over HTTP. + + Args: + request (~.datapolicy.DeleteDataPolicyRequest): + The request object. Request message for the + DeleteDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.DeleteDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "DeleteDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.GetDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the get data policy method over HTTP. + + Args: + request (~.datapolicy.GetDataPolicyRequest): + The request object. Request message for the GetDataPolicy + method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.GetDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "GetDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.get_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "GetDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.GetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.GetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the get iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.GetIamPolicyRequest): + The request object. Request message for ``GetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.GetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "GetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_get_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.get_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "GetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.ListDataPolicies") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + return response + + def __call__(self, + request: datapolicy.ListDataPoliciesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.ListDataPoliciesResponse: + r"""Call the list data policies method over HTTP. + + Args: + request (~.datapolicy.ListDataPoliciesRequest): + The request object. Request message for the + ListDataPolicies method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.ListDataPoliciesResponse: + Response message for the + ListDataPolicies method. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + + request, metadata = self._interceptor.pre_list_data_policies(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.ListDataPolicies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "ListDataPolicies", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.ListDataPoliciesResponse() + pb_resp = datapolicy.ListDataPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_list_data_policies(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.list_data_policies", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "ListDataPolicies", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _RemoveGrantees(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.RemoveGrantees") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.RemoveGranteesRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the remove grantees method over HTTP. + + Args: + request (~.datapolicy.RemoveGranteesRequest): + The request object. Request message for the + RemoveGrantees method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + + request, metadata = self._interceptor.pre_remove_grantees(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.RemoveGrantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "RemoveGrantees", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._RemoveGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_remove_grantees(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_remove_grantees_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.remove_grantees", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "RemoveGrantees", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.SetIamPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.SetIamPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> policy_pb2.Policy: + r"""Call the set iam policy method over HTTP. + + Args: + request (~.iam_policy_pb2.SetIamPolicyRequest): + The request object. Request message for ``SetIamPolicy`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.policy_pb2.Policy: + An Identity and Access Management (IAM) policy, which + specifies access controls for Google Cloud resources. + + A ``Policy`` is a collection of ``bindings``. A + ``binding`` binds one or more ``members``, or + principals, to a single ``role``. Principals can be user + accounts, service accounts, Google groups, and domains + (such as G Suite). A ``role`` is a named list of + permissions; each ``role`` can be an IAM predefined role + or a user-created custom role. + + For some types of Google Cloud resources, a ``binding`` + can also specify a ``condition``, which is a logical + expression that allows access to a resource only if the + expression evaluates to ``true``. A condition can add + constraints based on attributes of the request, the + resource, or both. To learn which resources support + conditions in their IAM policies, see the `IAM + documentation `__. + + **JSON example:** + + :: + + { + "bindings": [ + { + "role": "roles/resourcemanager.organizationAdmin", + "members": [ + "user:mike@example.com", + "group:admins@example.com", + "domain:google.com", + "serviceAccount:my-project-id@appspot.gserviceaccount.com" + ] + }, + { + "role": "roles/resourcemanager.organizationViewer", + "members": [ + "user:eve@example.com" + ], + "condition": { + "title": "expirable access", + "description": "Does not grant access after Sep 2020", + "expression": "request.time < + timestamp('2020-10-01T00:00:00.000Z')", + } + } + ], + "etag": "BwWWja0YfJA=", + "version": 3 + } + + **YAML example:** + + :: + + bindings: + - members: + - user:mike@example.com + - group:admins@example.com + - domain:google.com + - serviceAccount:my-project-id@appspot.gserviceaccount.com + role: roles/resourcemanager.organizationAdmin + - members: + - user:eve@example.com + role: roles/resourcemanager.organizationViewer + condition: + title: expirable access + description: Does not grant access after Sep 2020 + expression: request.time < timestamp('2020-10-01T00:00:00.000Z') + etag: BwWWja0YfJA= + version: 3 + + For a description of IAM and its features, see the `IAM + documentation `__. + + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + + request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.SetIamPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "SetIamPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = policy_pb2.Policy() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_set_iam_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.set_iam_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "SetIamPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.TestIamPermissions") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: iam_policy_pb2.TestIamPermissionsRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + r"""Call the test iam permissions method over HTTP. + + Args: + request (~.iam_policy_pb2.TestIamPermissionsRequest): + The request object. Request message for ``TestIamPermissions`` method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.iam_policy_pb2.TestIamPermissionsResponse: + Response message for ``TestIamPermissions`` method. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + + request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = json_format.MessageToJson(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.TestIamPermissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "TestIamPermissions", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = iam_policy_pb2.TestIamPermissionsResponse() + pb_resp = resp + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_test_iam_permissions(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = json_format.MessageToJson(resp) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.test_iam_permissions", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "TestIamPermissions", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): + def __hash__(self): + return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") + + @staticmethod + def _get_response( + host, + metadata, + query_params, + session, + timeout, + transcoded_request, + body=None): + + uri = transcoded_request['uri'] + method = transcoded_request['method'] + headers = dict(metadata) + headers['Content-Type'] = 'application/json' + response = getattr(session, method)( + "{host}{uri}".format(host=host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + return response + + def __call__(self, + request: datapolicy.UpdateDataPolicyRequest, *, + retry: OptionalRetry=gapic_v1.method.DEFAULT, + timeout: Optional[float]=None, + metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), + ) -> datapolicy.DataPolicy: + r"""Call the update data policy method over HTTP. + + Args: + request (~.datapolicy.UpdateDataPolicyRequest): + The request object. Request message for the + UpdateDataPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be + sent along with the request as metadata. Normally, each value must be of type `str`, + but for metadata keys ending with the suffix `-bin`, the corresponding values must + be of type `bytes`. + + Returns: + ~.datapolicy.DataPolicy: + Represents the label-policy binding. + """ + + http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + + request, metadata = self._interceptor.pre_update_data_policy(request, metadata) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) + + body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) + + # Jsonify the query params + query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) + method = transcoded_request['method'] + try: + request_payload = type(request).to_json(request) + except: + request_payload = None + http_request = { + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), + } + _LOGGER.debug( + f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.UpdateDataPolicy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "httpRequest": http_request, + "metadata": http_request["headers"], + }, + ) + + # Send the request + response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = datapolicy.DataPolicy() + pb_resp = datapolicy.DataPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + + resp = self._interceptor.post_update_data_policy(resp) + response_metadata = [(k, str(v)) for k, v in response.headers.items()] + resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + try: + response_payload = datapolicy.DataPolicy.to_json(response) + except: + response_payload = None + http_response = { + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, + } + _LOGGER.debug( + "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.update_data_policy", + extra = { + "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "rpcName": "UpdateDataPolicy", + "metadata": http_response["headers"], + "httpResponse": http_response, + }, + ) + return resp + + @property + def add_grantees(self) -> Callable[ + [datapolicy.AddGranteesRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_data_policy(self) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_data_policy(self) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + empty_pb2.Empty]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_data_policy(self) -> Callable[ + [datapolicy.GetDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_iam_policy(self) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_data_policies(self) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + datapolicy.ListDataPoliciesResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def remove_grantees(self) -> Callable[ + [datapolicy.RemoveGranteesRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore + + @property + def set_iam_policy(self) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + policy_pb2.Policy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def test_iam_permissions(self) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_data_policy(self) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + datapolicy.DataPolicy]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__=( + 'DataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py new file mode 100644 index 000000000000..c26988f31683 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py @@ -0,0 +1,534 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import json # type: ignore +from google.api_core import path_template +from google.api_core import gapic_v1 + +from google.protobuf import json_format +from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +import re +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union + + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + + +class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): + """Base REST backend transport for DataPolicyService. + + Note: This class is not meant to be used directly. Use its sync and + async sub-classes instead. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + """ + + def __init__(self, *, + host: str = 'bigquerydatapolicy.googleapis.com', + credentials: Optional[Any] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = 'https', + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + Args: + host (Optional[str]): + The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). + credentials (Optional[Any]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience + ) + + class _BaseAddGrantees: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.AddGranteesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseCreateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{parent=projects/*/locations/*}/dataPolicies', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.CreateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseDeleteDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'delete', + 'uri': '/v2beta1/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.DeleteDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v2beta1/{name=projects/*/locations/*/dataPolicies/*}', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.GetDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseGetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseListDataPolicies: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'get', + 'uri': '/v2beta1/{parent=projects/*/locations/*}/dataPolicies', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.ListDataPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseRemoveGrantees: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.RemoveGranteesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseSetIamPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseTestIamPermissions: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'post', + 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', + 'body': '*', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = request + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + class _BaseUpdateDataPolicy: + def __hash__(self): # pragma: NO COVER + return NotImplementedError("__hash__ must be implemented.") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + + @staticmethod + def _get_http_options(): + http_options: List[Dict[str, str]] = [{ + 'method': 'patch', + 'uri': '/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}', + 'body': 'data_policy', + }, + ] + return http_options + + @staticmethod + def _get_transcoded_request(http_options, request): + pb_request = datapolicy.UpdateDataPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + return transcoded_request + + @staticmethod + def _get_request_body_json(transcoded_request): + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request['body'], + use_integers_for_enums=True + ) + return body + @staticmethod + def _get_query_params_json(transcoded_request): + query_params = json.loads(json_format.MessageToJson( + transcoded_request['query_params'], + use_integers_for_enums=True, + )) + query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + return query_params + + +__all__=( + '_BaseDataPolicyServiceRestTransport', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py new file mode 100644 index 000000000000..b090af352c68 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py @@ -0,0 +1,40 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from .datapolicy import ( + AddGranteesRequest, + CreateDataPolicyRequest, + DataMaskingPolicy, + DataPolicy, + DeleteDataPolicyRequest, + GetDataPolicyRequest, + ListDataPoliciesRequest, + ListDataPoliciesResponse, + RemoveGranteesRequest, + UpdateDataPolicyRequest, +) + +__all__ = ( + 'AddGranteesRequest', + 'CreateDataPolicyRequest', + 'DataMaskingPolicy', + 'DataPolicy', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'RemoveGranteesRequest', + 'UpdateDataPolicyRequest', +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py new file mode 100644 index 000000000000..df5bb545fbdc --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py @@ -0,0 +1,449 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +from __future__ import annotations + +from typing import MutableMapping, MutableSequence + +import proto # type: ignore + +from google.protobuf import field_mask_pb2 # type: ignore + + +__protobuf__ = proto.module( + package='google.cloud.bigquery.datapolicies.v2beta1', + manifest={ + 'CreateDataPolicyRequest', + 'UpdateDataPolicyRequest', + 'AddGranteesRequest', + 'RemoveGranteesRequest', + 'DeleteDataPolicyRequest', + 'GetDataPolicyRequest', + 'ListDataPoliciesRequest', + 'ListDataPoliciesResponse', + 'DataPolicy', + 'DataMaskingPolicy', + }, +) + + +class CreateDataPolicyRequest(proto.Message): + r"""Request message for the CreateDataPolicy method. + + Attributes: + parent (str): + Required. Resource name of the project that the data policy + will belong to. The format is + ``projects/{project_number}/locations/{location_id}``. + data_policy_id (str): + Required. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + data_policy (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy): + Required. The data policy to create. The ``name`` field does + not need to be provided for the data policy creation. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=2, + ) + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=3, + message='DataPolicy', + ) + + +class UpdateDataPolicyRequest(proto.Message): + r"""Request message for the UpdateDataPolicy method. + + Attributes: + data_policy (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy): + Required. Update the data policy's metadata. + + The target data policy is determined by the ``name`` field. + Other fields are updated to the specified values based on + the field masks. + update_mask (google.protobuf.field_mask_pb2.FieldMask): + Optional. The update mask applies to the resource. For the + ``FieldMask`` definition, see + https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask + If not set, defaults to all of the fields that are allowed + to update. + + Updates to the ``name`` and ``dataPolicyId`` fields are not + allowed. + """ + + data_policy: 'DataPolicy' = proto.Field( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + update_mask: field_mask_pb2.FieldMask = proto.Field( + proto.MESSAGE, + number=2, + message=field_mask_pb2.FieldMask, + ) + + +class AddGranteesRequest(proto.Message): + r"""Request message for the AddGrantees method. + + Attributes: + data_policy (str): + Required. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + grantees (MutableSequence[str]): + Required. IAM principal that should be granted Fine Grained + Access to the underlying data goverened by the data policy. + The target data policy is determined by the ``data_policy`` + field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + """ + + data_policy: str = proto.Field( + proto.STRING, + number=1, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=2, + ) + + +class RemoveGranteesRequest(proto.Message): + r"""Request message for the RemoveGrantees method. + + Attributes: + data_policy (str): + Required. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + grantees (MutableSequence[str]): + Required. IAM principal that should be revoked from Fine + Grained Access to the underlying data goverened by the data + policy. The target data policy is determined by the + ``data_policy`` field. + + Uses the `IAM V2 principal + syntax `__. + Supported principal types: + + - User + - Group + - Service account + """ + + data_policy: str = proto.Field( + proto.STRING, + number=1, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=2, + ) + + +class DeleteDataPolicyRequest(proto.Message): + r"""Request message for the DeleteDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the data policy to delete. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class GetDataPolicyRequest(proto.Message): + r"""Request message for the GetDataPolicy method. + + Attributes: + name (str): + Required. Resource name of the requested data policy. Format + is + ``projects/{project_number}/locations/{location_id}/dataPolicies/{id}``. + """ + + name: str = proto.Field( + proto.STRING, + number=1, + ) + + +class ListDataPoliciesRequest(proto.Message): + r"""Request message for the ListDataPolicies method. + + Attributes: + parent (str): + Required. Resource name of the project for which to list + data policies. Format is + ``projects/{project_number}/locations/{location_id}``. + page_size (int): + Optional. The maximum number of data policies + to return. Must be a value between 1 and 1000. + If not set, defaults to 50. + page_token (str): + Optional. The ``nextPageToken`` value returned from a + previous list request, if any. If not set, defaults to an + empty string. + """ + + parent: str = proto.Field( + proto.STRING, + number=1, + ) + page_size: int = proto.Field( + proto.INT32, + number=2, + ) + page_token: str = proto.Field( + proto.STRING, + number=3, + ) + + +class ListDataPoliciesResponse(proto.Message): + r"""Response message for the ListDataPolicies method. + + Attributes: + data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy]): + Data policies that belong to the requested + project. + next_page_token (str): + Token used to retrieve the next page of + results, or empty if there are no more results. + """ + + @property + def raw_page(self): + return self + + data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + proto.MESSAGE, + number=1, + message='DataPolicy', + ) + next_page_token: str = proto.Field( + proto.STRING, + number=2, + ) + + +class DataPolicy(proto.Message): + r"""Represents the label-policy binding. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + data_masking_policy (google.cloud.bigquery_datapolicies_v2beta1.types.DataMaskingPolicy): + Optional. The data masking policy that specifies the data + masking rule to use. It must be set if the data policy type + is DATA_MASKING_POLICY. + + This field is a member of `oneof`_ ``policy``. + name (str): + Identifier. Resource name of this data policy, in the format + of + ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. + data_policy_id (str): + Output only. User-assigned (human readable) ID of the data + policy that needs to be unique within a project. Used as + {data_policy_id} in part of the resource name. + etag (str): + The etag for this Data Policy. + This field is used for UpdateDataPolicy calls. + If Data Policy exists, this field is required + and must match the server's etag. It will also + be populated in the response of GetDataPolicy, + CreateDataPolicy, and UpdateDataPolicy calls. + + This field is a member of `oneof`_ ``_etag``. + data_policy_type (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy.DataPolicyType): + Required. Type of data policy. + policy_tag (str): + Output only. Policy tag resource name, in the format of + ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. + policy_tag is supported only for V1 data policies. + grantees (MutableSequence[str]): + Optional. The list of IAM principals that have Fine Grained + Access to the underlying data goverened by this data policy. + + Uses the `IAM V2 principal + syntax `__ + Only supports principal types users, groups, + serviceaccounts, cloudidentity. This field is supported in + V2 Data Policy only. In case of V1 data policies (i.e. + verion = 1 and policy_tag is set), this field is not + populated. + version (google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy.Version): + Output only. The version of the Data Policy + resource. + """ + class DataPolicyType(proto.Enum): + r"""A list of supported data policy types. + + Values: + DATA_POLICY_TYPE_UNSPECIFIED (0): + Default value for the data policy type. This + should not be used. + DATA_MASKING_POLICY (1): + Used to create a data policy for data + masking. + RAW_DATA_ACCESS_POLICY (2): + Used to create a data policy for raw data + access. + """ + DATA_POLICY_TYPE_UNSPECIFIED = 0 + DATA_MASKING_POLICY = 1 + RAW_DATA_ACCESS_POLICY = 2 + + class Version(proto.Enum): + r"""The supported versions for the Data Policy resource. + + Values: + VERSION_UNSPECIFIED (0): + Default value for the data policy version. + This should not be used. + V1 (1): + V1 data policy version. V1 Data Policies will + be present in V2 List api response, but can not + be created/updated/deleted from V2 api. + V2 (2): + V2 data policy version. + """ + VERSION_UNSPECIFIED = 0 + V1 = 1 + V2 = 2 + + data_masking_policy: 'DataMaskingPolicy' = proto.Field( + proto.MESSAGE, + number=7, + oneof='policy', + message='DataMaskingPolicy', + ) + name: str = proto.Field( + proto.STRING, + number=1, + ) + data_policy_id: str = proto.Field( + proto.STRING, + number=2, + ) + etag: str = proto.Field( + proto.STRING, + number=11, + optional=True, + ) + data_policy_type: DataPolicyType = proto.Field( + proto.ENUM, + number=3, + enum=DataPolicyType, + ) + policy_tag: str = proto.Field( + proto.STRING, + number=4, + ) + grantees: MutableSequence[str] = proto.RepeatedField( + proto.STRING, + number=8, + ) + version: Version = proto.Field( + proto.ENUM, + number=9, + enum=Version, + ) + + +class DataMaskingPolicy(proto.Message): + r"""The policy used to specify data masking rule. + + .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields + + Attributes: + predefined_expression (google.cloud.bigquery_datapolicies_v2beta1.types.DataMaskingPolicy.PredefinedExpression): + Optional. A predefined masking expression. + + This field is a member of `oneof`_ ``masking_expression``. + """ + class PredefinedExpression(proto.Enum): + r"""The available masking rules. Learn more here: + https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. + + Values: + PREDEFINED_EXPRESSION_UNSPECIFIED (0): + Default, unspecified predefined expression. + No masking will take place since no expression + is specified. + SHA256 (1): + Masking expression to replace data with + SHA-256 hash. + ALWAYS_NULL (2): + Masking expression to replace data with + NULLs. + DEFAULT_MASKING_VALUE (3): + Masking expression to replace data with their default + masking values. The default masking values for each type + listed as below: + + - STRING: "" + - BYTES: b'' + - INTEGER: 0 + - FLOAT: 0.0 + - NUMERIC: 0 + - BOOLEAN: FALSE + - TIMESTAMP: 1970-01-01 00:00:00 UTC + - DATE: 1970-01-01 + - TIME: 00:00:00 + - DATETIME: 1970-01-01T00:00:00 + - GEOGRAPHY: POINT(0 0) + - BIGNUMERIC: 0 + - ARRAY: [] + - STRUCT: NOT_APPLICABLE + - JSON: NULL + """ + PREDEFINED_EXPRESSION_UNSPECIFIED = 0 + SHA256 = 1 + ALWAYS_NULL = 2 + DEFAULT_MASKING_VALUE = 3 + + predefined_expression: PredefinedExpression = proto.Field( + proto.ENUM, + number=1, + oneof='masking_expression', + enum=PredefinedExpression, + ) + + +__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini new file mode 100644 index 000000000000..574c5aed394b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini @@ -0,0 +1,3 @@ +[mypy] +python_version = 3.7 +namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py new file mode 100644 index 000000000000..25d78ab7c0ff --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py @@ -0,0 +1,591 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +import pathlib +import re +import shutil + +from typing import Dict, List +import warnings + +import nox + +BLACK_VERSION = "black[jupyter]==23.7.0" +ISORT_VERSION = "isort==5.11.0" + +LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] + +ALL_PYTHON = [ + "3.7", + "3.8", + "3.9", + "3.10", + "3.11", + "3.12", + "3.13", +] + +DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] + +CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() + +LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" +PACKAGE_NAME = "google-cloud-bigquery-datapolicies" + +UNIT_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "asyncmock", + "pytest", + "pytest-cov", + "pytest-asyncio", +] +UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] +UNIT_TEST_DEPENDENCIES: List[str] = [] +UNIT_TEST_EXTRAS: List[str] = [] +UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] +SYSTEM_TEST_STANDARD_DEPENDENCIES = [ + "mock", + "pytest", + "google-cloud-testutils", +] +SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_DEPENDENCIES: List[str] = [] +SYSTEM_TEST_EXTRAS: List[str] = [] +SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} + +nox.options.sessions = [ + "unit", + "system", + "cover", + "lint", + "lint_setup_py", + "blacken", + "docs", +] + +# Error if a python version is missing +nox.options.error_on_missing_interpreters = True + + +@nox.session(python=ALL_PYTHON) +def mypy(session): + """Run the type checker.""" + session.install( + "mypy", + "types-requests", + "types-protobuf", + ) + session.install(".") + session.run( + "mypy", + "-p", + "google", + ) + + +@nox.session +def update_lower_bounds(session): + """Update lower bounds in constraints.txt to match setup.py""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "update", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session +def check_lower_bounds(session): + """Check lower bounds in setup.py are reflected in constraints file""" + session.install("google-cloud-testutils") + session.install(".") + + session.run( + "lower-bound-checker", + "check", + "--package-name", + PACKAGE_NAME, + "--constraints-file", + str(LOWER_BOUND_CONSTRAINTS_FILE), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint(session): + """Run linters. + + Returns a failure if the linters find linting errors or sufficiently + serious code quality issues. + """ + session.install("flake8", BLACK_VERSION) + session.run( + "black", + "--check", + *LINT_PATHS, + ) + + session.run("flake8", "google", "tests") + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def blacken(session): + """Run black. Format code to uniform standard.""" + session.install(BLACK_VERSION) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def format(session): + """ + Run isort to sort imports. Then run black + to format code to uniform standard. + """ + session.install(BLACK_VERSION, ISORT_VERSION) + # Use the --fss option to sort imports using strict alphabetical order. + # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections + session.run( + "isort", + "--fss", + *LINT_PATHS, + ) + session.run( + "black", + *LINT_PATHS, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def lint_setup_py(session): + """Verify that setup.py is valid (including RST check).""" + session.install("setuptools", "docutils", "pygments") + session.run("python", "setup.py", "check", "--restructuredtext", "--strict") + + +def install_unittest_dependencies(session, *constraints): + standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES + session.install(*standard_deps, *constraints) + + if UNIT_TEST_EXTERNAL_DEPENDENCIES: + warnings.warn( + "'unit_test_external_dependencies' is deprecated. Instead, please " + "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", + DeprecationWarning, + ) + session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_LOCAL_DEPENDENCIES: + session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) + + if UNIT_TEST_EXTRAS_BY_PYTHON: + extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif UNIT_TEST_EXTRAS: + extras = UNIT_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=ALL_PYTHON) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def unit(session, protobuf_implementation): + # Install all test dependencies, then install this package in-place. + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + install_unittest_dependencies(session, "-c", constraints_path) + + # TODO(https://github.com/googleapis/synthtool/issues/1976): + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + f"--junitxml=unit_{session.python}_sponge_log.xml", + "--cov=google", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +def install_systemtest_dependencies(session, *constraints): + session.install("--pre", "grpcio") + + session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: + session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_LOCAL_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_DEPENDENCIES: + session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) + + if SYSTEM_TEST_EXTRAS_BY_PYTHON: + extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) + elif SYSTEM_TEST_EXTRAS: + extras = SYSTEM_TEST_EXTRAS + else: + extras = [] + + if extras: + session.install("-e", f".[{','.join(extras)}]", *constraints) + else: + session.install("-e", ".", *constraints) + + +@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) +def system(session): + """Run the system test suite.""" + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + system_test_path = os.path.join("tests", "system.py") + system_test_folder_path = os.path.join("tests", "system") + + # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. + if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": + session.skip("RUN_SYSTEM_TESTS is set to false, skipping") + # Install pyopenssl for mTLS testing. + if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": + session.install("pyopenssl") + + system_test_exists = os.path.exists(system_test_path) + system_test_folder_exists = os.path.exists(system_test_folder_path) + # Sanity check: only run tests if found. + if not system_test_exists and not system_test_folder_exists: + session.skip("System tests were not found") + + install_systemtest_dependencies(session, "-c", constraints_path) + + # Run py.test against the system tests. + if system_test_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_path, + *session.posargs, + ) + if system_test_folder_exists: + session.run( + "py.test", + "--quiet", + f"--junitxml=system_{session.python}_sponge_log.xml", + system_test_folder_path, + *session.posargs, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +def cover(session): + """Run the final coverage report. + + This outputs the coverage report aggregating coverage from the unit + test runs (not system test runs), and then erases coverage data. + """ + session.install("coverage", "pytest-cov") + session.run("coverage", "report", "--show-missing", "--fail-under=100") + + session.run("coverage", "erase") + + +@nox.session(python="3.10") +def docs(session): + """Build the docs for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "sphinx==4.5.0", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-W", # warnings as errors + "-T", # show full traceback on exception + "-N", # no colors + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python="3.10") +def docfx(session): + """Build the docfx yaml files for this library.""" + + session.install("-e", ".") + session.install( + # We need to pin to specific versions of the `sphinxcontrib-*` packages + # which still support sphinx 4.x. + # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 + # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. + "sphinxcontrib-applehelp==1.0.4", + "sphinxcontrib-devhelp==1.0.2", + "sphinxcontrib-htmlhelp==2.0.1", + "sphinxcontrib-qthelp==1.0.3", + "sphinxcontrib-serializinghtml==1.1.5", + "gcp-sphinx-docfx-yaml", + "alabaster", + "recommonmark", + ) + + shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) + session.run( + "sphinx-build", + "-T", # show full traceback on exception + "-N", # no colors + "-D", + ( + "extensions=sphinx.ext.autodoc," + "sphinx.ext.autosummary," + "docfx_yaml.extension," + "sphinx.ext.intersphinx," + "sphinx.ext.coverage," + "sphinx.ext.napoleon," + "sphinx.ext.todo," + "sphinx.ext.viewcode," + "recommonmark" + ), + "-b", + "html", + "-d", + os.path.join("docs", "_build", "doctrees", ""), + os.path.join("docs", ""), + os.path.join("docs", "_build", "html", ""), + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb", "cpp"], +) +def prerelease_deps(session, protobuf_implementation): + """ + Run all tests with pre-release versions of dependencies installed + rather than the standard non pre-release versions. + Pre-release versions can be installed using + `pip install --pre `. + """ + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): + session.skip("cpp implementation is not supported in python 3.11+") + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # Note: If a dependency is added to the `prerel_deps` list, + # the `core_dependencies_from_source` list in the `core_deps_from_source` + # nox session should also be updated. + prerel_deps = [ + "googleapis-common-protos", + "google-api-core", + "google-auth", + "grpc-google-iam-v1", + "grpcio", + "grpcio-status", + "protobuf", + "proto-plus", + ] + + for dep in prerel_deps: + session.install("--pre", "--no-deps", "--ignore-installed", dep) + # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` + # to the dictionary below once this bug is fixed. + # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add + # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below + # once this bug is fixed. + package_namespaces = { + "google-api-core": "google.api_core", + "google-auth": "google.auth", + "grpcio": "grpc", + "protobuf": "google.protobuf", + "proto-plus": "proto", + } + + version_namespace = package_namespaces.get(dep) + + print(f"Installed {dep}") + if version_namespace: + session.run( + "python", + "-c", + f"import {version_namespace}; print({version_namespace}.__version__)", + ) + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) + + +@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.parametrize( + "protobuf_implementation", + ["python", "upb"], +) +def core_deps_from_source(session, protobuf_implementation): + """Run all tests with core dependencies installed from source + rather than pulling the dependencies from PyPI. + """ + + # Install all dependencies + session.install("-e", ".") + + # Install dependencies for the unit test environment + unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES + session.install(*unit_deps_all) + + # Install dependencies for the system test environment + system_deps_all = ( + SYSTEM_TEST_STANDARD_DEPENDENCIES + + SYSTEM_TEST_EXTERNAL_DEPENDENCIES + + SYSTEM_TEST_EXTRAS + ) + session.install(*system_deps_all) + + # Because we test minimum dependency versions on the minimum Python + # version, the first version we test with in the unit tests sessions has a + # constraints file containing all dependencies and extras. + with open( + CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", + encoding="utf-8", + ) as constraints_file: + constraints_text = constraints_file.read() + + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + + # Install dependencies specified in `testing/constraints-X.txt`. + session.install(*constraints_deps) + + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and + # `grpcio-status` should be added to the list below so that they are installed from source, + # rather than PyPI. + # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be + # added to the list below so that it is installed from source, rather than PyPI + # Note: If a dependency is added to the `core_dependencies_from_source` list, + # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. + core_dependencies_from_source = [ + "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", + "google-api-core @ git+https://github.com/googleapis/python-api-core.git", + "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", + "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", + "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", + ] + + for dep in core_dependencies_from_source: + session.install(dep, "--no-deps", "--ignore-installed") + print(f"Installed {dep}") + + session.run( + "py.test", + "tests/unit", + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py new file mode 100644 index 000000000000..788c21ee6e00 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AddGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.add_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py new file mode 100644 index 000000000000..2e28fb2087b0 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AddGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_add_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.AddGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.add_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py new file mode 100644 index 000000000000..356c37a0ad45 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py @@ -0,0 +1,58 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = await client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py new file mode 100644 index 000000000000..3c1be09234a2 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py @@ -0,0 +1,58 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_create_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.CreateDataPolicyRequest( + parent="parent_value", + data_policy_id="data_policy_id_value", + data_policy=data_policy, + ) + + # Make the request + response = client.create_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py new file mode 100644 index 000000000000..a6c6bf98f941 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + await client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py new file mode 100644 index 000000000000..08f53bfeb026 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py @@ -0,0 +1,50 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_delete_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.DeleteDataPolicyRequest( + name="name_value", + ) + + # Make the request + client.delete_data_policy(request=request) + + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py new file mode 100644 index 000000000000..589a25f85a1b --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = await client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py new file mode 100644 index 000000000000..c145111d943e --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_get_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.GetDataPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py new file mode 100644 index 000000000000..5f037b9259ff --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py new file mode 100644 index 000000000000..7289b6051e69 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_get_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py new file mode 100644 index 000000000000..9edfcab91d23 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + async for response in page_result: + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py new file mode 100644 index 000000000000..e589589016ee --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDataPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_list_data_policies(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.ListDataPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_data_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py new file mode 100644 index 000000000000..c50b85911da4 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RemoveGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = await client.remove_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py new file mode 100644 index 000000000000..aeabe05ae789 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for RemoveGrantees +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_remove_grantees(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = bigquery_datapolicies_v2beta1.RemoveGranteesRequest( + data_policy="data_policy_value", + grantees=['grantees_value1', 'grantees_value2'], + ) + + # Make the request + response = client.remove_grantees(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py new file mode 100644 index 000000000000..9233b436f6a1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py new file mode 100644 index 000000000000..225f0f53e427 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_set_iam_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py new file mode 100644 index 000000000000..6e31c436ea4a --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +async def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py new file mode 100644 index 000000000000..d3c9637afea9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 +from google.iam.v1 import iam_policy_pb2 # type: ignore + + +def sample_test_iam_permissions(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + request = iam_policy_pb2.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value1', 'permissions_value2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py new file mode 100644 index 000000000000..92016b74f329 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +async def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = await client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py new file mode 100644 index 000000000000..b5bb24992ce4 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDataPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-bigquery-datapolicies + + +# [START bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_sync] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import bigquery_datapolicies_v2beta1 + + +def sample_update_data_policy(): + # Create a client + client = bigquery_datapolicies_v2beta1.DataPolicyServiceClient() + + # Initialize request argument(s) + data_policy = bigquery_datapolicies_v2beta1.DataPolicy() + data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" + data_policy.data_policy_type = "RAW_DATA_ACCESS_POLICY" + + request = bigquery_datapolicies_v2beta1.UpdateDataPolicyRequest( + data_policy=data_policy, + ) + + # Make the request + response = client.update_data_policy(request=request) + + # Handle the response + print(response) + +# [END bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json new file mode 100644 index 000000000000..0ebbcc16227d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json @@ -0,0 +1,1635 @@ +{ + "clientLibrary": { + "apis": [ + { + "id": "google.cloud.bigquery.datapolicies.v2beta1", + "version": "v2beta1" + } + ], + "language": "PYTHON", + "name": "google-cloud-bigquery-datapolicies", + "version": "0.1.0" + }, + "snippets": [ + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.add_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.AddGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "AddGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.AddGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "add_grantees" + }, + "description": "Sample for AddGrantees", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.add_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.AddGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "AddGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.AddGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "add_grantees" + }, + "description": "Sample for AddGrantees", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_AddGrantees_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy" + }, + { + "name": "data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_async", + "segments": [ + { + "end": 57, + "start": 27, + "type": "FULL" + }, + { + "end": 57, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 51, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 54, + "start": 52, + "type": "REQUEST_EXECUTION" + }, + { + "end": 58, + "start": 55, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.create_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.CreateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "CreateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.CreateDataPolicyRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy" + }, + { + "name": "data_policy_id", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "create_data_policy" + }, + "description": "Sample for CreateDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_CreateDataPolicy_sync", + "segments": [ + { + "end": 57, + "start": 27, + "type": "FULL" + }, + { + "end": 57, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 51, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 54, + "start": 52, + "type": "REQUEST_EXECUTION" + }, + { + "end": 58, + "start": 55, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_async", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.delete_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.DeleteDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "DeleteDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DeleteDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "shortName": "delete_data_policy" + }, + "description": "Sample for DeleteDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_DeleteDataPolicy_sync", + "segments": [ + { + "end": 49, + "start": 27, + "type": "FULL" + }, + { + "end": 49, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.get_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.GetDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.GetDataPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "get_data_policy" + }, + "description": "Sample for GetDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetDataPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.get_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.GetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "GetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "get_iam_policy" + }, + "description": "Sample for GetIamPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_GetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.list_data_policies", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.ListDataPolicies", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "ListDataPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.ListDataPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.pagers.ListDataPoliciesPager", + "shortName": "list_data_policies" + }, + "description": "Sample for ListDataPolicies", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_ListDataPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.remove_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.RemoveGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RemoveGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.RemoveGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "remove_grantees" + }, + "description": "Sample for RemoveGrantees", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.remove_grantees", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.RemoveGrantees", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "RemoveGrantees" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.RemoveGranteesRequest" + }, + { + "name": "data_policy", + "type": "str" + }, + { + "name": "grantees", + "type": "MutableSequence[str]" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "remove_grantees" + }, + "description": "Sample for RemoveGrantees", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_RemoveGrantees_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.set_iam_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.SetIamPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "SetIamPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.policy_pb2.Policy", + "shortName": "set_iam_policy" + }, + "description": "Sample for SetIamPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_SetIamPolicy_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 49, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 50, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_async", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.test_iam_permissions", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.TestIamPermissions", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "TestIamPermissions" + }, + "parameters": [ + { + "name": "request", + "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", + "shortName": "test_iam_permissions" + }, + "description": "Sample for TestIamPermissions", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_TestIamPermissions_sync", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 41, + "start": 39, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 47, + "start": 42, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 48, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient", + "shortName": "DataPolicyServiceAsyncClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceAsyncClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_async", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient", + "shortName": "DataPolicyServiceClient" + }, + "fullName": "google.cloud.bigquery_datapolicies_v2beta1.DataPolicyServiceClient.update_data_policy", + "method": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService.UpdateDataPolicy", + "service": { + "fullName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", + "shortName": "DataPolicyService" + }, + "shortName": "UpdateDataPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.UpdateDataPolicyRequest" + }, + { + "name": "data_policy", + "type": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, Union[str, bytes]]]" + } + ], + "resultType": "google.cloud.bigquery_datapolicies_v2beta1.types.DataPolicy", + "shortName": "update_data_policy" + }, + "description": "Sample for UpdateDataPolicy", + "file": "bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "bigquerydatapolicy_v2beta1_generated_DataPolicyService_UpdateDataPolicy_sync", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 49, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 50, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ], + "title": "bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py" + } + ] +} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py new file mode 100644 index 000000000000..6401d8c7e7d9 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py @@ -0,0 +1,185 @@ +#! /usr/bin/env python3 +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import argparse +import os +import libcst as cst +import pathlib +import sys +from typing import (Any, Callable, Dict, List, Sequence, Tuple) + + +def partition( + predicate: Callable[[Any], bool], + iterator: Sequence[Any] +) -> Tuple[List[Any], List[Any]]: + """A stable, out-of-place partition.""" + results = ([], []) + + for i in iterator: + results[int(predicate(i))].append(i) + + # Returns trueList, falseList + return results[1], results[0] + + +class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): + CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') + METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { + 'add_grantees': ('data_policy', 'grantees', ), + 'create_data_policy': ('parent', 'data_policy_id', 'data_policy', ), + 'delete_data_policy': ('name', ), + 'get_data_policy': ('name', ), + 'get_iam_policy': ('resource', 'options', ), + 'list_data_policies': ('parent', 'page_size', 'page_token', ), + 'remove_grantees': ('data_policy', 'grantees', ), + 'set_iam_policy': ('resource', 'policy', 'update_mask', ), + 'test_iam_permissions': ('resource', 'permissions', ), + 'update_data_policy': ('data_policy', 'update_mask', ), + } + + def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: + try: + key = original.func.attr.value + kword_params = self.METHOD_TO_PARAMS[key] + except (AttributeError, KeyError): + # Either not a method from the API or too convoluted to be sure. + return updated + + # If the existing code is valid, keyword args come after positional args. + # Therefore, all positional args must map to the first parameters. + args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) + if any(k.keyword.value == "request" for k in kwargs): + # We've already fixed this file, don't fix it again. + return updated + + kwargs, ctrl_kwargs = partition( + lambda a: a.keyword.value not in self.CTRL_PARAMS, + kwargs + ) + + args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] + ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) + for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) + + request_arg = cst.Arg( + value=cst.Dict([ + cst.DictElement( + cst.SimpleString("'{}'".format(name)), +cst.Element(value=arg.value) + ) + # Note: the args + kwargs looks silly, but keep in mind that + # the control parameters had to be stripped out, and that + # those could have been passed positionally or by keyword. + for name, arg in zip(kword_params, args + kwargs)]), + keyword=cst.Name("request") + ) + + return updated.with_changes( + args=[request_arg] + ctrl_kwargs + ) + + +def fix_files( + in_dir: pathlib.Path, + out_dir: pathlib.Path, + *, + transformer=bigquery_datapoliciesCallTransformer(), +): + """Duplicate the input dir to the output dir, fixing file method calls. + + Preconditions: + * in_dir is a real directory + * out_dir is a real, empty directory + """ + pyfile_gen = ( + pathlib.Path(os.path.join(root, f)) + for root, _, files in os.walk(in_dir) + for f in files if os.path.splitext(f)[1] == ".py" + ) + + for fpath in pyfile_gen: + with open(fpath, 'r') as f: + src = f.read() + + # Parse the code and insert method call fixes. + tree = cst.parse_module(src) + updated = tree.visit(transformer) + + # Create the path and directory structure for the new file. + updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) + updated_path.parent.mkdir(parents=True, exist_ok=True) + + # Generate the updated source file at the corresponding path. + with open(updated_path, 'w') as f: + f.write(updated.code) + + +if __name__ == '__main__': + parser = argparse.ArgumentParser( + description="""Fix up source that uses the bigquery_datapolicies client library. + +The existing sources are NOT overwritten but are copied to output_dir with changes made. + +Note: This tool operates at a best-effort level at converting positional + parameters in client method calls to keyword based parameters. + Cases where it WILL FAIL include + A) * or ** expansion in a method call. + B) Calls via function or method alias (includes free function calls) + C) Indirect or dispatched calls (e.g. the method is looked up dynamically) + + These all constitute false negatives. The tool will also detect false + positives when an API method shares a name with another method. +""") + parser.add_argument( + '-d', + '--input-directory', + required=True, + dest='input_dir', + help='the input directory to walk for python files to fix up', + ) + parser.add_argument( + '-o', + '--output-directory', + required=True, + dest='output_dir', + help='the directory to output files fixed via un-flattening', + ) + args = parser.parse_args() + input_dir = pathlib.Path(args.input_dir) + output_dir = pathlib.Path(args.output_dir) + if not input_dir.is_dir(): + print( + f"input directory '{input_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if not output_dir.is_dir(): + print( + f"output directory '{output_dir}' does not exist or is not a directory", + file=sys.stderr, + ) + sys.exit(-1) + + if os.listdir(output_dir): + print( + f"output directory '{output_dir}' is not empty", + file=sys.stderr, + ) + sys.exit(-1) + + fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py new file mode 100644 index 000000000000..40366686e783 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py @@ -0,0 +1,99 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import io +import os +import re + +import setuptools # type: ignore + +package_root = os.path.abspath(os.path.dirname(__file__)) + +name = 'google-cloud-bigquery-datapolicies' + + +description = "Google Cloud Bigquery Datapolicies API client library" + +version = None + +with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: + version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) + assert (len(version_candidates) == 1) + version = version_candidates[0] + +if version[0] == "0": + release_status = "Development Status :: 4 - Beta" +else: + release_status = "Development Status :: 5 - Production/Stable" + +dependencies = [ + "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", + # Exclude incompatible versions of `google-auth` + # See https://github.com/googleapis/google-cloud-python/issues/12364 + "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", + "proto-plus >= 1.22.3, <2.0.0", + "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", + "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", + "grpc-google-iam-v1 >= 0.14.0, <1.0.0", +] +extras = { +} +url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" + +package_root = os.path.abspath(os.path.dirname(__file__)) + +readme_filename = os.path.join(package_root, "README.rst") +with io.open(readme_filename, encoding="utf-8") as readme_file: + readme = readme_file.read() + +packages = [ + package + for package in setuptools.find_namespace_packages() + if package.startswith("google") +] + +setuptools.setup( + name=name, + version=version, + description=description, + long_description=readme, + author="Google LLC", + author_email="googleapis-packages@google.com", + license="Apache 2.0", + url=url, + classifiers=[ + release_status, + "Intended Audience :: Developers", + "License :: OSI Approved :: Apache Software License", + "Programming Language :: Python", + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.7", + "Programming Language :: Python :: 3.8", + "Programming Language :: Python :: 3.9", + "Programming Language :: Python :: 3.10", + "Programming Language :: Python :: 3.11", + "Programming Language :: Python :: 3.12", + "Programming Language :: Python :: 3.13", + "Operating System :: OS Independent", + "Topic :: Internet", + ], + platforms="Posix; MacOS X; Windows", + packages=packages, + python_requires=">=3.7", + install_requires=dependencies, + extras_require=extras, + include_package_data=True, + zip_safe=False, +) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt new file mode 100644 index 000000000000..2010e549cceb --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt @@ -0,0 +1,12 @@ +# We use the constraints file for the latest Python version +# (currently this file) to check that the latest +# major versions of dependencies are supported in setup.py. +# List all library dependencies and extras in this file. +# Require the latest major version be installed for each dependency. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo>=1 +google-api-core>=2 +google-auth>=2 +proto-plus>=1 +protobuf>=6 +grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt new file mode 100644 index 000000000000..56affbd9bd75 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt @@ -0,0 +1,11 @@ +# This constraints file is used to check that lower bounds +# are correct in setup.py +# List all library dependencies and extras in this file. +# Pin the version to the lower bound. +# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", +# Then this file should have google-cloud-foo==1.14.0 +google-api-core==1.34.1 +google-auth==2.14.1 +proto-plus==1.22.3 +protobuf==3.20.2 +grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt new file mode 100644 index 000000000000..ad3f0fa58e2d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt @@ -0,0 +1,7 @@ +# -*- coding: utf-8 -*- +# This constraints file is required for unit tests. +# List all library dependencies and extras in this file. +google-api-core +proto-plus +protobuf +grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py new file mode 100644 index 000000000000..191773d5572d --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py @@ -0,0 +1,16 @@ + +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py new file mode 100644 index 000000000000..85d5811560d1 --- /dev/null +++ b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py @@ -0,0 +1,8320 @@ +# -*- coding: utf-8 -*- +# Copyright 2025 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import os +# try/except added for compatibility with python < 3.8 +try: + from unittest import mock + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER + import mock + +import grpc +from grpc.experimental import aio +from collections.abc import Iterable, AsyncIterable +from google.protobuf import json_format +import json +import math +import pytest +from google.api_core import api_core_version +from proto.marshal.rules.dates import DurationRule, TimestampRule +from proto.marshal.rules import wrappers +from requests import Response +from requests import Request, PreparedRequest +from requests.sessions import Session +from google.protobuf import json_format + +try: + from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True +except ImportError: # pragma: NO COVER + HAS_GOOGLE_AUTH_AIO = False + +from google.api_core import client_options +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers +from google.api_core import grpc_helpers_async +from google.api_core import path_template +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials +from google.auth.exceptions import MutualTLSChannelError +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import DataPolicyServiceAsyncClient +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import DataPolicyServiceClient +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import transports +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import options_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account +from google.protobuf import field_mask_pb2 # type: ignore +from google.type import expr_pb2 # type: ignore +import google.auth + + + +CRED_INFO_JSON = { + "credential_source": "/path/to/file", + "credential_type": "service account credentials", + "principal": "service-account@example.com", +} +CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) + + +async def mock_async_gen(data, chunk_size=1): + for i in range(0, len(data)): # pragma: NO COVER + chunk = data[i : i + chunk_size] + yield chunk.encode("utf-8") + +def client_cert_source_callback(): + return b"cert bytes", b"key bytes" + +# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. +# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. +def async_anonymous_credentials(): + if HAS_GOOGLE_AUTH_AIO: + return ga_credentials_async.AnonymousCredentials() + return ga_credentials.AnonymousCredentials() + +# If default endpoint is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint(client): + return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + +# If default endpoint template is localhost, then default mtls endpoint will be the same. +# This method modifies the default endpoint template so the client can produce a different +# mtls endpoint for endpoint testing purposes. +def modify_default_endpoint_template(client): + return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + + +def test__get_default_mtls_endpoint(): + api_endpoint = "example.googleapis.com" + api_mtls_endpoint = "example.mtls.googleapis.com" + sandbox_endpoint = "example.sandbox.googleapis.com" + sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" + non_googleapi = "api.example.com" + + assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint + assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + +def test__read_environment_variables(): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._read_environment_variables() + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): + assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + +def test__get_client_cert_source(): + mock_provided_cert_source = mock.Mock() + mock_default_cert_source = mock.Mock() + + assert DataPolicyServiceClient._get_client_cert_source(None, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): + assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source + assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source + +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test__get_api_endpoint(): + api_override = "foo.com" + mock_client_cert_source = mock.Mock() + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint + assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + + with pytest.raises(MutualTLSChannelError) as excinfo: + DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") + assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + + +def test__get_universe_domain(): + client_universe_domain = "foo.com" + universe_domain_env = "bar.com" + + assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain + assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env + assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + + with pytest.raises(ValueError) as excinfo: + DataPolicyServiceClient._get_universe_domain("", None) + assert str(excinfo.value) == "Universe Domain cannot be an empty string." + +@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False) +]) +def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): + cred = mock.Mock(["get_cred_info"]) + cred.get_cred_info = mock.Mock(return_value=cred_info_json) + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=["foo"]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + if show_cred_info: + assert error.details == ["foo", CRED_INFO_STRING] + else: + assert error.details == ["foo"] + +@pytest.mark.parametrize("error_code", [401,403,404,500]) +def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): + cred = mock.Mock([]) + assert not hasattr(cred, "get_cred_info") + client = DataPolicyServiceClient(credentials=cred) + client._transport._credentials = cred + + error = core_exceptions.GoogleAPICallError("message", details=[]) + error.code = error_code + + client._add_cred_info_for_auth_errors(error) + assert error.details == [] + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + factory.return_value = creds + info = {"valid": True} + client = client_class.from_service_account_info(info, transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +@pytest.mark.parametrize("transport_class,transport_name", [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=True) + use_jwt.assert_called_once_with(True) + + with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + creds = service_account.Credentials(None, None, None) + transport = transport_class(credentials=creds, always_use_jwt_access=False) + use_jwt.assert_not_called() + + +@pytest.mark.parametrize("client_class,transport_name", [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), +]) +def test_data_policy_service_client_from_service_account_file(client_class, transport_name): + creds = ga_credentials.AnonymousCredentials() + with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + factory.return_value = creds + client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + assert client.transport._credentials == creds + assert isinstance(client, client_class) + + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else + 'https://bigquerydatapolicy.googleapis.com' + ) + + +def test_data_policy_service_client_get_transport_class(): + transport = DataPolicyServiceClient.get_transport_class() + available_transports = [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceRestTransport, + ] + assert transport in available_transports + + transport = DataPolicyServiceClient.get_transport_class("grpc") + assert transport == transports.DataPolicyServiceGrpcTransport + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): + # Check that if channel is provided we won't create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ) + client = client_class(transport=transport) + gtc.assert_not_called() + + # Check that if channel is provided via str we will create a new one. + with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + client = client_class(transport=transport_name) + gtc.assert_called() + + # Check the case api_endpoint is provided. + options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name, client_options=options) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is + # "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client.DEFAULT_MTLS_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client = client_class(transport=transport_name) + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + + # Check the case quota_project_id is provided + options = client_options.ClientOptions(quota_project_id="octopus") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id="octopus", + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + # Check the case api_endpoint is provided + options = client_options.ClientOptions(api_audience="https://language.googleapis.com") + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience="https://language.googleapis.com" + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) +def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): + # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default + # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. + + # Check the case client_cert_source is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + + if use_client_cert_env == "false": + expected_client_cert_source = None + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + else: + expected_client_cert_source = client_cert_source_callback + expected_host = client.DEFAULT_MTLS_ENDPOINT + + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case ADC client cert is provided. Whether client cert is used depends on + # GOOGLE_API_USE_CLIENT_CERTIFICATE value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + if use_client_cert_env == "false": + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_client_cert_source = None + else: + expected_host = client.DEFAULT_MTLS_ENDPOINT + expected_client_cert_source = client_cert_source_callback + + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=expected_host, + scopes=None, + client_cert_source_for_mtls=expected_client_cert_source, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # Check the case client_cert_source and ADC client cert are not provided. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): + with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + patched.return_value = None + client = client_class(transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): + mock_client_cert_source = mock.Mock() + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source == mock_client_cert_source + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + mock_client_cert_source = mock.Mock() + mock_api_endpoint = "foo" + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + assert api_endpoint == mock_api_endpoint + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): + with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source == mock_client_cert_source + + # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has + # unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): + with pytest.raises(MutualTLSChannelError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + + # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with pytest.raises(ValueError) as excinfo: + client_class.get_mtls_endpoint_and_cert_source() + + assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + +@pytest.mark.parametrize("client_class", [ + DataPolicyServiceClient, DataPolicyServiceAsyncClient +]) +@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) +@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +def test_data_policy_service_client_client_api_endpoint(client_class): + mock_client_cert_source = client_cert_source_callback + api_override = "foo.com" + default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + mock_universe = "bar.com" + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + + # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", + # use ClientOptions.api_endpoint as the api endpoint regardless. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): + options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == api_override + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", + # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + client = client_class(credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + + # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), + # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, + # and ClientOptions.universe_domain="bar.com", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. + options = client_options.ClientOptions() + universe_exists = hasattr(options, "universe_domain") + if universe_exists: + options = client_options.ClientOptions(universe_domain=mock_universe) + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + else: + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) + assert client.universe_domain == (mock_universe if universe_exists else default_universe) + + # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", + # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. + options = client_options.ClientOptions() + if hasattr(options, "universe_domain"): + delattr(options, "universe_domain") + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + assert client.api_endpoint == default_endpoint + + +@pytest.mark.parametrize("client_class,transport_class,transport_name", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), +]) +def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): + # Check the case scopes are provided. + options = client_options.ClientOptions( + scopes=["1", "2"], + ) + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=["1", "2"], + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), +]) +def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + +def test_data_policy_service_client_client_options_from_dict(): + with mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + grpc_transport.return_value = None + client = DataPolicyServiceClient( + client_options={'api_endpoint': 'squid.clam.whelk'} + ) + grpc_transport.assert_called_once_with( + credentials=None, + credentials_file=None, + host="squid.clam.whelk", + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + +@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), +]) +def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + # Check the case credentials file is provided. + options = client_options.ClientOptions( + credentials_file="credentials.json" + ) + + with mock.patch.object(transport_class, '__init__') as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=None, + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_create_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.CreateDataPolicyRequest( + parent='parent_value', + data_policy_id='data_policy_id_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.create_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.CreateDataPolicyRequest( + parent='parent_value', + data_policy_id='data_policy_id_value', + ) + +def test_create_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + + request = {} + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.CreateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_create_data_policy_async_from_dict(): + await test_create_data_policy_async(request_type=dict) + +def test_create_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_create_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.CreateDataPolicyRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_create_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].data_policy_id + mock_val = 'data_policy_id_value' + assert arg == mock_val + + +def test_create_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.create_data_policy( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].data_policy_id + mock_val = 'data_policy_id_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_create_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.AddGranteesRequest, + dict, +]) +def test_add_grantees(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.AddGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_add_grantees_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.AddGranteesRequest( + data_policy='data_policy_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.add_grantees(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.AddGranteesRequest( + data_policy='data_policy_value', + ) + +def test_add_grantees_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.add_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc + request = {} + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.add_grantees in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.add_grantees] = mock_rpc + + request = {} + await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.AddGranteesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.AddGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_add_grantees_async_from_dict(): + await test_add_grantees_async(request_type=dict) + +def test_add_grantees_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.AddGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_add_grantees_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.AddGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +def test_add_grantees_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.add_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + + +def test_add_grantees_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + +@pytest.mark.asyncio +async def test_add_grantees_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.add_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + +@pytest.mark.asyncio +async def test_add_grantees_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RemoveGranteesRequest, + dict, +]) +def test_remove_grantees(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.RemoveGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_remove_grantees_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.RemoveGranteesRequest( + data_policy='data_policy_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.remove_grantees(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.RemoveGranteesRequest( + data_policy='data_policy_value', + ) + +def test_remove_grantees_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.remove_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc + request = {} + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.remove_grantees in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.remove_grantees] = mock_rpc + + request = {} + await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RemoveGranteesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.RemoveGranteesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_remove_grantees_async_from_dict(): + await test_remove_grantees_async(request_type=dict) + +def test_remove_grantees_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RemoveGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_remove_grantees_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.RemoveGranteesRequest() + + request.data_policy = 'data_policy_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy=data_policy_value', + ) in kw['metadata'] + + +def test_remove_grantees_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.remove_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + + +def test_remove_grantees_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + +@pytest.mark.asyncio +async def test_remove_grantees_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.remove_grantees( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = 'data_policy_value' + assert arg == mock_val + arg = args[0].grantees + mock_val = ['grantees_value'] + assert arg == mock_val + +@pytest.mark.asyncio +async def test_remove_grantees_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_update_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.UpdateDataPolicyRequest( + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.update_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.UpdateDataPolicyRequest( + ) + +def test_update_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + + request = {} + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.UpdateDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_update_data_policy_async_from_dict(): + await test_update_data_policy_async(request_type=dict) + +def test_update_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_update_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.UpdateDataPolicyRequest() + + request.data_policy.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'data_policy.name=name_value', + ) in kw['metadata'] + + +def test_update_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.update_data_policy( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + + +def test_update_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.update_data_policy( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].data_policy + mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + assert arg == mock_val + +@pytest.mark.asyncio +async def test_update_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + response = client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.delete_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.DeleteDataPolicyRequest( + name='name_value', + ) + +def test_delete_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + + request = {} + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + response = await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.DeleteDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.asyncio +async def test_delete_data_policy_async_from_dict(): + await test_delete_data_policy_async(request_type=dict) + +def test_delete_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_delete_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.DeleteDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_delete_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_delete_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = None + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.delete_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_delete_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + response = client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +def test_get_data_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.GetDataPolicyRequest( + name='name_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_data_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.GetDataPolicyRequest( + name='name_value', + ) + +def test_get_data_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + + request = {} + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + response = await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.GetDataPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.asyncio +async def test_get_data_policy_async_from_dict(): + await test_get_data_policy_async(request_type=dict) + +def test_get_data_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_data_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.GetDataPolicyRequest() + + request.name = 'name_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + await client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'name=name_value', + ) in kw['metadata'] + + +def test_get_data_policy_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + + +def test_get_data_policy_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.DataPolicy() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.get_data_policy( + name='name_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].name + mock_val = 'name_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_get_data_policy_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + response = client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +def test_list_data_policies_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.list_data_policies(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == datapolicy.ListDataPoliciesRequest( + parent='parent_value', + page_token='page_token_value', + ) + +def test_list_data_policies_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + + request = {} + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + response = await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = datapolicy.ListDataPoliciesRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesAsyncPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.asyncio +async def test_list_data_policies_async_from_dict(): + await test_list_data_policies_async(request_type=dict) + +def test_list_data_policies_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_list_data_policies_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = datapolicy.ListDataPoliciesRequest() + + request.parent = 'parent_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + await client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'parent=parent_value', + ) in kw['metadata'] + + +def test_list_data_policies_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + + +def test_list_data_policies_flattened_error(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = datapolicy.ListDataPoliciesResponse() + + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + # Call the method with a truthy value for each flattened field, + # using the keyword arguments to the method. + response = await client.list_data_policies( + parent='parent_value', + ) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + arg = args[0].parent + mock_val = 'parent_value' + assert arg == mock_val + +@pytest.mark.asyncio +async def test_list_data_policies_flattened_error_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + await client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_pager(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + + expected_metadata = () + retry = retries.Retry() + timeout = 5 + expected_metadata = tuple(expected_metadata) + ( + gapic_v1.routing_header.to_grpc_metadata(( + ('parent', ''), + )), + ) + pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) + + assert pager._metadata == expected_metadata + assert pager._retry == retry + assert pager._timeout == timeout + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) +def test_list_data_policies_pages(transport_name: str = "grpc"): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport_name, + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = list(client.list_data_policies(request={}).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.asyncio +async def test_list_data_policies_async_pager(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + async_pager = await client.list_data_policies(request={},) + assert async_pager.next_page_token == 'abc' + responses = [] + async for response in async_pager: # pragma: no branch + responses.append(response) + + assert len(responses) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in responses) + + +@pytest.mark.asyncio +async def test_list_data_policies_async_pages(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__', new_callable=mock.AsyncMock) as call: + # Set the response to a series of pages. + call.side_effect = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + RuntimeError, + ) + pages = [] + # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` + # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 + async for page_ in ( # pragma: no branch + await client.list_data_policies(request={}) + ).pages: + pages.append(page_) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_get_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.get_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.GetIamPolicyRequest( + resource='resource_value', + ) + +def test_get_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + + request = {} + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.GetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_get_iam_policy_async_from_dict(): + await test_get_iam_policy_async(request_type=dict) + +def test_get_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_get_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.GetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_get_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.get_iam_policy(request={ + 'resource': 'resource_value', + 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + response = client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +def test_set_iam_policy_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.set_iam_policy(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.SetIamPolicyRequest( + resource='resource_value', + ) + +def test_set_iam_policy_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + + request = {} + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + response = await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.SetIamPolicyRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.asyncio +async def test_set_iam_policy_async_from_dict(): + await test_set_iam_policy_async(request_type=dict) + +def test_set_iam_policy_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_set_iam_policy_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.SetIamPolicyRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) + await client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_set_iam_policy_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = policy_pb2.Policy() + response = client.set_iam_policy(request={ + 'resource': 'resource_value', + 'policy': policy_pb2.Policy(version=774), + 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + } + ) + call.assert_called() + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions(request_type, transport: str = 'grpc'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + response = client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): + # This test is a coverage failsafe to make sure that UUID4 fields are + # automatically populated, according to AIP-4235, with non-empty requests. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='grpc', + ) + + # Populate all string fields in the request which are not UUID4 + # since we want to check that UUID4 are populated automatically + # if they meet the requirements of AIP 4235. + request = iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client.test_iam_permissions(request=request) + call.assert_called() + _, args, _ = call.mock_calls[0] + assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( + resource='resource_value', + ) + +def test_test_iam_permissions_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.AsyncMock() + mock_rpc.return_value = mock.Mock() + client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + + request = {} + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + await client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + +@pytest.mark.asyncio +async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport=transport, + ) + + # Everything is optional in proto3 as far as the runtime is concerned, + # and we are mocking out the actual API, so just send an empty request. + request = request_type() + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + response = await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + request = iam_policy_pb2.TestIamPermissionsRequest() + assert args[0] == request + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_async_from_dict(): + await test_test_iam_permissions_async(request_type=dict) + +def test_test_iam_permissions_field_headers(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) == 1 + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + + +@pytest.mark.asyncio +async def test_test_iam_permissions_field_headers_async(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + ) + + # Any value that is part of the HTTP/1.1 URI should be sent as + # a field header. Set these to a non-empty value. + request = iam_policy_pb2.TestIamPermissionsRequest() + + request.resource = 'resource_value' + + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + await client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert len(call.mock_calls) + _, args, _ = call.mock_calls[0] + assert args[0] == request + + # Establish that the field header was sent. + _, _, kw = call.mock_calls[0] + assert ( + 'x-goog-request-params', + 'resource=resource_value', + ) in kw['metadata'] + +def test_test_iam_permissions_from_dict_foreign(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + # Mock the actual call within the gRPC stub, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + response = client.test_iam_permissions(request={ + 'resource': 'resource_value', + 'permissions': ['permissions_value'], + } + ) + call.assert_called() + + +def test_create_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.create_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + + request = {} + client.create_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.create_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["data_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + jsonified_request["dataPolicyId"] = 'data_policy_id_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + assert "dataPolicyId" in jsonified_request + assert jsonified_request["dataPolicyId"] == 'data_policy_id_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.create_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_create_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.create_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("parent", "dataPolicyId", "dataPolicy", ))) + + +def test_create_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.create_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_data_policy( + datapolicy.CreateDataPolicyRequest(), + parent='parent_value', + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + data_policy_id='data_policy_id_value', + ) + + +def test_add_grantees_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.add_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc + + request = {} + client.add_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.add_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["data_policy"] = "" + request_init["grantees"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["dataPolicy"] = 'data_policy_value' + jsonified_request["grantees"] = 'grantees_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "dataPolicy" in jsonified_request + assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert "grantees" in jsonified_request + assert jsonified_request["grantees"] == 'grantees_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.add_grantees(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_add_grantees_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.add_grantees._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + + +def test_add_grantees_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.add_grantees(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" % client.transport._host, args[1]) + + +def test_add_grantees_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.add_grantees( + datapolicy.AddGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +def test_remove_grantees_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.remove_grantees in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc + + request = {} + client.remove_grantees(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.remove_grantees(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGranteesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["data_policy"] = "" + request_init["grantees"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["dataPolicy"] = 'data_policy_value' + jsonified_request["grantees"] = 'grantees_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "dataPolicy" in jsonified_request + assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert "grantees" in jsonified_request + assert jsonified_request["grantees"] == 'grantees_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.remove_grantees(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_remove_grantees_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.remove_grantees._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + + +def test_remove_grantees_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.remove_grantees(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" % client.transport._host, args[1]) + + +def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.remove_grantees( + datapolicy.RemoveGranteesRequest(), + data_policy='data_policy_value', + grantees=['grantees_value'], + ) + + +def test_update_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.update_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + + request = {} + client.update_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.update_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "patch", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.update_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_update_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.update_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask", )) & set(("dataPolicy", ))) + + +def test_update_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + + # get truthy value for each flattened field + mock_args = dict( + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.update_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_data_policy( + datapolicy.UpdateDataPolicyRequest(), + data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), + update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + ) + + +def test_delete_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.delete_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + + request = {} + client.delete_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.delete_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = None + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "delete", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.delete_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_delete_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.delete_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_delete_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = '' + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.delete_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_data_policy( + datapolicy.DeleteDataPolicyRequest(), + name='name_value', + ) + + +def test_get_data_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_data_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc + + request = {} + client.get_data_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_data_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = 'name_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == 'name_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_data_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_data_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_data_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name", ))) + + +def test_get_data_policy_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + + # get truthy value for each flattened field + mock_args = dict( + name='name_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.get_data_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + + +def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_data_policy( + datapolicy.GetDataPolicyRequest(), + name='name_value', + ) + + +def test_list_data_policies_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.list_data_policies in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + + request = {} + client.list_data_policies(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.list_data_policies(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = 'parent_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("page_size", "page_token", )) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == 'parent_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "get", + 'query_params': pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.list_data_policies(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_list_data_policies_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.list_data_policies._get_unset_required_fields({}) + assert set(unset_fields) == (set(("pageSize", "pageToken", )) & set(("parent", ))) + + +def test_list_data_policies_rest_flattened(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + # get truthy value for each flattened field + mock_args = dict( + parent='parent_value', + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + client.list_data_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate("%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + + +def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_data_policies( + datapolicy.ListDataPoliciesRequest(), + parent='parent_value', + ) + + +def test_list_data_policies_rest_pager(transport: str = 'rest'): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + #with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + next_page_token='abc', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[], + next_page_token='def', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + ], + next_page_token='ghi', + ), + datapolicy.ListDataPoliciesResponse( + data_policies=[ + datapolicy.DataPolicy(), + datapolicy.DataPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode('UTF-8') + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {'parent': 'projects/sample1/locations/sample2'} + + pager = client.list_data_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, datapolicy.DataPolicy) + for i in results) + + pages = list(client.list_data_policies(request=sample_request).pages) + for page_, token in zip(pages, ['abc','def','ghi', '']): + assert page_.raw_page.next_page_token == token + + +def test_get_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.get_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc + + request = {} + client.get_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.get_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.get_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_get_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.get_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", ))) + + +def test_set_iam_policy_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.set_iam_policy in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc + + request = {} + client.set_iam_policy(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.set_iam_policy(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.set_iam_policy(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_set_iam_policy_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.set_iam_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) + + +def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): + # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, + # instead of constructing them on each call + with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Should wrap all calls on client creation + assert wrapper_fn.call_count > 0 + wrapper_fn.reset_mock() + + # Ensure method has been cached + assert client._transport.test_iam_permissions in client._transport._wrapped_methods + + # Replace cached wrapped function with mock + mock_rpc = mock.Mock() + mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + + request = {} + client.test_iam_permissions(request) + + # Establish that the underlying gRPC stub method was called. + assert mock_rpc.call_count == 1 + + client.test_iam_permissions(request) + + # Establish that a new wrapper was not created for this call + assert wrapper_fn.call_count == 0 + assert mock_rpc.call_count == 2 + + +def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): + transport_class = transports.DataPolicyServiceRestTransport + + request_init = {} + request_init["resource"] = "" + request_init["permissions"] = "" + request = request_type(**request_init) + pb_request = request + jsonified_request = json.loads(json_format.MessageToJson( + pb_request, + use_integers_for_enums=False + )) + + # verify fields with default values are dropped + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["resource"] = 'resource_value' + jsonified_request["permissions"] = 'permissions_value' + + unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "resource" in jsonified_request + assert jsonified_request["resource"] == 'resource_value' + assert "permissions" in jsonified_request + assert jsonified_request["permissions"] == 'permissions_value' + + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport='rest', + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, 'request') as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, 'transcode') as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request + transcode_result = { + 'uri': 'v1/sample_method', + 'method': "post", + 'query_params': pb_request, + } + transcode_result['body'] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + response = client.test_iam_permissions(request) + + expected_params = [ + ('$alt', 'json;enum-encoding=int') + ] + actual_params = req.call_args.kwargs['params'] + assert expected_params == actual_params + + +def test_test_iam_permissions_rest_unset_required_fields(): + transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + + unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options=options, + credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = DataPolicyServiceClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = DataPolicyServiceClient(transport=transport) + assert client.transport is transport + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.DataPolicyServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + +@pytest.mark.parametrize("transport_class", [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, +]) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + +def test_transport_kind_grpc(): + transport = DataPolicyServiceClient.get_transport_class("grpc")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "grpc" + + +def test_initialize_client_w_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_add_grantees_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_remove_grantees_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + call.return_value = None + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + call.return_value = datapolicy.DataPolicy() + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + call.return_value = datapolicy.ListDataPoliciesResponse() + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + call.return_value = policy_pb2.Policy() + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + call.return_value = iam_policy_pb2.TestIamPermissionsResponse() + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_grpc_asyncio(): + transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( + credentials=async_anonymous_credentials() + ) + assert transport.kind == "grpc_asyncio" + + +def test_initialize_client_w_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_create_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_add_grantees_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_remove_grantees_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_update_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_delete_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) + await client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_data_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + )) + await client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_list_data_policies_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + )) + await client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_get_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_set_iam_policy_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( + version=774, + etag=b'etag_blob', + )) + await client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +@pytest.mark.asyncio +async def test_test_iam_permissions_empty_call_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + # Designate an appropriate return value for the call. + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + )) + await client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_kind_rest(): + transport = DataPolicyServiceClient.get_transport_class("rest")( + credentials=ga_credentials.AnonymousCredentials() + ) + assert transport.kind == "rest" + + +def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.create_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.CreateDataPolicyRequest, + dict, +]) +def test_create_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.create_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.CreateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.add_grantees(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.AddGranteesRequest, + dict, +]) +def test_add_grantees_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.add_grantees(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_add_grantees_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_add_grantees") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.AddGranteesRequest.pb(datapolicy.AddGranteesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.AddGranteesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.add_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGranteesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.remove_grantees(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.RemoveGranteesRequest, + dict, +]) +def test_remove_grantees_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.remove_grantees(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_remove_grantees_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.RemoveGranteesRequest.pb(datapolicy.RemoveGranteesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.RemoveGranteesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.remove_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.update_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.UpdateDataPolicyRequest, + dict, +]) +def test_update_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request_init["data_policy"] = {'data_masking_policy': {'predefined_expression': 1}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_id': 'data_policy_id_value', 'etag': 'etag_value', 'data_policy_type': 1, 'policy_tag': 'policy_tag_value', 'grantees': ['grantees_value1', 'grantees_value2'], 'version': 1} + # The version of a generated dependency at test runtime may differ from the version used during generation. + # Delete any fields which are not present in the current runtime dependency + # See https://github.com/googleapis/gapic-generator-python/issues/1748 + + # Determine if the message type is proto-plus or protobuf + test_field = datapolicy.UpdateDataPolicyRequest.meta.fields["data_policy"] + + def get_message_fields(field): + # Given a field which is a message (composite type), return a list with + # all the fields of the message. + # If the field is not a composite type, return an empty list. + message_fields = [] + + if hasattr(field, "message") and field.message: + is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") + + if is_field_type_proto_plus_type: + message_fields = field.message.meta.fields.values() + # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types + else: # pragma: NO COVER + message_fields = field.message.DESCRIPTOR.fields + return message_fields + + runtime_nested_fields = [ + (field.name, nested_field.name) + for field in get_message_fields(test_field) + for nested_field in get_message_fields(field) + ] + + subfields_not_in_runtime = [] + + # For each item in the sample request, create a list of sub fields which are not present at runtime + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for field, value in request_init["data_policy"].items(): # pragma: NO COVER + result = None + is_repeated = False + # For repeated fields + if isinstance(value, list) and len(value): + is_repeated = True + result = value[0] + # For fields where the type is another message + if isinstance(value, dict): + result = value + + if result and hasattr(result, "keys"): + for subfield in result.keys(): + if (field, subfield) not in runtime_nested_fields: + subfields_not_in_runtime.append( + {"field": field, "subfield": subfield, "is_repeated": is_repeated} + ) + + # Remove fields from the sample request which are not present in the runtime version of the dependency + # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + field = subfield_to_delete.get("field") + field_repeated = subfield_to_delete.get("is_repeated") + subfield = subfield_to_delete.get("subfield") + if subfield: + if field_repeated: + for i in range(0, len(request_init["data_policy"][field])): + del request_init["data_policy"][field][i][subfield] + else: + del request_init["data_policy"][field][subfield] + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.update_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.UpdateDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.delete_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.DeleteDataPolicyRequest, + dict, +]) +def test_delete_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = None + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = '' + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.delete_data_policy(request) + + # Establish that the response is the type that we expect. + assert response is None + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: + pre.assert_not_called() + pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + + request = datapolicy.DeleteDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + + client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + + +def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_data_policy(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.GetDataPolicyRequest, + dict, +]) +def test_get_data_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.DataPolicy( + name='name_value', + data_policy_id='data_policy_id_value', + etag='etag_value', + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag='policy_tag_value', + grantees=['grantees_value'], + version=datapolicy.DataPolicy.Version.V1, + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.DataPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_data_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, datapolicy.DataPolicy) + assert response.name == 'name_value' + assert response.data_policy_id == 'data_policy_id_value' + assert response.etag == 'etag_value' + assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + assert response.policy_tag == 'policy_tag_value' + assert response.grantees == ['grantees_value'] + assert response.version == datapolicy.DataPolicy.Version.V1 + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_data_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) + req.return_value.content = return_value + + request = datapolicy.GetDataPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.DataPolicy() + post_with_metadata.return_value = datapolicy.DataPolicy(), metadata + + client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.list_data_policies(request) + + +@pytest.mark.parametrize("request_type", [ + datapolicy.ListDataPoliciesRequest, + dict, +]) +def test_list_data_policies_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'parent': 'projects/sample1/locations/sample2'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = datapolicy.ListDataPoliciesResponse( + next_page_token='next_page_token_value', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + + # Convert return value to protobuf type + return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.list_data_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListDataPoliciesPager) + assert response.next_page_token == 'next_page_token_value' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_data_policies_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) + req.return_value.content = return_value + + request = datapolicy.ListDataPoliciesRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = datapolicy.ListDataPoliciesResponse() + post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata + + client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.get_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.GetIamPolicyRequest, + dict, +]) +def test_get_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.get_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.GetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.GetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.set_iam_policy(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.SetIamPolicyRequest, + dict, +]) +def test_set_iam_policy_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy( + version=774, + etag=b'etag_blob', + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.set_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + assert response.version == 774 + assert response.etag == b'etag_blob' + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_set_iam_policy_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.SetIamPolicyRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(policy_pb2.Policy()) + req.return_value.content = return_value + + request = iam_policy_pb2.SetIamPolicyRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = policy_pb2.Policy() + post_with_metadata.return_value = policy_pb2.Policy(), metadata + + client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + + +def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + # Wrap the value into a proper Response obj + response_value = mock.Mock() + json_return_value = '' + response_value.json = mock.Mock(return_value={}) + response_value.status_code = 400 + response_value.request = mock.Mock() + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + client.test_iam_permissions(request) + + +@pytest.mark.parametrize("request_type", [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, +]) +def test_test_iam_permissions_rest_call_success(request_type): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + + # send a request that will satisfy transcoding + request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), 'request') as req: + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse( + permissions=['permissions_value'], + ) + + # Wrap the value into a proper Response obj + response_value = mock.Mock() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value.content = json_return_value.encode('UTF-8') + req.return_value = response_value + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + response = client.test_iam_permissions(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) + assert response.permissions == ['permissions_value'] + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_test_iam_permissions_rest_interceptors(null_interceptor): + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), + ) + client = DataPolicyServiceClient(transport=transport) + + with mock.patch.object(type(client.transport._session), "request") as req, \ + mock.patch.object(path_template, "transcode") as transcode, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ + mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: + pre.assert_not_called() + post.assert_not_called() + post_with_metadata.assert_not_called() + pb_message = iam_policy_pb2.TestIamPermissionsRequest() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = mock.Mock() + req.return_value.status_code = 200 + req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} + return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) + req.return_value.content = return_value + + request = iam_policy_pb2.TestIamPermissionsRequest() + metadata =[ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = iam_policy_pb2.TestIamPermissionsResponse() + post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata + + client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + + pre.assert_called_once() + post.assert_called_once() + post_with_metadata.assert_called_once() + +def test_initialize_client_w_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + assert client is not None + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_create_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.create_data_policy), + '__call__') as call: + client.create_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.CreateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_add_grantees_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.add_grantees), + '__call__') as call: + client.add_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.AddGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_remove_grantees_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.remove_grantees), + '__call__') as call: + client.remove_grantees(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.RemoveGranteesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_update_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.update_data_policy), + '__call__') as call: + client.update_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.UpdateDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_delete_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.delete_data_policy), + '__call__') as call: + client.delete_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.DeleteDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_data_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_data_policy), + '__call__') as call: + client.get_data_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.GetDataPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_list_data_policies_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.list_data_policies), + '__call__') as call: + client.list_data_policies(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = datapolicy.ListDataPoliciesRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_get_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.get_iam_policy), + '__call__') as call: + client.get_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.GetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_set_iam_policy_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.set_iam_policy), + '__call__') as call: + client.set_iam_policy(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.SetIamPolicyRequest() + + assert args[0] == request_msg + + +# This test is a coverage failsafe to make sure that totally empty calls, +# i.e. request == None and no flattened fields passed, work. +def test_test_iam_permissions_empty_call_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the actual call, and fake the request. + with mock.patch.object( + type(client.transport.test_iam_permissions), + '__call__') as call: + client.test_iam_permissions(request=None) + + # Establish that the underlying stub method was called. + call.assert_called() + _, args, _ = call.mock_calls[0] + request_msg = iam_policy_pb2.TestIamPermissionsRequest() + + assert args[0] == request_msg + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.DataPolicyServiceGrpcTransport, + ) + +def test_data_policy_service_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json" + ) + + +def test_data_policy_service_base_transport(): + # Instantiate the base transport. + with mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + Transport.return_value = None + transport = transports.DataPolicyServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + 'create_data_policy', + 'add_grantees', + 'remove_grantees', + 'update_data_policy', + 'delete_data_policy', + 'get_data_policy', + 'list_data_policies', + 'get_iam_policy', + 'set_iam_policy', + 'test_iam_permissions', + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Catch all for all remaining methods and properties + remainder = [ + 'kind', + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_data_policy_service_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with("credentials.json", + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id="octopus", + ) + + +def test_data_policy_service_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.DataPolicyServiceTransport() + adc.assert_called_once() + + +def test_data_policy_service_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + DataPolicyServiceClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, + ], +) +def test_data_policy_service_transport_auth_gdch_credentials(transport_class): + host = 'https://language.com' + api_audience_tests = [None, 'https://language2.com'] + api_audience_expect = [host, 'https://language2.com'] + for t, e in zip(api_audience_tests, api_audience_expect): + with mock.patch.object(google.auth, 'default', autospec=True) as adc: + gdch_mock = mock.MagicMock() + type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + adc.return_value = (gdch_mock, None) + transport_class(host=host, api_audience=t) + gdch_mock.with_gdch_audience.assert_called_once_with( + e + ) + + +@pytest.mark.parametrize( + "transport_class,grpc_helpers", + [ + (transports.DataPolicyServiceGrpcTransport, grpc_helpers), + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + ], +) +def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + grpc_helpers, "create_channel", autospec=True + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + adc.return_value = (creds, None) + transport_class( + quota_project_id="octopus", + scopes=["1", "2"] + ) + + create_channel.assert_called_with( + "bigquerydatapolicy.googleapis.com:443", + credentials=creds, + credentials_file=None, + quota_project_id="octopus", + default_scopes=( + 'https://www.googleapis.com/auth/bigquery', + 'https://www.googleapis.com/auth/cloud-platform', +), + scopes=["1", "2"], + default_host="bigquerydatapolicy.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( + transport_class +): + cred = ga_credentials.AnonymousCredentials() + + # Check ssl_channel_credentials is used if provided. + with mock.patch.object(transport_class, "create_channel") as mock_create_channel: + mock_ssl_channel_creds = mock.Mock() + transport_class( + host="squid.clam.whelk", + credentials=cred, + ssl_channel_credentials=mock_ssl_channel_creds + ) + mock_create_channel.assert_called_once_with( + "squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_channel_creds, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls + # is used. + with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): + with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: + transport_class( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + expected_cert, expected_key = client_cert_source_callback() + mock_ssl_cred.assert_called_once_with( + certificate_chain=expected_cert, + private_key=expected_key + ) + +def test_data_policy_service_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: + transports.DataPolicyServiceRestTransport ( + credentials=cred, + client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_no_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:443' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com' + ) + +@pytest.mark.parametrize("transport_name", [ + "grpc", + "grpc_asyncio", + "rest", +]) +def test_data_policy_service_host_with_port(transport_name): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + transport=transport_name, + ) + assert client.transport._host == ( + 'bigquerydatapolicy.googleapis.com:8000' + if transport_name in ['grpc', 'grpc_asyncio'] + else 'https://bigquerydatapolicy.googleapis.com:8000' + ) + +@pytest.mark.parametrize("transport_name", [ + "rest", +]) +def test_data_policy_service_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = DataPolicyServiceClient( + credentials=creds1, + transport=transport_name, + ) + client2 = DataPolicyServiceClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.create_data_policy._session + session2 = client2.transport.create_data_policy._session + assert session1 != session2 + session1 = client1.transport.add_grantees._session + session2 = client2.transport.add_grantees._session + assert session1 != session2 + session1 = client1.transport.remove_grantees._session + session2 = client2.transport.remove_grantees._session + assert session1 != session2 + session1 = client1.transport.update_data_policy._session + session2 = client2.transport.update_data_policy._session + assert session1 != session2 + session1 = client1.transport.delete_data_policy._session + session2 = client2.transport.delete_data_policy._session + assert session1 != session2 + session1 = client1.transport.get_data_policy._session + session2 = client2.transport.get_data_policy._session + assert session1 != session2 + session1 = client1.transport.list_data_policies._session + session2 = client2.transport.list_data_policies._session + assert session1 != session2 + session1 = client1.transport.get_iam_policy._session + session2 = client2.transport.get_iam_policy._session + assert session1 != session2 + session1 = client1.transport.set_iam_policy._session + session2 = client2.transport.set_iam_policy._session + assert session1 != session2 + session1 = client1.transport.test_iam_permissions._session + session2 = client2.transport.test_iam_permissions._session + assert session1 != session2 +def test_data_policy_service_grpc_transport_channel(): + channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +def test_data_policy_service_grpc_asyncio_transport_channel(): + channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.DataPolicyServiceGrpcAsyncIOTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_client_cert_source( + transport_class +): + with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_ssl_cred = mock.Mock() + grpc_ssl_channel_cred.return_value = mock_ssl_cred + + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + + cred = ga_credentials.AnonymousCredentials() + with pytest.warns(DeprecationWarning): + with mock.patch.object(google.auth, 'default') as adc: + adc.return_value = (cred, None) + transport = transport_class( + host="squid.clam.whelk", + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=client_cert_source_callback, + ) + adc.assert_called_once() + + grpc_ssl_channel_cred.assert_called_once_with( + certificate_chain=b"cert bytes", private_key=b"key bytes" + ) + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + assert transport._ssl_channel_credentials == mock_ssl_cred + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +def test_data_policy_service_transport_channel_mtls_with_adc( + transport_class +): + mock_ssl_cred = mock.Mock() + with mock.patch.multiple( + "google.auth.transport.grpc.SslCredentials", + __init__=mock.Mock(return_value=None), + ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), + ): + with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + mock_cred = mock.Mock() + + with pytest.warns(DeprecationWarning): + transport = transport_class( + host="squid.clam.whelk", + credentials=mock_cred, + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=None, + ) + + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=mock_cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + + +def test_data_policy_path(): + project = "squid" + location = "clam" + data_policy = "whelk" + expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) + assert expected == actual + + +def test_parse_data_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "data_policy": "nudibranch", + } + path = DataPolicyServiceClient.data_policy_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_data_policy_path(path) + assert expected == actual + +def test_policy_tag_path(): + project = "cuttlefish" + location = "mussel" + taxonomy = "winkle" + policy_tag = "nautilus" + expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + actual = DataPolicyServiceClient.policy_tag_path(project, location, taxonomy, policy_tag) + assert expected == actual + + +def test_parse_policy_tag_path(): + expected = { + "project": "scallop", + "location": "abalone", + "taxonomy": "squid", + "policy_tag": "clam", + } + path = DataPolicyServiceClient.policy_tag_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_policy_tag_path(path) + assert expected == actual + +def test_common_billing_account_path(): + billing_account = "whelk" + expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + actual = DataPolicyServiceClient.common_billing_account_path(billing_account) + assert expected == actual + + +def test_parse_common_billing_account_path(): + expected = { + "billing_account": "octopus", + } + path = DataPolicyServiceClient.common_billing_account_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_billing_account_path(path) + assert expected == actual + +def test_common_folder_path(): + folder = "oyster" + expected = "folders/{folder}".format(folder=folder, ) + actual = DataPolicyServiceClient.common_folder_path(folder) + assert expected == actual + + +def test_parse_common_folder_path(): + expected = { + "folder": "nudibranch", + } + path = DataPolicyServiceClient.common_folder_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_folder_path(path) + assert expected == actual + +def test_common_organization_path(): + organization = "cuttlefish" + expected = "organizations/{organization}".format(organization=organization, ) + actual = DataPolicyServiceClient.common_organization_path(organization) + assert expected == actual + + +def test_parse_common_organization_path(): + expected = { + "organization": "mussel", + } + path = DataPolicyServiceClient.common_organization_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_organization_path(path) + assert expected == actual + +def test_common_project_path(): + project = "winkle" + expected = "projects/{project}".format(project=project, ) + actual = DataPolicyServiceClient.common_project_path(project) + assert expected == actual + + +def test_parse_common_project_path(): + expected = { + "project": "nautilus", + } + path = DataPolicyServiceClient.common_project_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_project_path(path) + assert expected == actual + +def test_common_location_path(): + project = "scallop" + location = "abalone" + expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + actual = DataPolicyServiceClient.common_location_path(project, location) + assert expected == actual + + +def test_parse_common_location_path(): + expected = { + "project": "squid", + "location": "clam", + } + path = DataPolicyServiceClient.common_location_path(**expected) + + # Check that the path construction is reversible. + actual = DataPolicyServiceClient.parse_common_location_path(path) + assert expected == actual + + +def test_client_with_default_client_info(): + client_info = gapic_v1.client_info.ClientInfo() + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + transport_class = DataPolicyServiceClient.get_transport_class() + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + +def test_transport_close_grpc(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +@pytest.mark.asyncio +async def test_transport_close_grpc_asyncio(): + client = DataPolicyServiceAsyncClient( + credentials=async_anonymous_credentials(), + transport="grpc_asyncio" + ) + with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + async with client: + close.assert_not_called() + close.assert_called_once() + + +def test_transport_close_rest(): + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest" + ) + with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: + with client: + close.assert_not_called() + close.assert_called_once() + + +def test_client_ctx(): + transports = [ + 'rest', + 'grpc', + ] + for transport in transports: + client = DataPolicyServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport + ) + # Test client calls underlying transport. + with mock.patch.object(type(client.transport), "close") as close: + close.assert_not_called() + with client: + pass + close.assert_called() + +@pytest.mark.parametrize("client_class,transport_class", [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), +]) +def test_api_key_credentials(client_class, transport_class): + with mock.patch.object( + google.auth._default, "get_api_key_credentials", create=True + ) as get_api_key_credentials: + mock_cred = mock.Mock() + get_api_key_credentials.return_value = mock_cred + options = client_options.ClientOptions() + options.api_key = "api_key" + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options) + patched.assert_called_once_with( + credentials=mock_cred, + credentials_file=None, + host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + api_audience=None, + ) From 9e3b1b4f6ce35a3bf03bf3e29aa34f2b6705a907 Mon Sep 17 00:00:00 2001 From: Owl Bot Date: Tue, 22 Jul 2025 21:52:42 +0000 Subject: [PATCH 2/2] =?UTF-8?q?=F0=9F=A6=89=20Updates=20from=20OwlBot=20po?= =?UTF-8?q?st-processor?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md --- .../v1/.coveragerc | 13 - .../v1/.flake8 | 34 - .../v1/LICENSE | 202 - .../v1/MANIFEST.in | 20 - .../v1/README.rst | 143 - .../v1/docs/_static/custom.css | 20 - .../v1/docs/_templates/layout.html | 50 - .../data_policy_service.rst | 10 - .../bigquery_datapolicies_v1/services_.rst | 6 - .../docs/bigquery_datapolicies_v1/types_.rst | 6 - .../v1/docs/conf.py | 385 - .../v1/docs/index.rst | 10 - .../v1/docs/multiprocessing.rst | 7 - .../cloud/bigquery_datapolicies/__init__.py | 45 - .../bigquery_datapolicies_v1/__init__.py | 46 - .../gapic_metadata.json | 163 - .../services/data_policy_service/__init__.py | 22 - .../data_policy_service/async_client.py | 1277 --- .../services/data_policy_service/client.py | 1635 ---- .../services/data_policy_service/pagers.py | 166 - .../data_policy_service/transports/base.py | 356 - .../data_policy_service/transports/grpc.py | 566 -- .../transports/grpc_asyncio.py | 708 -- .../data_policy_service/transports/rest.py | 1833 ---- .../transports/rest_base.py | 487 -- .../types/datapolicy.py | 413 - .../v1/mypy.ini | 3 - .../v1/noxfile.py | 591 -- ...policy_service_create_data_policy_async.py | 57 - ..._policy_service_create_data_policy_sync.py | 57 - ...policy_service_delete_data_policy_async.py | 50 - ..._policy_service_delete_data_policy_sync.py | 50 - ...ta_policy_service_get_data_policy_async.py | 52 - ...ata_policy_service_get_data_policy_sync.py | 52 - ...ata_policy_service_get_iam_policy_async.py | 53 - ...data_policy_service_get_iam_policy_sync.py | 53 - ...policy_service_list_data_policies_async.py | 53 - ..._policy_service_list_data_policies_sync.py | 53 - ...policy_service_rename_data_policy_async.py | 53 - ..._policy_service_rename_data_policy_sync.py | 53 - ...ata_policy_service_set_iam_policy_async.py | 53 - ...data_policy_service_set_iam_policy_sync.py | 53 - ...licy_service_test_iam_permissions_async.py | 54 - ...olicy_service_test_iam_permissions_sync.py | 54 - ...policy_service_update_data_policy_async.py | 56 - ..._policy_service_update_data_policy_sync.py | 56 - ...google.cloud.bigquery.datapolicies.v1.json | 1458 ---- ...fixup_bigquery_datapolicies_v1_keywords.py | 184 - .../v1/setup.py | 99 - .../v1/testing/constraints-3.10.txt | 7 - .../v1/testing/constraints-3.11.txt | 7 - .../v1/testing/constraints-3.12.txt | 7 - .../v1/testing/constraints-3.13.txt | 12 - .../v1/testing/constraints-3.7.txt | 11 - .../v1/testing/constraints-3.8.txt | 7 - .../v1/testing/constraints-3.9.txt | 7 - .../v1/tests/__init__.py | 16 - .../v1/tests/unit/__init__.py | 16 - .../v1/tests/unit/gapic/__init__.py | 16 - .../bigquery_datapolicies_v1/__init__.py | 16 - .../test_data_policy_service.py | 7526 ----------------- .../v1beta1/.coveragerc | 13 - .../v1beta1/.flake8 | 34 - .../v1beta1/LICENSE | 202 - .../v1beta1/MANIFEST.in | 20 - .../v1beta1/README.rst | 143 - .../v1beta1/docs/_static/custom.css | 20 - .../v1beta1/docs/_templates/layout.html | 50 - .../data_policy_service.rst | 10 - .../services_.rst | 6 - .../bigquery_datapolicies_v1beta1/types_.rst | 6 - .../v1beta1/docs/conf.py | 385 - .../v1beta1/docs/index.rst | 10 - .../v1beta1/docs/multiprocessing.rst | 7 - .../cloud/bigquery_datapolicies/__init__.py | 43 - .../bigquery_datapolicies/gapic_version.py | 16 - .../cloud/bigquery_datapolicies/py.typed | 2 - .../bigquery_datapolicies_v1beta1/__init__.py | 44 - .../gapic_metadata.json | 103 - .../gapic_version.py | 16 - .../bigquery_datapolicies_v1beta1/py.typed | 2 - .../data_policy_service/async_client.py | 1162 --- .../services/data_policy_service/client.py | 1519 ---- .../services/data_policy_service/pagers.py | 166 - .../data_policy_service/transports/base.py | 333 - .../data_policy_service/transports/grpc.py | 539 -- .../transports/grpc_asyncio.py | 667 -- .../types/datapolicy.py | 320 - .../v1beta1/mypy.ini | 3 - .../v1beta1/noxfile.py | 591 -- ...policy_service_create_data_policy_async.py | 57 - ..._policy_service_create_data_policy_sync.py | 57 - ...policy_service_delete_data_policy_async.py | 50 - ..._policy_service_delete_data_policy_sync.py | 50 - ...ta_policy_service_get_data_policy_async.py | 52 - ...ata_policy_service_get_data_policy_sync.py | 52 - ...ata_policy_service_get_iam_policy_async.py | 53 - ...data_policy_service_get_iam_policy_sync.py | 53 - ...policy_service_list_data_policies_async.py | 53 - ..._policy_service_list_data_policies_sync.py | 53 - ...ata_policy_service_set_iam_policy_async.py | 53 - ...data_policy_service_set_iam_policy_sync.py | 53 - ...licy_service_test_iam_permissions_async.py | 54 - ...olicy_service_test_iam_permissions_sync.py | 54 - ...policy_service_update_data_policy_async.py | 56 - ..._policy_service_update_data_policy_sync.py | 56 - ...e.cloud.bigquery.datapolicies.v1beta1.json | 1289 --- ..._bigquery_datapolicies_v1beta1_keywords.py | 183 - .../v1beta1/setup.py | 99 - .../v1beta1/testing/constraints-3.10.txt | 7 - .../v1beta1/testing/constraints-3.11.txt | 7 - .../v1beta1/testing/constraints-3.12.txt | 7 - .../v1beta1/testing/constraints-3.13.txt | 12 - .../v1beta1/testing/constraints-3.7.txt | 11 - .../v1beta1/testing/constraints-3.8.txt | 7 - .../v1beta1/testing/constraints-3.9.txt | 7 - .../v1beta1/tests/__init__.py | 16 - .../v1beta1/tests/unit/__init__.py | 16 - .../v1beta1/tests/unit/gapic/__init__.py | 16 - .../bigquery_datapolicies_v1beta1/__init__.py | 16 - .../test_data_policy_service.py | 4346 ---------- .../v2/.coveragerc | 13 - .../v2/.flake8 | 34 - .../v2/LICENSE | 202 - .../v2/MANIFEST.in | 20 - .../v2/README.rst | 143 - .../v2/docs/_static/custom.css | 20 - .../v2/docs/_templates/layout.html | 50 - .../v2/docs/conf.py | 385 - .../v2/docs/index.rst | 10 - .../v2/docs/multiprocessing.rst | 7 - .../cloud/bigquery_datapolicies/__init__.py | 47 - .../bigquery_datapolicies/gapic_version.py | 16 - .../cloud/bigquery_datapolicies/py.typed | 2 - .../bigquery_datapolicies_v2/__init__.py | 48 - .../bigquery_datapolicies_v2/gapic_version.py | 16 - .../cloud/bigquery_datapolicies_v2/py.typed | 2 - .../data_policy_service/transports/README.rst | 9 - .../transports/__init__.py | 38 - .../v2/mypy.ini | 3 - .../v2/noxfile.py | 591 -- .../v2/setup.py | 99 - .../v2/testing/constraints-3.10.txt | 7 - .../v2/testing/constraints-3.11.txt | 7 - .../v2/testing/constraints-3.12.txt | 7 - .../v2/testing/constraints-3.13.txt | 12 - .../v2/testing/constraints-3.7.txt | 11 - .../v2/testing/constraints-3.8.txt | 7 - .../v2/testing/constraints-3.9.txt | 7 - .../v2/tests/__init__.py | 16 - .../v2/tests/unit/__init__.py | 16 - .../v2/tests/unit/gapic/__init__.py | 16 - .../bigquery_datapolicies_v2/__init__.py | 16 - .../v2beta1/.coveragerc | 13 - .../v2beta1/.flake8 | 34 - .../v2beta1/LICENSE | 202 - .../v2beta1/MANIFEST.in | 20 - .../v2beta1/README.rst | 143 - .../v2beta1/docs/_static/custom.css | 20 - .../v2beta1/docs/_templates/layout.html | 50 - .../v2beta1/docs/conf.py | 385 - .../v2beta1/docs/index.rst | 10 - .../v2beta1/docs/multiprocessing.rst | 7 - .../cloud/bigquery_datapolicies/__init__.py | 47 - .../bigquery_datapolicies/gapic_version.py | 16 - .../cloud/bigquery_datapolicies/py.typed | 2 - .../bigquery_datapolicies_v2beta1/__init__.py | 48 - .../gapic_version.py | 16 - .../bigquery_datapolicies_v2beta1/py.typed | 2 - .../services/data_policy_service/__init__.py | 22 - .../data_policy_service/transports/README.rst | 9 - .../transports/__init__.py | 38 - .../v2beta1/mypy.ini | 3 - .../v2beta1/noxfile.py | 591 -- .../v2beta1/setup.py | 99 - .../v2beta1/testing/constraints-3.10.txt | 7 - .../v2beta1/testing/constraints-3.11.txt | 7 - .../v2beta1/testing/constraints-3.12.txt | 7 - .../v2beta1/testing/constraints-3.13.txt | 12 - .../v2beta1/testing/constraints-3.7.txt | 11 - .../v2beta1/testing/constraints-3.8.txt | 7 - .../v2beta1/testing/constraints-3.9.txt | 7 - .../v2beta1/tests/__init__.py | 16 - .../v2beta1/tests/unit/__init__.py | 16 - .../v2beta1/tests/unit/gapic/__init__.py | 16 - .../bigquery_datapolicies_v2beta1/__init__.py | 16 - .../data_policy_service.rst | 0 .../bigquery_datapolicies_v2/services_.rst | 0 .../docs/bigquery_datapolicies_v2/types_.rst | 0 .../data_policy_service.rst | 0 .../services_.rst | 0 .../bigquery_datapolicies_v2beta1/types_.rst | 0 .../docs/index.rst | 16 + .../bigquery_datapolicies/gapic_version.py | 2 +- .../bigquery_datapolicies_v1/gapic_version.py | 2 +- .../gapic_version.py | 2 +- .../bigquery_datapolicies_v2}/__init__.py | 35 +- .../gapic_metadata.json | 0 .../gapic_version.py | 0 .../cloud/bigquery_datapolicies_v2}/py.typed | 0 .../services/__init__.py | 0 .../services/data_policy_service/__init__.py | 6 +- .../data_policy_service/async_client.py | 460 +- .../services/data_policy_service/client.py | 625 +- .../services/data_policy_service/pagers.py | 75 +- .../data_policy_service/transports/README.rst | 0 .../transports/__init__.py | 15 +- .../data_policy_service/transports/base.py | 212 +- .../data_policy_service/transports/grpc.py | 239 +- .../transports/grpc_asyncio.py | 252 +- .../data_policy_service/transports/rest.py | 1259 ++- .../transports/rest_base.py | 424 +- .../types/__init__.py | 20 +- .../types/datapolicy.py | 50 +- .../__init__.py | 33 +- .../gapic_metadata.json | 0 .../gapic_version.py | 0 .../bigquery_datapolicies_v2beta1}/py.typed | 0 .../services/__init__.py | 0 .../services/data_policy_service/__init__.py | 6 +- .../data_policy_service/async_client.py | 462 +- .../services/data_policy_service/client.py | 608 +- .../services/data_policy_service/pagers.py | 75 +- .../data_policy_service/transports/README.rst | 0 .../transports/__init__.py | 20 +- .../data_policy_service/transports/base.py | 212 +- .../data_policy_service/transports/grpc.py | 239 +- .../transports/grpc_asyncio.py | 252 +- .../data_policy_service/transports/rest.py | 1259 ++- .../transports/rest_base.py | 424 +- .../types/__init__.py | 20 +- .../types/datapolicy.py | 48 +- ..._data_policy_service_add_grantees_async.py | 0 ...d_data_policy_service_add_grantees_sync.py | 0 ...policy_service_create_data_policy_async.py | 0 ..._policy_service_create_data_policy_sync.py | 0 ...policy_service_delete_data_policy_async.py | 0 ..._policy_service_delete_data_policy_sync.py | 0 ...ta_policy_service_get_data_policy_async.py | 0 ...ata_policy_service_get_data_policy_sync.py | 0 ...ata_policy_service_get_iam_policy_async.py | 0 ...data_policy_service_get_iam_policy_sync.py | 0 ...policy_service_list_data_policies_async.py | 0 ..._policy_service_list_data_policies_sync.py | 0 ...ta_policy_service_remove_grantees_async.py | 0 ...ata_policy_service_remove_grantees_sync.py | 0 ...ata_policy_service_set_iam_policy_async.py | 0 ...data_policy_service_set_iam_policy_sync.py | 0 ...licy_service_test_iam_permissions_async.py | 0 ...olicy_service_test_iam_permissions_sync.py | 0 ...policy_service_update_data_policy_async.py | 0 ..._policy_service_update_data_policy_sync.py | 0 ..._data_policy_service_add_grantees_async.py | 0 ...d_data_policy_service_add_grantees_sync.py | 0 ...policy_service_create_data_policy_async.py | 0 ..._policy_service_create_data_policy_sync.py | 0 ...policy_service_delete_data_policy_async.py | 0 ..._policy_service_delete_data_policy_sync.py | 0 ...ta_policy_service_get_data_policy_async.py | 0 ...ata_policy_service_get_data_policy_sync.py | 0 ...ata_policy_service_get_iam_policy_async.py | 0 ...data_policy_service_get_iam_policy_sync.py | 0 ...policy_service_list_data_policies_async.py | 0 ..._policy_service_list_data_policies_sync.py | 0 ...ta_policy_service_remove_grantees_async.py | 0 ...ata_policy_service_remove_grantees_sync.py | 0 ...ata_policy_service_set_iam_policy_async.py | 0 ...data_policy_service_set_iam_policy_sync.py | 0 ...licy_service_test_iam_permissions_async.py | 0 ...olicy_service_test_iam_permissions_sync.py | 0 ...policy_service_update_data_policy_async.py | 0 ..._policy_service_update_data_policy_sync.py | 0 ...google.cloud.bigquery.datapolicies.v1.json | 2 +- ...e.cloud.bigquery.datapolicies.v1beta1.json | 2 +- ...google.cloud.bigquery.datapolicies.v2.json | 0 ...e.cloud.bigquery.datapolicies.v2beta1.json | 0 ...fixup_bigquery_datapolicies_v2_keywords.py | 0 ..._bigquery_datapolicies_v2beta1_keywords.py | 0 .../bigquery_datapolicies_v2}/__init__.py | 0 .../test_data_policy_service.py | 4916 +++++++---- .../__init__.py | 0 .../test_data_policy_service.py | 4890 +++++++---- 282 files changed, 10694 insertions(+), 43139 deletions(-) delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py delete mode 100644 owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2/data_policy_service.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2/services_.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2/types_.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2beta1/services_.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/docs/bigquery_datapolicies_v2beta1/types_.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/__init__.py (55%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/gapic_version.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/py.typed (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/services/__init__.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/services/data_policy_service/__init__.py (91%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py (83%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py (82%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py (79%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/services/data_policy_service/transports/README.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2}/services/data_policy_service/transports/__init__.py (67%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py (74%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py (78%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py (82%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py (71%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py (54%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/types/__init__.py (76%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py (95%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/__init__.py (55%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/gapic_version.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/py.typed (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/services/__init__.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/services/data_policy_service/__init__.py (91%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py (83%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py (82%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py (79%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/services/data_policy_service/transports/README.rst (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1 => packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1}/services/data_policy_service/transports/__init__.py (66%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py (74%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py (78%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py (82%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py (71%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py (54%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py (76%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py (94%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/scripts/fixup_bigquery_datapolicies_v2_keywords.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services => packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2}/__init__.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2 => packages/google-cloud-bigquery-datapolicies}/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py (68%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services => packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1}/__init__.py (100%) rename {owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1 => packages/google-cloud-bigquery-datapolicies}/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py (68%) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc deleted file mode 100644 index 0c3effcc3668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.coveragerc +++ /dev/null @@ -1,13 +0,0 @@ -[run] -branch = True - -[report] -show_missing = True -omit = - google/cloud/bigquery_datapolicies/__init__.py - google/cloud/bigquery_datapolicies/gapic_version.py -exclude_lines = - # Re-enable the standard pragma - pragma: NO COVER - # Ignore debug-only repr - def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 deleted file mode 100644 index 90316de21489..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/.flake8 +++ /dev/null @@ -1,34 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -[flake8] -# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): -# Resolve flake8 lint issues -ignore = E203, E231, E266, E501, W503 -exclude = - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): - # Ensure that generated code passes flake8 lint - **/gapic/** - **/services/** - **/types/** - # Exclude Protobuf gencode - *_pb2.py - - # Standard linting exemptions. - **/.nox/** - __pycache__, - .git, - *.pyc, - conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE deleted file mode 100644 index d64569567334..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/LICENSE +++ /dev/null @@ -1,202 +0,0 @@ - - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in deleted file mode 100644 index dae249ec8976..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/MANIFEST.in +++ /dev/null @@ -1,20 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -include README.rst LICENSE -recursive-include google *.py *.pyi *.json *.proto py.typed -recursive-include tests * -global-exclude *.py[co] -global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst deleted file mode 100644 index 074e1245b6d1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/README.rst +++ /dev/null @@ -1,143 +0,0 @@ -Python Client for Google Cloud Bigquery Datapolicies API -================================================= - -Quick Start ------------ - -In order to use this library, you first need to go through the following steps: - -1. `Select or create a Cloud Platform project.`_ -2. `Enable billing for your project.`_ -3. Enable the Google Cloud Bigquery Datapolicies API. -4. `Setup Authentication.`_ - -.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project -.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project -.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html - -Installation -~~~~~~~~~~~~ - -Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to -create isolated Python environments. The basic problem it addresses is one of -dependencies and versions, and indirectly permissions. - -With `virtualenv`_, it's possible to install this library without needing system -install permissions, and without clashing with the installed system -dependencies. - -.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ - - -Mac/Linux -^^^^^^^^^ - -.. code-block:: console - - python3 -m venv - source /bin/activate - /bin/pip install /path/to/library - - -Windows -^^^^^^^ - -.. code-block:: console - - python3 -m venv - \Scripts\activate - \Scripts\pip.exe install \path\to\library - - -Logging -------- - -This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. -Note the following: - -#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. -#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. -#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. - - -Simple, environment-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google -logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged -messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging -event. - -A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. - -- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. -- Invalid logging scopes: :code:`foo`, :code:`123`, etc. - -**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. - - -Examples -^^^^^^^^ - -- Enabling the default handler for all Google-based loggers - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google - -- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 - - -Advanced, code-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -You can also configure a valid logging scope using Python's standard `logging` mechanism. - - -Examples -^^^^^^^^ - -- Configuring a handler for all Google-based loggers - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - -- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google.cloud.library_v1") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - - -Logging details -~~~~~~~~~~~~~~~ - -#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root - logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set - :code:`logging.getLogger("google").propagate = True` in your code. -#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for - one library, but decide you need to also set up environment-based logging configuration for another library. - - #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual - if the code -based configuration gets applied first. - -#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get - executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. - (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css deleted file mode 100644 index b0a295464b23..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_static/custom.css +++ /dev/null @@ -1,20 +0,0 @@ -div#python2-eol { - border-color: red; - border-width: medium; -} - -/* Ensure minimum width for 'Parameters' / 'Returns' column */ -dl.field-list > dt { - min-width: 100px -} - -/* Insert space between methods for readability */ -dl.method { - padding-top: 10px; - padding-bottom: 10px -} - -/* Insert empty space between classes */ -dl.class { - padding-bottom: 50px -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html deleted file mode 100644 index 95e9c77fcfe1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/_templates/layout.html +++ /dev/null @@ -1,50 +0,0 @@ - -{% extends "!layout.html" %} -{%- block content %} -{%- if theme_fixed_sidebar|lower == 'true' %} -
- {{ sidebar() }} - {%- block document %} -
- {%- if render_sidebar %} -
- {%- endif %} - - {%- block relbar_top %} - {%- if theme_show_relbar_top|tobool %} - - {%- endif %} - {% endblock %} - -
-
- As of January 1, 2020 this library no longer supports Python 2 on the latest released version. - Library versions released prior to that date will continue to be available. For more information please - visit Python 2 support on Google Cloud. -
- {% block body %} {% endblock %} -
- - {%- block relbar_bottom %} - {%- if theme_show_relbar_bottom|tobool %} - - {%- endif %} - {% endblock %} - - {%- if render_sidebar %} -
- {%- endif %} -
- {%- endblock %} -
-
-{%- else %} -{{ super() }} -{%- endif %} -{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst deleted file mode 100644 index 9c23456d5fe3..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/data_policy_service.rst +++ /dev/null @@ -1,10 +0,0 @@ -DataPolicyService ------------------------------------ - -.. automodule:: google.cloud.bigquery_datapolicies_v1.services.data_policy_service - :members: - :inherited-members: - -.. automodule:: google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers - :members: - :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst deleted file mode 100644 index 7c9f6284928f..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/services_.rst +++ /dev/null @@ -1,6 +0,0 @@ -Services for Google Cloud Bigquery Datapolicies v1 API -====================================================== -.. toctree:: - :maxdepth: 2 - - data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst deleted file mode 100644 index d9b14f8bac0c..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/bigquery_datapolicies_v1/types_.rst +++ /dev/null @@ -1,6 +0,0 @@ -Types for Google Cloud Bigquery Datapolicies v1 API -=================================================== - -.. automodule:: google.cloud.bigquery_datapolicies_v1.types - :members: - :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py deleted file mode 100644 index babd226a574e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/conf.py +++ /dev/null @@ -1,385 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# -# google-cloud-bigquery-datapolicies documentation build configuration file -# -# This file is execfile()d with the current directory set to its -# containing dir. -# -# Note that not all possible configuration values are present in this -# autogenerated file. -# -# All configuration values have a default; values that are commented out -# serve to show the default. - -import sys -import os -import shlex - -# If extensions (or modules to document with autodoc) are in another directory, -# add these directories to sys.path here. If the directory is relative to the -# documentation root, use os.path.abspath to make it absolute, like shown here. -sys.path.insert(0, os.path.abspath("..")) - -# For plugins that can not read conf.py. -# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 -sys.path.insert(0, os.path.abspath(".")) - -__version__ = "" - -# -- General configuration ------------------------------------------------ - -# If your documentation needs a minimal Sphinx version, state it here. -needs_sphinx = "4.5.0" - -# Add any Sphinx extension module names here, as strings. They can be -# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom -# ones. -extensions = [ - "sphinx.ext.autodoc", - "sphinx.ext.autosummary", - "sphinx.ext.intersphinx", - "sphinx.ext.coverage", - "sphinx.ext.doctest", - "sphinx.ext.napoleon", - "sphinx.ext.todo", - "sphinx.ext.viewcode", - "recommonmark", -] - -# autodoc/autosummary flags -autoclass_content = "both" -autodoc_default_options = {"members": True} -autosummary_generate = True - - -# Add any paths that contain templates here, relative to this directory. -templates_path = ["_templates"] - -# The suffix(es) of source filenames. -# You can specify multiple suffix as a list of string: -# source_suffix = ['.rst', '.md'] -source_suffix = [".rst", ".md"] - -# The encoding of source files. -# source_encoding = 'utf-8-sig' - -# The root toctree document. -root_doc = "index" - -# General information about the project. -project = u"google-cloud-bigquery-datapolicies" -copyright = u"2025, Google, LLC" -author = u"Google APIs" - -# The version info for the project you're documenting, acts as replacement for -# |version| and |release|, also used in various other places throughout the -# built documents. -# -# The full version, including alpha/beta/rc tags. -release = __version__ -# The short X.Y version. -version = ".".join(release.split(".")[0:2]) - -# The language for content autogenerated by Sphinx. Refer to documentation -# for a list of supported languages. -# -# This is also used if you do content translation via gettext catalogs. -# Usually you set "language" from the command line for these cases. -language = None - -# There are two options for replacing |today|: either, you set today to some -# non-false value, then it is used: -# today = '' -# Else, today_fmt is used as the format for a strftime call. -# today_fmt = '%B %d, %Y' - -# List of patterns, relative to source directory, that match files and -# directories to ignore when looking for source files. -exclude_patterns = [ - "_build", - "**/.nox/**/*", - "samples/AUTHORING_GUIDE.md", - "samples/CONTRIBUTING.md", - "samples/snippets/README.rst", -] - -# The reST default role (used for this markup: `text`) to use for all -# documents. -# default_role = None - -# If true, '()' will be appended to :func: etc. cross-reference text. -# add_function_parentheses = True - -# If true, the current module name will be prepended to all description -# unit titles (such as .. function::). -# add_module_names = True - -# If true, sectionauthor and moduleauthor directives will be shown in the -# output. They are ignored by default. -# show_authors = False - -# The name of the Pygments (syntax highlighting) style to use. -pygments_style = "sphinx" - -# A list of ignored prefixes for module index sorting. -# modindex_common_prefix = [] - -# If true, keep warnings as "system message" paragraphs in the built documents. -# keep_warnings = False - -# If true, `todo` and `todoList` produce output, else they produce nothing. -todo_include_todos = True - - -# -- Options for HTML output ---------------------------------------------- - -# The theme to use for HTML and HTML Help pages. See the documentation for -# a list of builtin themes. -html_theme = "alabaster" - -# Theme options are theme-specific and customize the look and feel of a theme -# further. For a list of options available for each theme, see the -# documentation. -html_theme_options = { - "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", - "github_user": "googleapis", - "github_repo": "google-cloud-python", - "github_banner": True, - "font_family": "'Roboto', Georgia, sans", - "head_font_family": "'Roboto', Georgia, serif", - "code_font_family": "'Roboto Mono', 'Consolas', monospace", -} - -# Add any paths that contain custom themes here, relative to this directory. -# html_theme_path = [] - -# The name for this set of Sphinx documents. If None, it defaults to -# " v documentation". -# html_title = None - -# A shorter title for the navigation bar. Default is the same as html_title. -# html_short_title = None - -# The name of an image file (relative to this directory) to place at the top -# of the sidebar. -# html_logo = None - -# The name of an image file (within the static path) to use as favicon of the -# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 -# pixels large. -# html_favicon = None - -# Add any paths that contain custom static files (such as style sheets) here, -# relative to this directory. They are copied after the builtin static files, -# so a file named "default.css" will overwrite the builtin "default.css". -html_static_path = ["_static"] - -# Add any extra paths that contain custom files (such as robots.txt or -# .htaccess) here, relative to this directory. These files are copied -# directly to the root of the documentation. -# html_extra_path = [] - -# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, -# using the given strftime format. -# html_last_updated_fmt = '%b %d, %Y' - -# If true, SmartyPants will be used to convert quotes and dashes to -# typographically correct entities. -# html_use_smartypants = True - -# Custom sidebar templates, maps document names to template names. -# html_sidebars = {} - -# Additional templates that should be rendered to pages, maps page names to -# template names. -# html_additional_pages = {} - -# If false, no module index is generated. -# html_domain_indices = True - -# If false, no index is generated. -# html_use_index = True - -# If true, the index is split into individual pages for each letter. -# html_split_index = False - -# If true, links to the reST sources are added to the pages. -# html_show_sourcelink = True - -# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. -# html_show_sphinx = True - -# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. -# html_show_copyright = True - -# If true, an OpenSearch description file will be output, and all pages will -# contain a tag referring to it. The value of this option must be the -# base URL from which the finished HTML is served. -# html_use_opensearch = '' - -# This is the file name suffix for HTML files (e.g. ".xhtml"). -# html_file_suffix = None - -# Language to be used for generating the HTML full-text search index. -# Sphinx supports the following languages: -# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' -# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' -# html_search_language = 'en' - -# A dictionary with options for the search language support, empty by default. -# Now only 'ja' uses this config value -# html_search_options = {'type': 'default'} - -# The name of a javascript file (relative to the configuration directory) that -# implements a search results scorer. If empty, the default will be used. -# html_search_scorer = 'scorer.js' - -# Output file base name for HTML help builder. -htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" - -# -- Options for warnings ------------------------------------------------------ - - -suppress_warnings = [ - # Temporarily suppress this to avoid "more than one target found for - # cross-reference" warning, which are intractable for us to avoid while in - # a mono-repo. - # See https://github.com/sphinx-doc/sphinx/blob - # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 - "ref.python" -] - -# -- Options for LaTeX output --------------------------------------------- - -latex_elements = { - # The paper size ('letterpaper' or 'a4paper'). - # 'papersize': 'letterpaper', - # The font size ('10pt', '11pt' or '12pt'). - # 'pointsize': '10pt', - # Additional stuff for the LaTeX preamble. - # 'preamble': '', - # Latex figure (float) alignment - # 'figure_align': 'htbp', -} - -# Grouping the document tree into LaTeX files. List of tuples -# (source start file, target name, title, -# author, documentclass [howto, manual, or own class]). -latex_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies.tex", - u"google-cloud-bigquery-datapolicies Documentation", - author, - "manual", - ) -] - -# The name of an image file (relative to this directory) to place at the top of -# the title page. -# latex_logo = None - -# For "manual" documents, if this is true, then toplevel headings are parts, -# not chapters. -# latex_use_parts = False - -# If true, show page references after internal links. -# latex_show_pagerefs = False - -# If true, show URL addresses after external links. -# latex_show_urls = False - -# Documents to append as an appendix to all manuals. -# latex_appendices = [] - -# If false, no module index is generated. -# latex_domain_indices = True - - -# -- Options for manual page output --------------------------------------- - -# One entry per manual page. List of tuples -# (source start file, name, description, authors, manual section). -man_pages = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - [author], - 1, - ) -] - -# If true, show URL addresses after external links. -# man_show_urls = False - - -# -- Options for Texinfo output ------------------------------------------- - -# Grouping the document tree into Texinfo files. List of tuples -# (source start file, target name, title, author, -# dir menu entry, description, category) -texinfo_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - author, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Library", - "APIs", - ) -] - -# Documents to append as an appendix to all manuals. -# texinfo_appendices = [] - -# If false, no module index is generated. -# texinfo_domain_indices = True - -# How to display URL addresses: 'footnote', 'no', or 'inline'. -# texinfo_show_urls = 'footnote' - -# If true, do not generate a @detailmenu in the "Top" node's menu. -# texinfo_no_detailmenu = False - - -# Example configuration for intersphinx: refer to the Python standard library. -intersphinx_mapping = { - "python": ("https://python.readthedocs.org/en/latest/", None), - "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), - "google.api_core": ( - "https://googleapis.dev/python/google-api-core/latest/", - None, - ), - "grpc": ("https://grpc.github.io/grpc/python/", None), - "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), - "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), -} - - -# Napoleon settings -napoleon_google_docstring = True -napoleon_numpy_docstring = True -napoleon_include_private_with_doc = False -napoleon_include_special_with_doc = True -napoleon_use_admonition_for_examples = False -napoleon_use_admonition_for_notes = False -napoleon_use_admonition_for_references = False -napoleon_use_ivar = False -napoleon_use_param = True -napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst deleted file mode 100644 index 9f7b5a92c789..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/index.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. include:: multiprocessing.rst - - -API Reference -------------- -.. toctree:: - :maxdepth: 2 - - bigquery_datapolicies_v1/services_ - bigquery_datapolicies_v1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst deleted file mode 100644 index 536d17b2ea65..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/docs/multiprocessing.rst +++ /dev/null @@ -1,7 +0,0 @@ -.. note:: - - Because this client uses :mod:`grpc` library, it is safe to - share instances across threads. In multiprocessing scenarios, the best - practice is to create client instances *after* the invocation of - :func:`os.fork` by :class:`multiprocessing.pool.Pool` or - :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py deleted file mode 100644 index 3c37f4889a1e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/__init__.py +++ /dev/null @@ -1,45 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies import gapic_version as package_version - -__version__ = package_version.__version__ - - -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service.client import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient - -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import CreateDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DataMaskingPolicy -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DataPolicy -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import DeleteDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import GetDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import ListDataPoliciesRequest -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import ListDataPoliciesResponse -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import RenameDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1.types.datapolicy import UpdateDataPolicyRequest - -__all__ = ('DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RenameDataPolicyRequest', - 'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py deleted file mode 100644 index 4305760e5115..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/__init__.py +++ /dev/null @@ -1,46 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version - -__version__ = package_version.__version__ - - -from .services.data_policy_service import DataPolicyServiceClient -from .services.data_policy_service import DataPolicyServiceAsyncClient - -from .types.datapolicy import CreateDataPolicyRequest -from .types.datapolicy import DataMaskingPolicy -from .types.datapolicy import DataPolicy -from .types.datapolicy import DeleteDataPolicyRequest -from .types.datapolicy import GetDataPolicyRequest -from .types.datapolicy import ListDataPoliciesRequest -from .types.datapolicy import ListDataPoliciesResponse -from .types.datapolicy import RenameDataPolicyRequest -from .types.datapolicy import UpdateDataPolicyRequest - -__all__ = ( - 'DataPolicyServiceAsyncClient', -'CreateDataPolicyRequest', -'DataMaskingPolicy', -'DataPolicy', -'DataPolicyServiceClient', -'DeleteDataPolicyRequest', -'GetDataPolicyRequest', -'ListDataPoliciesRequest', -'ListDataPoliciesResponse', -'RenameDataPolicyRequest', -'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json deleted file mode 100644 index 1ce28d57fccc..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_metadata.json +++ /dev/null @@ -1,163 +0,0 @@ - { - "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", - "language": "python", - "libraryPackage": "google.cloud.bigquery_datapolicies_v1", - "protoPackage": "google.cloud.bigquery.datapolicies.v1", - "schema": "1.0", - "services": { - "DataPolicyService": { - "clients": { - "grpc": { - "libraryClient": "DataPolicyServiceClient", - "rpcs": { - "CreateDataPolicy": { - "methods": [ - "create_data_policy" - ] - }, - "DeleteDataPolicy": { - "methods": [ - "delete_data_policy" - ] - }, - "GetDataPolicy": { - "methods": [ - "get_data_policy" - ] - }, - "GetIamPolicy": { - "methods": [ - "get_iam_policy" - ] - }, - "ListDataPolicies": { - "methods": [ - "list_data_policies" - ] - }, - "RenameDataPolicy": { - "methods": [ - "rename_data_policy" - ] - }, - "SetIamPolicy": { - "methods": [ - "set_iam_policy" - ] - }, - "TestIamPermissions": { - "methods": [ - "test_iam_permissions" - ] - }, - "UpdateDataPolicy": { - "methods": [ - "update_data_policy" - ] - } - } - }, - "grpc-async": { - "libraryClient": "DataPolicyServiceAsyncClient", - "rpcs": { - "CreateDataPolicy": { - "methods": [ - "create_data_policy" - ] - }, - "DeleteDataPolicy": { - "methods": [ - "delete_data_policy" - ] - }, - "GetDataPolicy": { - "methods": [ - "get_data_policy" - ] - }, - "GetIamPolicy": { - "methods": [ - "get_iam_policy" - ] - }, - "ListDataPolicies": { - "methods": [ - "list_data_policies" - ] - }, - "RenameDataPolicy": { - "methods": [ - "rename_data_policy" - ] - }, - "SetIamPolicy": { - "methods": [ - "set_iam_policy" - ] - }, - "TestIamPermissions": { - "methods": [ - "test_iam_permissions" - ] - }, - "UpdateDataPolicy": { - "methods": [ - "update_data_policy" - ] - } - } - }, - "rest": { - "libraryClient": "DataPolicyServiceClient", - "rpcs": { - "CreateDataPolicy": { - "methods": [ - "create_data_policy" - ] - }, - "DeleteDataPolicy": { - "methods": [ - "delete_data_policy" - ] - }, - "GetDataPolicy": { - "methods": [ - "get_data_policy" - ] - }, - "GetIamPolicy": { - "methods": [ - "get_iam_policy" - ] - }, - "ListDataPolicies": { - "methods": [ - "list_data_policies" - ] - }, - "RenameDataPolicy": { - "methods": [ - "rename_data_policy" - ] - }, - "SetIamPolicy": { - "methods": [ - "set_iam_policy" - ] - }, - "TestIamPermissions": { - "methods": [ - "test_iam_permissions" - ] - }, - "UpdateDataPolicy": { - "methods": [ - "update_data_policy" - ] - } - } - } - } - } - } -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py deleted file mode 100644 index deca793e77bb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/__init__.py +++ /dev/null @@ -1,22 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from .client import DataPolicyServiceClient -from .async_client import DataPolicyServiceAsyncClient - -__all__ = ( - 'DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py deleted file mode 100644 index 4f878a380805..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/async_client.py +++ /dev/null @@ -1,1277 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import logging as std_logging -from collections import OrderedDict -import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union - -from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version - -from google.api_core.client_options import ClientOptions -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - - -try: - OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore - -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .client import DataPolicyServiceClient - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - -class DataPolicyServiceAsyncClient: - """Data Policy Service provides APIs for managing the - label-policy bindings. - """ - - _client: DataPolicyServiceClient - - # Copy defaults from the synchronous client for use here. - # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. - DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT - DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE - _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE - - data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) - parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) - common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) - parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) - common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) - parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) - common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) - parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) - common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) - parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) - common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) - parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) - - @classmethod - def from_service_account_info(cls, info: dict, *args, **kwargs): - """Creates an instance of this client using the provided credentials - info. - - Args: - info (dict): The service account private key info. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceAsyncClient: The constructed client. - """ - return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore - - @classmethod - def from_service_account_file(cls, filename: str, *args, **kwargs): - """Creates an instance of this client using the provided credentials - file. - - Args: - filename (str): The path to the service account private key json - file. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceAsyncClient: The constructed client. - """ - return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore - - from_service_account_json = from_service_account_file - - @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): - """Return the API endpoint and client cert source for mutual TLS. - - The client cert source is determined in the following order: - (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the - client cert source is None. - (2) if `client_options.client_cert_source` is provided, use the provided one; if the - default client cert source exists, use the default one; otherwise the client cert - source is None. - - The API endpoint is determined in the following order: - (1) if `client_options.api_endpoint` if provided, use the provided one. - (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the - default mTLS endpoint; if the environment variable is "never", use the default API - endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise - use the default API endpoint. - - More details can be found at https://google.aip.dev/auth/4114. - - Args: - client_options (google.api_core.client_options.ClientOptions): Custom options for the - client. Only the `api_endpoint` and `client_cert_source` properties may be used - in this method. - - Returns: - Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the - client cert source to use. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If any errors happen. - """ - return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore - - @property - def transport(self) -> DataPolicyServiceTransport: - """Returns the transport used by the client instance. - - Returns: - DataPolicyServiceTransport: The transport used by the client instance. - """ - return self._client.transport - - @property - def api_endpoint(self): - """Return the API endpoint used by the client instance. - - Returns: - str: The API endpoint used by the client instance. - """ - return self._client._api_endpoint - - @property - def universe_domain(self) -> str: - """Return the universe domain used by the client instance. - - Returns: - str: The universe domain used - by the client instance. - """ - return self._client._universe_domain - - get_transport_class = DataPolicyServiceClient.get_transport_class - - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", - client_options: Optional[ClientOptions] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: - """Instantiates the data policy service async client. - - Args: - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): - The transport to use, or a Callable that constructs and returns a new transport to use. - If a Callable is given, it will be called with the same set of initialization - arguments as used in the DataPolicyServiceTransport constructor. - If set to None, a transport is chosen automatically. - client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): - Custom options for the client. - - 1. The ``api_endpoint`` property can be used to override the - default endpoint provided by the client when ``transport`` is - not explicitly provided. Only if this property is not set and - ``transport`` was not explicitly provided, the endpoint is - determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment - variable, which have one of the following values: - "always" (always use the default mTLS endpoint), "never" (always - use the default regular endpoint) and "auto" (auto-switch to the - default mTLS endpoint if client certificate is present; this is - the default value). - - 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable - is "true", then the ``client_cert_source`` property can be used - to provide a client certificate for mTLS transport. If - not provided, the default SSL client certificate will be used if - present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not - set, no client certificate will be used. - - 3. The ``universe_domain`` property can be used to override the - default "googleapis.com" universe. Note that ``api_endpoint`` - property still takes precedence; and ``universe_domain`` is - currently not supported for mTLS. - - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - - Raises: - google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport - creation failed for any reason. - """ - self._client = DataPolicyServiceClient( - credentials=credentials, - transport=transport, - client_options=client_options, - client_info=client_info, - - ) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER - _LOGGER.debug( - "Created client `google.cloud.bigquery.datapolicies_v1.DataPolicyServiceAsyncClient`.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), - "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._client._transport, "_credentials") else { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "credentialsType": None, - } - ) - - async def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = await client.create_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest, dict]]): - The request object. Request message for the - CreateDataPolicy method. - parent (:class:`str`): - Required. Resource name of the project that the data - policy will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - data_policy (:class:`google.cloud.bigquery_datapolicies_v1.types.DataPolicy`): - Required. The data policy to create. The ``name`` field - does not need to be provided for the data policy - creation. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent, data_policy] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.CreateDataPolicyRequest): - request = datapolicy.CreateDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - if data_policy is not None: - request.data_policy = data_policy - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = await client.update_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest, dict]]): - The request object. Response message for the - UpdateDataPolicy method. - data_policy (:class:`google.cloud.bigquery_datapolicies_v1.types.DataPolicy`): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` - field. Other fields are updated to the specified values - based on the field masks. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are - allowed to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are - not allowed. - - This corresponds to the ``update_mask`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.UpdateDataPolicyRequest): - request = datapolicy.UpdateDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if data_policy is not None: - request.data_policy = data_policy - if update_mask is not None: - request.update_mask = update_mask - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def rename_data_policy(self, - request: Optional[Union[datapolicy.RenameDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - new_data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Renames the id (display name) of the specified data - policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_rename_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.RenameDataPolicyRequest( - name="name_value", - new_data_policy_id="new_data_policy_id_value", - ) - - # Make the request - response = await client.rename_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest, dict]]): - The request object. Request message for the - RenameDataPolicy method. - name (:class:`str`): - Required. Resource name of the data policy to rename. - The format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - new_data_policy_id (:class:`str`): - Required. The new data policy id. - This corresponds to the ``new_data_policy_id`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name, new_data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.RenameDataPolicyRequest): - request = datapolicy.RenameDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - if new_data_policy_id is not None: - request.new_data_policy_id = new_data_policy_id - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.rename_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: - r"""Deletes the data policy specified by its resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - await client.delete_data_policy(request=request) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest, dict]]): - The request object. Request message for the - DeleteDataPolicy method. - name (:class:`str`): - Required. Resource name of the data policy to delete. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.DeleteDataPolicyRequest): - request = datapolicy.DeleteDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - async def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Gets the data policy specified by its resource name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = await client.get_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest, dict]]): - The request object. Request message for the GetDataPolicy - method. - name (:class:`str`): - Required. Resource name of the requested data policy. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.GetDataPolicyRequest): - request = datapolicy.GetDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesAsyncPager: - r"""List all of the data policies in the specified parent - project. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - async def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - async for response in page_result: - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest, dict]]): - The request object. Request message for the - ListDataPolicies method. - parent (:class:`str`): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: - Response message for the - ListDataPolicies method. - Iterating over this object will yield - results and resolve additional pages - automatically. - - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.ListDataPoliciesRequest): - request = datapolicy.ListDataPoliciesRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # This method is paged; wrap the response in a pager, which provides - # an `__aiter__` convenience method. - response = pagers.ListDataPoliciesAsyncPager( - method=rpc, - request=request, - response=response, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Gets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.get_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): - The request object. Request message for ``GetIamPolicy`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.GetIamPolicyRequest(**request) - elif not request: - request = iam_policy_pb2.GetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Sets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.set_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): - The request object. Request message for ``SetIamPolicy`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.SetIamPolicyRequest(**request) - elif not request: - request = iam_policy_pb2.SetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: - r"""Returns the caller's permission on the specified data - policy resource. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = await client.test_iam_permissions(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): - The request object. Request message for ``TestIamPermissions`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: - Response message for TestIamPermissions method. - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.TestIamPermissionsRequest(**request) - elif not request: - request = iam_policy_pb2.TestIamPermissionsRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def __aenter__(self) -> "DataPolicyServiceAsyncClient": - return self - - async def __aexit__(self, exc_type, exc, tb): - await self.transport.close() - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - - -__all__ = ( - "DataPolicyServiceAsyncClient", -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py deleted file mode 100644 index 38358b284aa3..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/client.py +++ /dev/null @@ -1,1635 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from collections import OrderedDict -from http import HTTPStatus -import json -import logging as std_logging -import os -import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast -import warnings - -from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version - -from google.api_core import client_options as client_options_lib -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport import mtls # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.auth.exceptions import MutualTLSChannelError # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -try: - OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.Retry, object, None] # type: ignore - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc import DataPolicyServiceGrpcTransport -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .transports.rest import DataPolicyServiceRestTransport - - -class DataPolicyServiceClientMeta(type): - """Metaclass for the DataPolicyService client. - - This provides class-level methods for building and retrieving - support objects (e.g. transport) without polluting the client instance - objects. - """ - _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] - _transport_registry["grpc"] = DataPolicyServiceGrpcTransport - _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport - _transport_registry["rest"] = DataPolicyServiceRestTransport - - def get_transport_class(cls, - label: Optional[str] = None, - ) -> Type[DataPolicyServiceTransport]: - """Returns an appropriate transport class. - - Args: - label: The name of the desired transport. If none is - provided, then the first transport in the registry is used. - - Returns: - The transport class to use. - """ - # If a specific transport is requested, return that one. - if label: - return cls._transport_registry[label] - - # No transport is requested; return the default (that is, the first one - # in the dictionary). - return next(iter(cls._transport_registry.values())) - - -class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): - """Data Policy Service provides APIs for managing the - label-policy bindings. - """ - - @staticmethod - def _get_default_mtls_endpoint(api_endpoint): - """Converts api endpoint to mTLS endpoint. - - Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to - "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. - Args: - api_endpoint (Optional[str]): the api endpoint to convert. - Returns: - str: converted mTLS api endpoint. - """ - if not api_endpoint: - return api_endpoint - - mtls_endpoint_re = re.compile( - r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" - ) - - m = mtls_endpoint_re.match(api_endpoint) - name, mtls, sandbox, googledomain = m.groups() - if mtls or not googledomain: - return api_endpoint - - if sandbox: - return api_endpoint.replace( - "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" - ) - - return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") - - # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. - DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" - DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore - DEFAULT_ENDPOINT - ) - - _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" - _DEFAULT_UNIVERSE = "googleapis.com" - - @classmethod - def from_service_account_info(cls, info: dict, *args, **kwargs): - """Creates an instance of this client using the provided credentials - info. - - Args: - info (dict): The service account private key info. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceClient: The constructed client. - """ - credentials = service_account.Credentials.from_service_account_info(info) - kwargs["credentials"] = credentials - return cls(*args, **kwargs) - - @classmethod - def from_service_account_file(cls, filename: str, *args, **kwargs): - """Creates an instance of this client using the provided credentials - file. - - Args: - filename (str): The path to the service account private key json - file. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceClient: The constructed client. - """ - credentials = service_account.Credentials.from_service_account_file( - filename) - kwargs["credentials"] = credentials - return cls(*args, **kwargs) - - from_service_account_json = from_service_account_file - - @property - def transport(self) -> DataPolicyServiceTransport: - """Returns the transport used by the client instance. - - Returns: - DataPolicyServiceTransport: The transport used by the client - instance. - """ - return self._transport - - @staticmethod - def data_policy_path(project: str,location: str,data_policy: str,) -> str: - """Returns a fully-qualified data_policy string.""" - return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) - - @staticmethod - def parse_data_policy_path(path: str) -> Dict[str,str]: - """Parses a data_policy path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_billing_account_path(billing_account: str, ) -> str: - """Returns a fully-qualified billing_account string.""" - return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) - - @staticmethod - def parse_common_billing_account_path(path: str) -> Dict[str,str]: - """Parse a billing_account path into its component segments.""" - m = re.match(r"^billingAccounts/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_folder_path(folder: str, ) -> str: - """Returns a fully-qualified folder string.""" - return "folders/{folder}".format(folder=folder, ) - - @staticmethod - def parse_common_folder_path(path: str) -> Dict[str,str]: - """Parse a folder path into its component segments.""" - m = re.match(r"^folders/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_organization_path(organization: str, ) -> str: - """Returns a fully-qualified organization string.""" - return "organizations/{organization}".format(organization=organization, ) - - @staticmethod - def parse_common_organization_path(path: str) -> Dict[str,str]: - """Parse a organization path into its component segments.""" - m = re.match(r"^organizations/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_project_path(project: str, ) -> str: - """Returns a fully-qualified project string.""" - return "projects/{project}".format(project=project, ) - - @staticmethod - def parse_common_project_path(path: str) -> Dict[str,str]: - """Parse a project path into its component segments.""" - m = re.match(r"^projects/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_location_path(project: str, location: str, ) -> str: - """Returns a fully-qualified location string.""" - return "projects/{project}/locations/{location}".format(project=project, location=location, ) - - @staticmethod - def parse_common_location_path(path: str) -> Dict[str,str]: - """Parse a location path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) - return m.groupdict() if m else {} - - @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): - """Deprecated. Return the API endpoint and client cert source for mutual TLS. - - The client cert source is determined in the following order: - (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the - client cert source is None. - (2) if `client_options.client_cert_source` is provided, use the provided one; if the - default client cert source exists, use the default one; otherwise the client cert - source is None. - - The API endpoint is determined in the following order: - (1) if `client_options.api_endpoint` if provided, use the provided one. - (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the - default mTLS endpoint; if the environment variable is "never", use the default API - endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise - use the default API endpoint. - - More details can be found at https://google.aip.dev/auth/4114. - - Args: - client_options (google.api_core.client_options.ClientOptions): Custom options for the - client. Only the `api_endpoint` and `client_cert_source` properties may be used - in this method. - - Returns: - Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the - client cert source to use. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If any errors happen. - """ - - warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", - DeprecationWarning) - if client_options is None: - client_options = client_options_lib.ClientOptions() - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") - use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") - if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") - if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") - - # Figure out the client cert source to use. - client_cert_source = None - if use_client_cert == "true": - if client_options.client_cert_source: - client_cert_source = client_options.client_cert_source - elif mtls.has_default_client_cert_source(): - client_cert_source = mtls.default_client_cert_source() - - # Figure out which api endpoint to use. - if client_options.api_endpoint is not None: - api_endpoint = client_options.api_endpoint - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): - api_endpoint = cls.DEFAULT_MTLS_ENDPOINT - else: - api_endpoint = cls.DEFAULT_ENDPOINT - - return api_endpoint, client_cert_source - - @staticmethod - def _read_environment_variables(): - """Returns the environment variables used by the client. - - Returns: - Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, - GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. - - Raises: - ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not - any of ["true", "false"]. - google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT - is not any of ["auto", "never", "always"]. - """ - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() - use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() - universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") - if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") - if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") - return use_client_cert == "true", use_mtls_endpoint, universe_domain_env - - @staticmethod - def _get_client_cert_source(provided_cert_source, use_cert_flag): - """Return the client cert source to be used by the client. - - Args: - provided_cert_source (bytes): The client certificate source provided. - use_cert_flag (bool): A flag indicating whether to use the client certificate. - - Returns: - bytes or None: The client cert source to be used by the client. - """ - client_cert_source = None - if use_cert_flag: - if provided_cert_source: - client_cert_source = provided_cert_source - elif mtls.has_default_client_cert_source(): - client_cert_source = mtls.default_client_cert_source() - return client_cert_source - - @staticmethod - def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): - """Return the API endpoint used by the client. - - Args: - api_override (str): The API endpoint override. If specified, this is always - the return value of this function and the other arguments are not used. - client_cert_source (bytes): The client certificate source used by the client. - universe_domain (str): The universe domain used by the client. - use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. - Possible values are "always", "auto", or "never". - - Returns: - str: The API endpoint to be used by the client. - """ - if api_override is not None: - api_endpoint = api_override - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): - _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - if universe_domain != _default_universe: - raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") - api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - else: - api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) - return api_endpoint - - @staticmethod - def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: - """Return the universe domain used by the client. - - Args: - client_universe_domain (Optional[str]): The universe domain configured via the client options. - universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. - - Returns: - str: The universe domain to be used by the client. - - Raises: - ValueError: If the universe domain is an empty string. - """ - universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE - if client_universe_domain is not None: - universe_domain = client_universe_domain - elif universe_domain_env is not None: - universe_domain = universe_domain_env - if len(universe_domain.strip()) == 0: - raise ValueError("Universe Domain cannot be an empty string.") - return universe_domain - - def _validate_universe_domain(self): - """Validates client's and credentials' universe domains are consistent. - - Returns: - bool: True iff the configured universe domain is valid. - - Raises: - ValueError: If the configured universe domain is not valid. - """ - - # NOTE (b/349488459): universe validation is disabled until further notice. - return True - - def _add_cred_info_for_auth_errors( - self, - error: core_exceptions.GoogleAPICallError - ) -> None: - """Adds credential info string to error details for 401/403/404 errors. - - Args: - error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. - """ - if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: - return - - cred = self._transport._credentials - - # get_cred_info is only available in google-auth>=2.35.0 - if not hasattr(cred, "get_cred_info"): - return - - # ignore the type check since pypy test fails when get_cred_info - # is not available - cred_info = cred.get_cred_info() # type: ignore - if cred_info and hasattr(error._details, "append"): - error._details.append(json.dumps(cred_info)) - - @property - def api_endpoint(self): - """Return the API endpoint used by the client instance. - - Returns: - str: The API endpoint used by the client instance. - """ - return self._api_endpoint - - @property - def universe_domain(self) -> str: - """Return the universe domain used by the client instance. - - Returns: - str: The universe domain used by the client instance. - """ - return self._universe_domain - - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, - client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: - """Instantiates the data policy service client. - - Args: - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): - The transport to use, or a Callable that constructs and returns a new transport. - If a Callable is given, it will be called with the same set of initialization - arguments as used in the DataPolicyServiceTransport constructor. - If set to None, a transport is chosen automatically. - client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): - Custom options for the client. - - 1. The ``api_endpoint`` property can be used to override the - default endpoint provided by the client when ``transport`` is - not explicitly provided. Only if this property is not set and - ``transport`` was not explicitly provided, the endpoint is - determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment - variable, which have one of the following values: - "always" (always use the default mTLS endpoint), "never" (always - use the default regular endpoint) and "auto" (auto-switch to the - default mTLS endpoint if client certificate is present; this is - the default value). - - 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable - is "true", then the ``client_cert_source`` property can be used - to provide a client certificate for mTLS transport. If - not provided, the default SSL client certificate will be used if - present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not - set, no client certificate will be used. - - 3. The ``universe_domain`` property can be used to override the - default "googleapis.com" universe. Note that the ``api_endpoint`` - property still takes precedence; and ``universe_domain`` is - currently not supported for mTLS. - - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport - creation failed for any reason. - """ - self._client_options = client_options - if isinstance(self._client_options, dict): - self._client_options = client_options_lib.from_dict(self._client_options) - if self._client_options is None: - self._client_options = client_options_lib.ClientOptions() - self._client_options = cast(client_options_lib.ClientOptions, self._client_options) - - universe_domain_opt = getattr(self._client_options, 'universe_domain', None) - - self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() - self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) - self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) - self._api_endpoint = None # updated below, depending on `transport` - - # Initialize the universe domain validation. - self._is_universe_domain_valid = False - - if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER - # Setup logging. - client_logging.initialize_logging() - - api_key_value = getattr(self._client_options, "api_key", None) - if api_key_value and credentials: - raise ValueError("client_options.api_key and credentials are mutually exclusive") - - # Save or instantiate the transport. - # Ordinarily, we provide the transport, but allowing a custom transport - # instance provides an extensibility point for unusual situations. - transport_provided = isinstance(transport, DataPolicyServiceTransport) - if transport_provided: - # transport is a DataPolicyServiceTransport instance. - if credentials or self._client_options.credentials_file or api_key_value: - raise ValueError("When providing a transport instance, " - "provide its credentials directly.") - if self._client_options.scopes: - raise ValueError( - "When providing a transport instance, provide its scopes " - "directly." - ) - self._transport = cast(DataPolicyServiceTransport, transport) - self._api_endpoint = self._transport.host - - self._api_endpoint = (self._api_endpoint or - DataPolicyServiceClient._get_api_endpoint( - self._client_options.api_endpoint, - self._client_cert_source, - self._universe_domain, - self._use_mtls_endpoint)) - - if not transport_provided: - import google.auth._default # type: ignore - - if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): - credentials = google.auth._default.get_api_key_credentials(api_key_value) - - transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( - DataPolicyServiceClient.get_transport_class(transport) - if isinstance(transport, str) or transport is None - else cast(Callable[..., DataPolicyServiceTransport], transport) - ) - # initialize with the provided callable or the passed in class - self._transport = transport_init( - credentials=credentials, - credentials_file=self._client_options.credentials_file, - host=self._api_endpoint, - scopes=self._client_options.scopes, - client_cert_source_for_mtls=self._client_cert_source, - quota_project_id=self._client_options.quota_project_id, - client_info=client_info, - always_use_jwt_access=True, - api_audience=self._client_options.api_audience, - ) - - if "async" not in str(self._transport): - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER - _LOGGER.debug( - "Created client `google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient`.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), - "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._transport, "_credentials") else { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "credentialsType": None, - } - ) - - def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = client.create_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest, dict]): - The request object. Request message for the - CreateDataPolicy method. - parent (str): - Required. Resource name of the project that the data - policy will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): - Required. The data policy to create. The ``name`` field - does not need to be provided for the data policy - creation. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent, data_policy] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.CreateDataPolicyRequest): - request = datapolicy.CreateDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - if data_policy is not None: - request.data_policy = data_policy - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.create_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = client.update_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest, dict]): - The request object. Response message for the - UpdateDataPolicy method. - data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` - field. Other fields are updated to the specified values - based on the field masks. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - update_mask (google.protobuf.field_mask_pb2.FieldMask): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are - allowed to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are - not allowed. - - This corresponds to the ``update_mask`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.UpdateDataPolicyRequest): - request = datapolicy.UpdateDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if data_policy is not None: - request.data_policy = data_policy - if update_mask is not None: - request.update_mask = update_mask - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.update_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def rename_data_policy(self, - request: Optional[Union[datapolicy.RenameDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - new_data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Renames the id (display name) of the specified data - policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_rename_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.RenameDataPolicyRequest( - name="name_value", - new_data_policy_id="new_data_policy_id_value", - ) - - # Make the request - response = client.rename_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest, dict]): - The request object. Request message for the - RenameDataPolicy method. - name (str): - Required. Resource name of the data policy to rename. - The format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - new_data_policy_id (str): - Required. The new data policy id. - This corresponds to the ``new_data_policy_id`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name, new_data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.RenameDataPolicyRequest): - request = datapolicy.RenameDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - if new_data_policy_id is not None: - request.new_data_policy_id = new_data_policy_id - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.rename_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: - r"""Deletes the data policy specified by its resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - client.delete_data_policy(request=request) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest, dict]): - The request object. Request message for the - DeleteDataPolicy method. - name (str): - Required. Resource name of the data policy to delete. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.DeleteDataPolicyRequest): - request = datapolicy.DeleteDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Gets the data policy specified by its resource name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = client.get_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest, dict]): - The request object. Request message for the GetDataPolicy - method. - name (str): - Required. Resource name of the requested data policy. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.GetDataPolicyRequest): - request = datapolicy.GetDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.get_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesPager: - r"""List all of the data policies in the specified parent - project. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - - def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - for response in page_result: - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest, dict]): - The request object. Request message for the - ListDataPolicies method. - parent (str): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesPager: - Response message for the - ListDataPolicies method. - Iterating over this object will yield - results and resolve additional pages - automatically. - - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.ListDataPoliciesRequest): - request = datapolicy.ListDataPoliciesRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.list_data_policies] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # This method is paged; wrap the response in a pager, which provides - # an `__iter__` convenience method. - response = pagers.ListDataPoliciesPager( - method=rpc, - request=request, - response=response, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Gets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.get_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): - The request object. Request message for ``GetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.GetIamPolicyRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.GetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Sets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.set_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): - The request object. Request message for ``SetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.SetIamPolicyRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.SetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: - r"""Returns the caller's permission on the specified data - policy resource. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = client.test_iam_permissions(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): - The request object. Request message for ``TestIamPermissions`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: - Response message for TestIamPermissions method. - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.TestIamPermissionsRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.TestIamPermissionsRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def __enter__(self) -> "DataPolicyServiceClient": - return self - - def __exit__(self, type, value, traceback): - """Releases underlying transport's resources. - - .. warning:: - ONLY use as a context manager if the transport is NOT shared - with other clients! Exiting the with block will CLOSE the transport - and may cause errors in other clients! - """ - self.transport.close() - - - - - - - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - -__all__ = ( - "DataPolicyServiceClient", -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py deleted file mode 100644 index a1dd388dd5d7..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/pagers.py +++ /dev/null @@ -1,166 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.api_core import retry_async as retries_async -from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union -try: - OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] - OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.Retry, object, None] # type: ignore - OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy - - -class ListDataPoliciesPager: - """A pager for iterating through ``list_data_policies`` requests. - - This class thinly wraps an initial - :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` object, and - provides an ``__iter__`` method to iterate through its - ``data_policies`` field. - - If there are more pages, the ``__iter__`` method will make additional - ``ListDataPolicies`` requests and continue to iterate - through the ``data_policies`` field on the - corresponding responses. - - All the usual :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` - attributes are available on the pager. If multiple requests are made, only - the most recent response is retained, and thus used for attribute lookup. - """ - def __init__(self, - method: Callable[..., datapolicy.ListDataPoliciesResponse], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): - """Instantiate the pager. - - Args: - method (Callable): The method that was originally called, and - which instantiated this pager. - request (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest): - The initial request object. - response (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse): - The initial response object. - retry (google.api_core.retry.Retry): Designation of what errors, - if any, should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - self._method = method - self._request = datapolicy.ListDataPoliciesRequest(request) - self._response = response - self._retry = retry - self._timeout = timeout - self._metadata = metadata - - def __getattr__(self, name: str) -> Any: - return getattr(self._response, name) - - @property - def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: - yield self._response - while self._response.next_page_token: - self._request.page_token = self._response.next_page_token - self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) - yield self._response - - def __iter__(self) -> Iterator[datapolicy.DataPolicy]: - for page in self.pages: - yield from page.data_policies - - def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) - - -class ListDataPoliciesAsyncPager: - """A pager for iterating through ``list_data_policies`` requests. - - This class thinly wraps an initial - :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` object, and - provides an ``__aiter__`` method to iterate through its - ``data_policies`` field. - - If there are more pages, the ``__aiter__`` method will make additional - ``ListDataPolicies`` requests and continue to iterate - through the ``data_policies`` field on the - corresponding responses. - - All the usual :class:`google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse` - attributes are available on the pager. If multiple requests are made, only - the most recent response is retained, and thus used for attribute lookup. - """ - def __init__(self, - method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): - """Instantiates the pager. - - Args: - method (Callable): The method that was originally called, and - which instantiated this pager. - request (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest): - The initial request object. - response (google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesResponse): - The initial response object. - retry (google.api_core.retry.AsyncRetry): Designation of what errors, - if any, should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - self._method = method - self._request = datapolicy.ListDataPoliciesRequest(request) - self._response = response - self._retry = retry - self._timeout = timeout - self._metadata = metadata - - def __getattr__(self, name: str) -> Any: - return getattr(self._response, name) - - @property - async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: - yield self._response - while self._response.next_page_token: - self._request.page_token = self._response.next_page_token - self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) - yield self._response - def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: - async def async_generator(): - async for page in self.pages: - for response in page.data_policies: - yield response - - return async_generator() - - def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py deleted file mode 100644 index 8538f8466860..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/base.py +++ /dev/null @@ -1,356 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import abc -from typing import Awaitable, Callable, Dict, Optional, Sequence, Union - -from google.cloud.bigquery_datapolicies_v1 import gapic_version as package_version - -import google.auth # type: ignore -import google.api_core -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - - -class DataPolicyServiceTransport(abc.ABC): - """Abstract transport class for DataPolicyService.""" - - AUTH_SCOPES = ( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', - ) - - DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' - - def __init__( - self, *, - host: str = DEFAULT_HOST, - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - **kwargs, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is mutually exclusive with credentials. - scopes (Optional[Sequence[str]]): A list of scopes. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - """ - - scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} - - # Save the scopes. - self._scopes = scopes - if not hasattr(self, "_ignore_credentials"): - self._ignore_credentials: bool = False - - # If no credentials are provided, then determine the appropriate - # defaults. - if credentials and credentials_file: - raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") - - if credentials_file is not None: - credentials, _ = google.auth.load_credentials_from_file( - credentials_file, - **scopes_kwargs, - quota_project_id=quota_project_id - ) - elif credentials is None and not self._ignore_credentials: - credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) - # Don't apply audience if the credentials file passed from user. - if hasattr(credentials, "with_gdch_audience"): - credentials = credentials.with_gdch_audience(api_audience if api_audience else host) - - # If the credentials are service account credentials, then always try to use self signed JWT. - if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): - credentials = credentials.with_always_use_jwt_access(True) - - # Save the credentials. - self._credentials = credentials - - # Save the hostname. Default to port 443 (HTTPS) if none is specified. - if ':' not in host: - host += ':443' - self._host = host - - @property - def host(self): - return self._host - - def _prep_wrapped_messages(self, client_info): - # Precompute the wrapped methods. - self._wrapped_methods = { - self.create_data_policy: gapic_v1.method.wrap_method( - self.create_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.update_data_policy: gapic_v1.method.wrap_method( - self.update_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.rename_data_policy: gapic_v1.method.wrap_method( - self.rename_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.delete_data_policy: gapic_v1.method.wrap_method( - self.delete_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_data_policy: gapic_v1.method.wrap_method( - self.get_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.list_data_policies: gapic_v1.method.wrap_method( - self.list_data_policies, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_iam_policy: gapic_v1.method.wrap_method( - self.get_iam_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.set_iam_policy: gapic_v1.method.wrap_method( - self.set_iam_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.test_iam_permissions: gapic_v1.method.wrap_method( - self.test_iam_permissions, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - } - - def close(self): - """Closes resources associated with the transport. - - .. warning:: - Only call this method if the transport is NOT shared - with other clients - this may cause errors in other clients! - """ - raise NotImplementedError() - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def rename_data_policy(self) -> Callable[ - [datapolicy.RenameDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Union[ - empty_pb2.Empty, - Awaitable[empty_pb2.Empty] - ]]: - raise NotImplementedError() - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Union[ - datapolicy.ListDataPoliciesResponse, - Awaitable[datapolicy.ListDataPoliciesResponse] - ]]: - raise NotImplementedError() - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: - raise NotImplementedError() - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: - raise NotImplementedError() - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Union[ - iam_policy_pb2.TestIamPermissionsResponse, - Awaitable[iam_policy_pb2.TestIamPermissionsResponse] - ]]: - raise NotImplementedError() - - @property - def kind(self) -> str: - raise NotImplementedError() - - -__all__ = ( - 'DataPolicyServiceTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py deleted file mode 100644 index 3f9e9dd9a085..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc.py +++ /dev/null @@ -1,566 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import json -import logging as std_logging -import pickle -import warnings -from typing import Callable, Dict, Optional, Sequence, Tuple, Union - -from google.api_core import grpc_helpers -from google.api_core import gapic_v1 -import google.auth # type: ignore -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.protobuf.json_format import MessageToJson -import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - - -class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER - def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) - if logging_enabled: # pragma: NO COVER - request_metadata = client_call_details.metadata - if isinstance(request, proto.Message): - request_payload = type(request).to_json(request) - elif isinstance(request, google.protobuf.message.Message): - request_payload = MessageToJson(request) - else: - request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" - - request_metadata = { - key: value.decode("utf-8") if isinstance(value, bytes) else value - for key, value in request_metadata - } - grpc_request = { - "payload": request_payload, - "requestMethod": "grpc", - "metadata": dict(request_metadata), - } - _LOGGER.debug( - f"Sending request for {client_call_details.method}", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": str(client_call_details.method), - "request": grpc_request, - "metadata": grpc_request["metadata"], - }, - ) - response = continuation(client_call_details, request) - if logging_enabled: # pragma: NO COVER - response_metadata = response.trailing_metadata() - # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None - result = response.result() - if isinstance(result, proto.Message): - response_payload = type(result).to_json(result) - elif isinstance(result, google.protobuf.message.Message): - response_payload = MessageToJson(result) - else: - response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" - grpc_response = { - "payload": response_payload, - "metadata": metadata, - "status": "OK", - } - _LOGGER.debug( - f"Received response for {client_call_details.method}.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": client_call_details.method, - "response": grpc_response, - "metadata": grpc_response["metadata"], - }, - ) - return response - - -class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): - """gRPC backend transport for DataPolicyService. - - Data Policy Service provides APIs for managing the - label-policy bindings. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends protocol buffers over the wire using gRPC (which is built on - top of HTTP/2); the ``grpcio`` package must be installed. - """ - _stubs: Dict[str, Callable] - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - This argument is ignored if a ``channel`` instance is provided. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is ignored if a ``channel`` instance is provided. - scopes (Optional(Sequence[str])): A list of scopes. This argument is - ignored if a ``channel`` instance is provided. - channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): - A ``Channel`` instance through which to make calls, or a Callable - that constructs and returns one. If set to None, ``self.create_channel`` - is used to create the channel. If a Callable is given, it will be called - with the same arguments as used in ``self.create_channel``. - api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. - If provided, it overrides the ``host`` argument and tries to create - a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or application default SSL credentials. - client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): - Deprecated. A callback to provide client SSL certificate bytes and - private key bytes, both in PEM format. It is ignored if - ``api_mtls_endpoint`` is None. - ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for the grpc channel. It is ignored if a ``channel`` instance is provided. - client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): - A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure a mutual TLS channel. It is - ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport - creation failed for any reason. - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - self._grpc_channel = None - self._ssl_channel_credentials = ssl_channel_credentials - self._stubs: Dict[str, Callable] = {} - - if api_mtls_endpoint: - warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) - if client_cert_source: - warnings.warn("client_cert_source is deprecated", DeprecationWarning) - - if isinstance(channel, grpc.Channel): - # Ignore credentials if a channel was passed. - credentials = None - self._ignore_credentials = True - # If a channel was explicitly provided, set it. - self._grpc_channel = channel - self._ssl_channel_credentials = None - - else: - if api_mtls_endpoint: - host = api_mtls_endpoint - - # Create SSL credentials with client_cert_source or application - # default SSL credentials. - if client_cert_source: - cert, key = client_cert_source() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - else: - self._ssl_channel_credentials = SslCredentials().ssl_credentials - - else: - if client_cert_source_for_mtls and not ssl_channel_credentials: - cert, key = client_cert_source_for_mtls() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - - # The base transport sets the host, credentials and scopes - super().__init__( - host=host, - credentials=credentials, - credentials_file=credentials_file, - scopes=scopes, - quota_project_id=quota_project_id, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience, - ) - - if not self._grpc_channel: - # initialize with the provided callable or the default channel - channel_init = channel or type(self).create_channel - self._grpc_channel = channel_init( - self._host, - # use the credentials which are saved - credentials=self._credentials, - # Set ``credentials_file`` to ``None`` here as - # the credentials that we saved earlier should be used. - credentials_file=None, - scopes=self._scopes, - ssl_credentials=self._ssl_channel_credentials, - quota_project_id=quota_project_id, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - self._interceptor = _LoggingClientInterceptor() - self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) - - # Wrap messages. This must be done after self._logged_channel exists - self._prep_wrapped_messages(client_info) - - @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> grpc.Channel: - """Create and return a gRPC channel object. - Args: - host (Optional[str]): The host for the channel to use. - credentials (Optional[~.Credentials]): The - authorization credentials to attach to requests. These - credentials identify this application to the service. If - none are specified, the client will attempt to ascertain - the credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is mutually exclusive with credentials. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - kwargs (Optional[dict]): Keyword arguments, which are passed to the - channel creation. - Returns: - grpc.Channel: A gRPC channel object. - - Raises: - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - - return grpc_helpers.create_channel( - host, - credentials=credentials, - credentials_file=credentials_file, - quota_project_id=quota_project_id, - default_scopes=cls.AUTH_SCOPES, - scopes=scopes, - default_host=cls.DEFAULT_HOST, - **kwargs - ) - - @property - def grpc_channel(self) -> grpc.Channel: - """Return the channel designed to connect to this service. - """ - return self._grpc_channel - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the create data policy method over gRPC. - - Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - Returns: - Callable[[~.CreateDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/CreateDataPolicy', - request_serializer=datapolicy.CreateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['create_data_policy'] - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the update data policy method over gRPC. - - Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - Returns: - Callable[[~.UpdateDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/UpdateDataPolicy', - request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['update_data_policy'] - - @property - def rename_data_policy(self) -> Callable[ - [datapolicy.RenameDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the rename data policy method over gRPC. - - Renames the id (display name) of the specified data - policy. - - Returns: - Callable[[~.RenameDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'rename_data_policy' not in self._stubs: - self._stubs['rename_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/RenameDataPolicy', - request_serializer=datapolicy.RenameDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['rename_data_policy'] - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: - r"""Return a callable for the delete data policy method over gRPC. - - Deletes the data policy specified by its resource - name. - - Returns: - Callable[[~.DeleteDataPolicyRequest], - ~.Empty]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/DeleteDataPolicy', - request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, - response_deserializer=empty_pb2.Empty.FromString, - ) - return self._stubs['delete_data_policy'] - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the get data policy method over gRPC. - - Gets the data policy specified by its resource name. - - Returns: - Callable[[~.GetDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetDataPolicy', - request_serializer=datapolicy.GetDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['get_data_policy'] - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: - r"""Return a callable for the list data policies method over gRPC. - - List all of the data policies in the specified parent - project. - - Returns: - Callable[[~.ListDataPoliciesRequest], - ~.ListDataPoliciesResponse]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/ListDataPolicies', - request_serializer=datapolicy.ListDataPoliciesRequest.serialize, - response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, - ) - return self._stubs['list_data_policies'] - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: - r"""Return a callable for the get iam policy method over gRPC. - - Gets the IAM policy for the specified data policy. - - Returns: - Callable[[~.GetIamPolicyRequest], - ~.Policy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetIamPolicy', - request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['get_iam_policy'] - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: - r"""Return a callable for the set iam policy method over gRPC. - - Sets the IAM policy for the specified data policy. - - Returns: - Callable[[~.SetIamPolicyRequest], - ~.Policy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/SetIamPolicy', - request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['set_iam_policy'] - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: - r"""Return a callable for the test iam permissions method over gRPC. - - Returns the caller's permission on the specified data - policy resource. - - Returns: - Callable[[~.TestIamPermissionsRequest], - ~.TestIamPermissionsResponse]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/TestIamPermissions', - request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, - response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, - ) - return self._stubs['test_iam_permissions'] - - def close(self): - self._logged_channel.close() - - @property - def kind(self) -> str: - return "grpc" - - -__all__ = ( - 'DataPolicyServiceGrpcTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py deleted file mode 100644 index df6c8bb5887c..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/grpc_asyncio.py +++ /dev/null @@ -1,708 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import inspect -import json -import pickle -import logging as std_logging -import warnings -from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union - -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers_async -from google.api_core import exceptions as core_exceptions -from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.protobuf.json_format import MessageToJson -import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore -from grpc.experimental import aio # type: ignore - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .grpc import DataPolicyServiceGrpcTransport - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - - -class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER - async def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) - if logging_enabled: # pragma: NO COVER - request_metadata = client_call_details.metadata - if isinstance(request, proto.Message): - request_payload = type(request).to_json(request) - elif isinstance(request, google.protobuf.message.Message): - request_payload = MessageToJson(request) - else: - request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" - - request_metadata = { - key: value.decode("utf-8") if isinstance(value, bytes) else value - for key, value in request_metadata - } - grpc_request = { - "payload": request_payload, - "requestMethod": "grpc", - "metadata": dict(request_metadata), - } - _LOGGER.debug( - f"Sending request for {client_call_details.method}", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": str(client_call_details.method), - "request": grpc_request, - "metadata": grpc_request["metadata"], - }, - ) - response = await continuation(client_call_details, request) - if logging_enabled: # pragma: NO COVER - response_metadata = await response.trailing_metadata() - # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None - result = await response - if isinstance(result, proto.Message): - response_payload = type(result).to_json(result) - elif isinstance(result, google.protobuf.message.Message): - response_payload = MessageToJson(result) - else: - response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" - grpc_response = { - "payload": response_payload, - "metadata": metadata, - "status": "OK", - } - _LOGGER.debug( - f"Received response to rpc {client_call_details.method}.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": str(client_call_details.method), - "response": grpc_response, - "metadata": grpc_response["metadata"], - }, - ) - return response - - -class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): - """gRPC AsyncIO backend transport for DataPolicyService. - - Data Policy Service provides APIs for managing the - label-policy bindings. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends protocol buffers over the wire using gRPC (which is built on - top of HTTP/2); the ``grpcio`` package must be installed. - """ - - _grpc_channel: aio.Channel - _stubs: Dict[str, Callable] = {} - - @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> aio.Channel: - """Create and return a gRPC AsyncIO channel object. - Args: - host (Optional[str]): The host for the channel to use. - credentials (Optional[~.Credentials]): The - authorization credentials to attach to requests. These - credentials identify this application to the service. If - none are specified, the client will attempt to ascertain - the credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - kwargs (Optional[dict]): Keyword arguments, which are passed to the - channel creation. - Returns: - aio.Channel: A gRPC AsyncIO channel object. - """ - - return grpc_helpers_async.create_channel( - host, - credentials=credentials, - credentials_file=credentials_file, - quota_project_id=quota_project_id, - default_scopes=cls.AUTH_SCOPES, - scopes=scopes, - default_host=cls.DEFAULT_HOST, - **kwargs - ) - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - This argument is ignored if a ``channel`` instance is provided. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is ignored if a ``channel`` instance is provided. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): - A ``Channel`` instance through which to make calls, or a Callable - that constructs and returns one. If set to None, ``self.create_channel`` - is used to create the channel. If a Callable is given, it will be called - with the same arguments as used in ``self.create_channel``. - api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. - If provided, it overrides the ``host`` argument and tries to create - a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or application default SSL credentials. - client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): - Deprecated. A callback to provide client SSL certificate bytes and - private key bytes, both in PEM format. It is ignored if - ``api_mtls_endpoint`` is None. - ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for the grpc channel. It is ignored if a ``channel`` instance is provided. - client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): - A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure a mutual TLS channel. It is - ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - - Raises: - google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport - creation failed for any reason. - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - self._grpc_channel = None - self._ssl_channel_credentials = ssl_channel_credentials - self._stubs: Dict[str, Callable] = {} - - if api_mtls_endpoint: - warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) - if client_cert_source: - warnings.warn("client_cert_source is deprecated", DeprecationWarning) - - if isinstance(channel, aio.Channel): - # Ignore credentials if a channel was passed. - credentials = None - self._ignore_credentials = True - # If a channel was explicitly provided, set it. - self._grpc_channel = channel - self._ssl_channel_credentials = None - else: - if api_mtls_endpoint: - host = api_mtls_endpoint - - # Create SSL credentials with client_cert_source or application - # default SSL credentials. - if client_cert_source: - cert, key = client_cert_source() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - else: - self._ssl_channel_credentials = SslCredentials().ssl_credentials - - else: - if client_cert_source_for_mtls and not ssl_channel_credentials: - cert, key = client_cert_source_for_mtls() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - - # The base transport sets the host, credentials and scopes - super().__init__( - host=host, - credentials=credentials, - credentials_file=credentials_file, - scopes=scopes, - quota_project_id=quota_project_id, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience, - ) - - if not self._grpc_channel: - # initialize with the provided callable or the default channel - channel_init = channel or type(self).create_channel - self._grpc_channel = channel_init( - self._host, - # use the credentials which are saved - credentials=self._credentials, - # Set ``credentials_file`` to ``None`` here as - # the credentials that we saved earlier should be used. - credentials_file=None, - scopes=self._scopes, - ssl_credentials=self._ssl_channel_credentials, - quota_project_id=quota_project_id, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - self._interceptor = _LoggingClientAIOInterceptor() - self._grpc_channel._unary_unary_interceptors.append(self._interceptor) - self._logged_channel = self._grpc_channel - self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters - # Wrap messages. This must be done after self._logged_channel exists - self._prep_wrapped_messages(client_info) - - @property - def grpc_channel(self) -> aio.Channel: - """Create the channel designed to connect to this service. - - This property caches on the instance; repeated calls return - the same channel. - """ - # Return the channel from cache. - return self._grpc_channel - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the create data policy method over gRPC. - - Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - Returns: - Callable[[~.CreateDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/CreateDataPolicy', - request_serializer=datapolicy.CreateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['create_data_policy'] - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the update data policy method over gRPC. - - Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - Returns: - Callable[[~.UpdateDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/UpdateDataPolicy', - request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['update_data_policy'] - - @property - def rename_data_policy(self) -> Callable[ - [datapolicy.RenameDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the rename data policy method over gRPC. - - Renames the id (display name) of the specified data - policy. - - Returns: - Callable[[~.RenameDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'rename_data_policy' not in self._stubs: - self._stubs['rename_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/RenameDataPolicy', - request_serializer=datapolicy.RenameDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['rename_data_policy'] - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Awaitable[empty_pb2.Empty]]: - r"""Return a callable for the delete data policy method over gRPC. - - Deletes the data policy specified by its resource - name. - - Returns: - Callable[[~.DeleteDataPolicyRequest], - Awaitable[~.Empty]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/DeleteDataPolicy', - request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, - response_deserializer=empty_pb2.Empty.FromString, - ) - return self._stubs['delete_data_policy'] - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the get data policy method over gRPC. - - Gets the data policy specified by its resource name. - - Returns: - Callable[[~.GetDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetDataPolicy', - request_serializer=datapolicy.GetDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['get_data_policy'] - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Awaitable[datapolicy.ListDataPoliciesResponse]]: - r"""Return a callable for the list data policies method over gRPC. - - List all of the data policies in the specified parent - project. - - Returns: - Callable[[~.ListDataPoliciesRequest], - Awaitable[~.ListDataPoliciesResponse]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/ListDataPolicies', - request_serializer=datapolicy.ListDataPoliciesRequest.serialize, - response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, - ) - return self._stubs['list_data_policies'] - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: - r"""Return a callable for the get iam policy method over gRPC. - - Gets the IAM policy for the specified data policy. - - Returns: - Callable[[~.GetIamPolicyRequest], - Awaitable[~.Policy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/GetIamPolicy', - request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['get_iam_policy'] - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: - r"""Return a callable for the set iam policy method over gRPC. - - Sets the IAM policy for the specified data policy. - - Returns: - Callable[[~.SetIamPolicyRequest], - Awaitable[~.Policy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/SetIamPolicy', - request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['set_iam_policy'] - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: - r"""Return a callable for the test iam permissions method over gRPC. - - Returns the caller's permission on the specified data - policy resource. - - Returns: - Callable[[~.TestIamPermissionsRequest], - Awaitable[~.TestIamPermissionsResponse]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1.DataPolicyService/TestIamPermissions', - request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, - response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, - ) - return self._stubs['test_iam_permissions'] - - def _prep_wrapped_messages(self, client_info): - """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" - self._wrapped_methods = { - self.create_data_policy: self._wrap_method( - self.create_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.update_data_policy: self._wrap_method( - self.update_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.rename_data_policy: self._wrap_method( - self.rename_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.delete_data_policy: self._wrap_method( - self.delete_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_data_policy: self._wrap_method( - self.get_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.list_data_policies: self._wrap_method( - self.list_data_policies, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_iam_policy: self._wrap_method( - self.get_iam_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.set_iam_policy: self._wrap_method( - self.set_iam_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.test_iam_permissions: self._wrap_method( - self.test_iam_permissions, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - } - - def _wrap_method(self, func, *args, **kwargs): - if self._wrap_with_kind: # pragma: NO COVER - kwargs["kind"] = self.kind - return gapic_v1.method_async.wrap_method(func, *args, **kwargs) - - def close(self): - return self._logged_channel.close() - - @property - def kind(self) -> str: - return "grpc_asyncio" - - -__all__ = ( - 'DataPolicyServiceGrpcAsyncIOTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py deleted file mode 100644 index 36566edccae6..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest.py +++ /dev/null @@ -1,1833 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import logging -import json # type: ignore - -from google.auth.transport.requests import AuthorizedSession # type: ignore -from google.auth import credentials as ga_credentials # type: ignore -from google.api_core import exceptions as core_exceptions -from google.api_core import retry as retries -from google.api_core import rest_helpers -from google.api_core import rest_streaming -from google.api_core import gapic_v1 -import google.protobuf - -from google.protobuf import json_format - -from requests import __version__ as requests_version -import dataclasses -from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union -import warnings - - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - - -from .rest_base import _BaseDataPolicyServiceRestTransport -from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO - -try: - OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.Retry, object, None] # type: ignore - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = logging.getLogger(__name__) - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( - gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, - grpc_version=None, - rest_version=f"requests@{requests_version}", -) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - - -class DataPolicyServiceRestInterceptor: - """Interceptor for DataPolicyService. - - Interceptors are used to manipulate requests, request metadata, and responses - in arbitrary ways. - Example use cases include: - * Logging - * Verifying requests according to service or custom semantics - * Stripping extraneous information from responses - - These use cases and more can be enabled by injecting an - instance of a custom subclass when constructing the DataPolicyServiceRestTransport. - - .. code-block:: python - class MyCustomDataPolicyServiceInterceptor(DataPolicyServiceRestInterceptor): - def pre_create_data_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_create_data_policy(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_delete_data_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def pre_get_data_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_get_data_policy(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_get_iam_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_get_iam_policy(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_list_data_policies(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_list_data_policies(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_rename_data_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_rename_data_policy(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_set_iam_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_set_iam_policy(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_test_iam_permissions(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_test_iam_permissions(self, response): - logging.log(f"Received response: {response}") - return response - - def pre_update_data_policy(self, request, metadata): - logging.log(f"Received request: {request}") - return request, metadata - - def post_update_data_policy(self, response): - logging.log(f"Received response: {response}") - return response - - transport = DataPolicyServiceRestTransport(interceptor=MyCustomDataPolicyServiceInterceptor()) - client = DataPolicyServiceClient(transport=transport) - - - """ - def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for create_data_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: - """Post-rpc interceptor for create_data_policy - - DEPRECATED. Please use the `post_create_data_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_create_data_policy` interceptor runs - before the `post_create_data_policy_with_metadata` interceptor. - """ - return response - - def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for create_data_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_create_data_policy_with_metadata` - interceptor in new development instead of the `post_create_data_policy` interceptor. - When both interceptors are used, this `post_create_data_policy_with_metadata` interceptor runs after the - `post_create_data_policy` interceptor. The (possibly modified) response returned by - `post_create_data_policy` will be passed to - `post_create_data_policy_with_metadata`. - """ - return response, metadata - - def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for delete_data_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for get_data_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: - """Post-rpc interceptor for get_data_policy - - DEPRECATED. Please use the `post_get_data_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_get_data_policy` interceptor runs - before the `post_get_data_policy_with_metadata` interceptor. - """ - return response - - def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for get_data_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_get_data_policy_with_metadata` - interceptor in new development instead of the `post_get_data_policy` interceptor. - When both interceptors are used, this `post_get_data_policy_with_metadata` interceptor runs after the - `post_get_data_policy` interceptor. The (possibly modified) response returned by - `post_get_data_policy` will be passed to - `post_get_data_policy_with_metadata`. - """ - return response, metadata - - def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for get_iam_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: - """Post-rpc interceptor for get_iam_policy - - DEPRECATED. Please use the `post_get_iam_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_get_iam_policy` interceptor runs - before the `post_get_iam_policy_with_metadata` interceptor. - """ - return response - - def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for get_iam_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_get_iam_policy_with_metadata` - interceptor in new development instead of the `post_get_iam_policy` interceptor. - When both interceptors are used, this `post_get_iam_policy_with_metadata` interceptor runs after the - `post_get_iam_policy` interceptor. The (possibly modified) response returned by - `post_get_iam_policy` will be passed to - `post_get_iam_policy_with_metadata`. - """ - return response, metadata - - def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for list_data_policies - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: - """Post-rpc interceptor for list_data_policies - - DEPRECATED. Please use the `post_list_data_policies_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_list_data_policies` interceptor runs - before the `post_list_data_policies_with_metadata` interceptor. - """ - return response - - def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for list_data_policies - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_list_data_policies_with_metadata` - interceptor in new development instead of the `post_list_data_policies` interceptor. - When both interceptors are used, this `post_list_data_policies_with_metadata` interceptor runs after the - `post_list_data_policies` interceptor. The (possibly modified) response returned by - `post_list_data_policies` will be passed to - `post_list_data_policies_with_metadata`. - """ - return response, metadata - - def pre_rename_data_policy(self, request: datapolicy.RenameDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RenameDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for rename_data_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_rename_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: - """Post-rpc interceptor for rename_data_policy - - DEPRECATED. Please use the `post_rename_data_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_rename_data_policy` interceptor runs - before the `post_rename_data_policy_with_metadata` interceptor. - """ - return response - - def post_rename_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for rename_data_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_rename_data_policy_with_metadata` - interceptor in new development instead of the `post_rename_data_policy` interceptor. - When both interceptors are used, this `post_rename_data_policy_with_metadata` interceptor runs after the - `post_rename_data_policy` interceptor. The (possibly modified) response returned by - `post_rename_data_policy` will be passed to - `post_rename_data_policy_with_metadata`. - """ - return response, metadata - - def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for set_iam_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: - """Post-rpc interceptor for set_iam_policy - - DEPRECATED. Please use the `post_set_iam_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_set_iam_policy` interceptor runs - before the `post_set_iam_policy_with_metadata` interceptor. - """ - return response - - def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for set_iam_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_set_iam_policy_with_metadata` - interceptor in new development instead of the `post_set_iam_policy` interceptor. - When both interceptors are used, this `post_set_iam_policy_with_metadata` interceptor runs after the - `post_set_iam_policy` interceptor. The (possibly modified) response returned by - `post_set_iam_policy` will be passed to - `post_set_iam_policy_with_metadata`. - """ - return response, metadata - - def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for test_iam_permissions - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: - """Post-rpc interceptor for test_iam_permissions - - DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_test_iam_permissions` interceptor runs - before the `post_test_iam_permissions_with_metadata` interceptor. - """ - return response - - def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for test_iam_permissions - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_test_iam_permissions_with_metadata` - interceptor in new development instead of the `post_test_iam_permissions` interceptor. - When both interceptors are used, this `post_test_iam_permissions_with_metadata` interceptor runs after the - `post_test_iam_permissions` interceptor. The (possibly modified) response returned by - `post_test_iam_permissions` will be passed to - `post_test_iam_permissions_with_metadata`. - """ - return response, metadata - - def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: - """Pre-rpc interceptor for update_data_policy - - Override in a subclass to manipulate the request or metadata - before they are sent to the DataPolicyService server. - """ - return request, metadata - - def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: - """Post-rpc interceptor for update_data_policy - - DEPRECATED. Please use the `post_update_data_policy_with_metadata` - interceptor instead. - - Override in a subclass to read or manipulate the response - after it is returned by the DataPolicyService server but before - it is returned to user code. This `post_update_data_policy` interceptor runs - before the `post_update_data_policy_with_metadata` interceptor. - """ - return response - - def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: - """Post-rpc interceptor for update_data_policy - - Override in a subclass to read or manipulate the response or metadata after it - is returned by the DataPolicyService server but before it is returned to user code. - - We recommend only using this `post_update_data_policy_with_metadata` - interceptor in new development instead of the `post_update_data_policy` interceptor. - When both interceptors are used, this `post_update_data_policy_with_metadata` interceptor runs after the - `post_update_data_policy` interceptor. The (possibly modified) response returned by - `post_update_data_policy` will be passed to - `post_update_data_policy_with_metadata`. - """ - return response, metadata - - -@dataclasses.dataclass -class DataPolicyServiceRestStub: - _session: AuthorizedSession - _host: str - _interceptor: DataPolicyServiceRestInterceptor - - -class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): - """REST backend synchronous transport for DataPolicyService. - - Data Policy Service provides APIs for managing the - label-policy bindings. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends JSON representations of protocol buffers over HTTP/1.1 - """ - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - client_cert_source_for_mtls: Optional[Callable[[ - ], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - interceptor: Optional[DataPolicyServiceRestInterceptor] = None, - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is ignored if ``channel`` is provided. - scopes (Optional(Sequence[str])): A list of scopes. This argument is - ignored if ``channel`` is provided. - client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client - certificate to configure mutual TLS HTTP channel. It is ignored - if ``channel`` is provided. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you are developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - url_scheme: the protocol scheme for the API endpoint. Normally - "https", but for testing or local servers, - "http" can be specified. - """ - # Run the base constructor - # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. - # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the - # credentials object - super().__init__( - host=host, - credentials=credentials, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - url_scheme=url_scheme, - api_audience=api_audience - ) - self._session = AuthorizedSession( - self._credentials, default_host=self.DEFAULT_HOST) - if client_cert_source_for_mtls: - self._session.configure_mtls_channel(client_cert_source_for_mtls) - self._interceptor = interceptor or DataPolicyServiceRestInterceptor() - self._prep_wrapped_messages(client_info) - - class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.CreateDataPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: datapolicy.CreateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: - r"""Call the create data policy method over HTTP. - - Args: - request (~.datapolicy.CreateDataPolicyRequest): - The request object. Request message for the - CreateDataPolicy method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.datapolicy.DataPolicy: - Represents the label-policy binding. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() - - request, metadata = self._interceptor.pre_create_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = type(request).to_json(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.CreateDataPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "CreateDataPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = datapolicy.DataPolicy() - pb_resp = datapolicy.DataPolicy.pb(resp) - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_create_data_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = datapolicy.DataPolicy.to_json(response) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.create_data_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "CreateDataPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - ) - return response - - def __call__(self, - request: datapolicy.DeleteDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ): - r"""Call the delete data policy method over HTTP. - - Args: - request (~.datapolicy.DeleteDataPolicyRequest): - The request object. Request message for the - DeleteDataPolicy method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() - - request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = json_format.MessageToJson(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.DeleteDataPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "DeleteDataPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.GetDataPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - ) - return response - - def __call__(self, - request: datapolicy.GetDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: - r"""Call the get data policy method over HTTP. - - Args: - request (~.datapolicy.GetDataPolicyRequest): - The request object. Request message for the GetDataPolicy - method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.datapolicy.DataPolicy: - Represents the label-policy binding. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() - - request, metadata = self._interceptor.pre_get_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = type(request).to_json(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.GetDataPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "GetDataPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = datapolicy.DataPolicy() - pb_resp = datapolicy.DataPolicy.pb(resp) - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_get_data_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = datapolicy.DataPolicy.to_json(response) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.get_data_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "GetDataPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.GetIamPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: iam_policy_pb2.GetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: - r"""Call the get iam policy method over HTTP. - - Args: - request (~.iam_policy_pb2.GetIamPolicyRequest): - The request object. Request message for ``GetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which - specifies access controls for Google Cloud resources. - - A ``Policy`` is a collection of ``bindings``. A - ``binding`` binds one or more ``members``, or - principals, to a single ``role``. Principals can be user - accounts, service accounts, Google groups, and domains - (such as G Suite). A ``role`` is a named list of - permissions; each ``role`` can be an IAM predefined role - or a user-created custom role. - - For some types of Google Cloud resources, a ``binding`` - can also specify a ``condition``, which is a logical - expression that allows access to a resource only if the - expression evaluates to ``true``. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the `IAM - documentation `__. - - **JSON example:** - - :: - - { - "bindings": [ - { - "role": "roles/resourcemanager.organizationAdmin", - "members": [ - "user:mike@example.com", - "group:admins@example.com", - "domain:google.com", - "serviceAccount:my-project-id@appspot.gserviceaccount.com" - ] - }, - { - "role": "roles/resourcemanager.organizationViewer", - "members": [ - "user:eve@example.com" - ], - "condition": { - "title": "expirable access", - "description": "Does not grant access after Sep 2020", - "expression": "request.time < - timestamp('2020-10-01T00:00:00.000Z')", - } - } - ], - "etag": "BwWWja0YfJA=", - "version": 3 - } - - **YAML example:** - - :: - - bindings: - - members: - - user:mike@example.com - - group:admins@example.com - - domain:google.com - - serviceAccount:my-project-id@appspot.gserviceaccount.com - role: roles/resourcemanager.organizationAdmin - - members: - - user:eve@example.com - role: roles/resourcemanager.organizationViewer - condition: - title: expirable access - description: Does not grant access after Sep 2020 - expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 - - For a description of IAM and its features, see the `IAM - documentation `__. - - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() - - request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = json_format.MessageToJson(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.GetIamPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "GetIamPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = policy_pb2.Policy() - pb_resp = resp - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_get_iam_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = json_format.MessageToJson(resp) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.get_iam_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "GetIamPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.ListDataPolicies") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - ) - return response - - def __call__(self, - request: datapolicy.ListDataPoliciesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.ListDataPoliciesResponse: - r"""Call the list data policies method over HTTP. - - Args: - request (~.datapolicy.ListDataPoliciesRequest): - The request object. Request message for the - ListDataPolicies method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.datapolicy.ListDataPoliciesResponse: - Response message for the - ListDataPolicies method. - - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() - - request, metadata = self._interceptor.pre_list_data_policies(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = type(request).to_json(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.ListDataPolicies", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "ListDataPolicies", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = datapolicy.ListDataPoliciesResponse() - pb_resp = datapolicy.ListDataPoliciesResponse.pb(resp) - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_list_data_policies(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.list_data_policies", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "ListDataPolicies", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _RenameDataPolicy(_BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.RenameDataPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: datapolicy.RenameDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: - r"""Call the rename data policy method over HTTP. - - Args: - request (~.datapolicy.RenameDataPolicyRequest): - The request object. Request message for the - RenameDataPolicy method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.datapolicy.DataPolicy: - Represents the label-policy binding. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_http_options() - - request, metadata = self._interceptor.pre_rename_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = type(request).to_json(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.RenameDataPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "RenameDataPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._RenameDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = datapolicy.DataPolicy() - pb_resp = datapolicy.DataPolicy.pb(resp) - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_rename_data_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_rename_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = datapolicy.DataPolicy.to_json(response) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.rename_data_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "RenameDataPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.SetIamPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: iam_policy_pb2.SetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: - r"""Call the set iam policy method over HTTP. - - Args: - request (~.iam_policy_pb2.SetIamPolicyRequest): - The request object. Request message for ``SetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which - specifies access controls for Google Cloud resources. - - A ``Policy`` is a collection of ``bindings``. A - ``binding`` binds one or more ``members``, or - principals, to a single ``role``. Principals can be user - accounts, service accounts, Google groups, and domains - (such as G Suite). A ``role`` is a named list of - permissions; each ``role`` can be an IAM predefined role - or a user-created custom role. - - For some types of Google Cloud resources, a ``binding`` - can also specify a ``condition``, which is a logical - expression that allows access to a resource only if the - expression evaluates to ``true``. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the `IAM - documentation `__. - - **JSON example:** - - :: - - { - "bindings": [ - { - "role": "roles/resourcemanager.organizationAdmin", - "members": [ - "user:mike@example.com", - "group:admins@example.com", - "domain:google.com", - "serviceAccount:my-project-id@appspot.gserviceaccount.com" - ] - }, - { - "role": "roles/resourcemanager.organizationViewer", - "members": [ - "user:eve@example.com" - ], - "condition": { - "title": "expirable access", - "description": "Does not grant access after Sep 2020", - "expression": "request.time < - timestamp('2020-10-01T00:00:00.000Z')", - } - } - ], - "etag": "BwWWja0YfJA=", - "version": 3 - } - - **YAML example:** - - :: - - bindings: - - members: - - user:mike@example.com - - group:admins@example.com - - domain:google.com - - serviceAccount:my-project-id@appspot.gserviceaccount.com - role: roles/resourcemanager.organizationAdmin - - members: - - user:eve@example.com - role: roles/resourcemanager.organizationViewer - condition: - title: expirable access - description: Does not grant access after Sep 2020 - expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 - - For a description of IAM and its features, see the `IAM - documentation `__. - - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() - - request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = json_format.MessageToJson(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.SetIamPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "SetIamPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = policy_pb2.Policy() - pb_resp = resp - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_set_iam_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = json_format.MessageToJson(resp) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.set_iam_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "SetIamPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.TestIamPermissions") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: iam_policy_pb2.TestIamPermissionsRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> iam_policy_pb2.TestIamPermissionsResponse: - r"""Call the test iam permissions method over HTTP. - - Args: - request (~.iam_policy_pb2.TestIamPermissionsRequest): - The request object. Request message for ``TestIamPermissions`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.iam_policy_pb2.TestIamPermissionsResponse: - Response message for ``TestIamPermissions`` method. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() - - request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = json_format.MessageToJson(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.TestIamPermissions", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "TestIamPermissions", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = iam_policy_pb2.TestIamPermissionsResponse() - pb_resp = resp - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_test_iam_permissions(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = json_format.MessageToJson(resp) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.test_iam_permissions", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "TestIamPermissions", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): - def __hash__(self): - return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") - - @staticmethod - def _get_response( - host, - metadata, - query_params, - session, - timeout, - transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] - headers = dict(metadata) - headers['Content-Type'] = 'application/json' - response = getattr(session, method)( - "{host}{uri}".format(host=host, uri=uri), - timeout=timeout, - headers=headers, - params=rest_helpers.flatten_query_params(query_params, strict=True), - data=body, - ) - return response - - def __call__(self, - request: datapolicy.UpdateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: - r"""Call the update data policy method over HTTP. - - Args: - request (~.datapolicy.UpdateDataPolicyRequest): - The request object. Response message for the - UpdateDataPolicy method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - ~.datapolicy.DataPolicy: - Represents the label-policy binding. - """ - - http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() - - request, metadata = self._interceptor.pre_update_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) - - body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) - - # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] - try: - request_payload = type(request).to_json(request) - except: - request_payload = None - http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), - } - _LOGGER.debug( - f"Sending request for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.UpdateDataPolicy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "UpdateDataPolicy", - "httpRequest": http_request, - "metadata": http_request["headers"], - }, - ) - - # Send the request - response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) - - # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception - # subclass. - if response.status_code >= 400: - raise core_exceptions.from_http_response(response) - - # Return the response - resp = datapolicy.DataPolicy() - pb_resp = datapolicy.DataPolicy.pb(resp) - - json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) - - resp = self._interceptor.post_update_data_policy(resp) - response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - try: - response_payload = datapolicy.DataPolicy.to_json(response) - except: - response_payload = None - http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, - } - _LOGGER.debug( - "Received response for google.cloud.bigquery.datapolicies_v1.DataPolicyServiceClient.update_data_policy", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "rpcName": "UpdateDataPolicy", - "metadata": http_response["headers"], - "httpResponse": http_response, - }, - ) - return resp - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore - - @property - def rename_data_policy(self) -> Callable[ - [datapolicy.RenameDataPolicyRequest], - datapolicy.DataPolicy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._RenameDataPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: - # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. - # In C++ this would require a dynamic_cast - return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore - - @property - def kind(self) -> str: - return "rest" - - def close(self): - self._session.close() - - -__all__=( - 'DataPolicyServiceRestTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py deleted file mode 100644 index d49390db633f..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/rest_base.py +++ /dev/null @@ -1,487 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import json # type: ignore -from google.api_core import path_template -from google.api_core import gapic_v1 - -from google.protobuf import json_format -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO - -import re -from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union - - -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - - -class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): - """Base REST backend transport for DataPolicyService. - - Note: This class is not meant to be used directly. Use its sync and - async sub-classes instead. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends JSON representations of protocol buffers over HTTP/1.1 - """ - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[Any] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[Any]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you are developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - url_scheme: the protocol scheme for the API endpoint. Normally - "https", but for testing or local servers, - "http" can be specified. - """ - # Run the base constructor - maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) - if maybe_url_match is None: - raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER - - url_match_items = maybe_url_match.groupdict() - - host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host - - super().__init__( - host=host, - credentials=credentials, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience - ) - - class _BaseCreateDataPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v1/{parent=projects/*/locations/*}/dataPolicies', - 'body': 'data_policy', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.CreateDataPolicyRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseDeleteDataPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'delete', - 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.DeleteDataPolicyRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseGetDataPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.GetDataPolicyRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseGetIamPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', - 'body': '*', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = request - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseListDataPolicies: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v1/{parent=projects/*/locations/*}/dataPolicies', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.ListDataPoliciesRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseRenameDataPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v1/{name=projects/*/locations/*/dataPolicies/*}:rename', - 'body': '*', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.RenameDataPolicyRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseRenameDataPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseSetIamPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', - 'body': '*', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = request - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseTestIamPermissions: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v1/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', - 'body': '*', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = request - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - class _BaseUpdateDataPolicy: - def __hash__(self): # pragma: NO COVER - return NotImplementedError("__hash__ must be implemented.") - - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } - - @classmethod - def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} - - @staticmethod - def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'patch', - 'uri': '/v1/{data_policy.name=projects/*/locations/*/dataPolicies/*}', - 'body': 'data_policy', - }, - ] - return http_options - - @staticmethod - def _get_transcoded_request(http_options, request): - pb_request = datapolicy.UpdateDataPolicyRequest.pb(request) - transcoded_request = path_template.transcode(http_options, pb_request) - return transcoded_request - - @staticmethod - def _get_request_body_json(transcoded_request): - # Jsonify the request body - - body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True - ) - return body - @staticmethod - def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) - - query_params["$alt"] = "json;enum-encoding=int" - return query_params - - -__all__=( - '_BaseDataPolicyServiceRestTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py deleted file mode 100644 index ffea92f32392..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/datapolicy.py +++ /dev/null @@ -1,413 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from __future__ import annotations - -from typing import MutableMapping, MutableSequence - -import proto # type: ignore - -from google.protobuf import field_mask_pb2 # type: ignore - - -__protobuf__ = proto.module( - package='google.cloud.bigquery.datapolicies.v1', - manifest={ - 'CreateDataPolicyRequest', - 'UpdateDataPolicyRequest', - 'RenameDataPolicyRequest', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'DataPolicy', - 'DataMaskingPolicy', - }, -) - - -class CreateDataPolicyRequest(proto.Message): - r"""Request message for the CreateDataPolicy method. - - Attributes: - parent (str): - Required. Resource name of the project that the data policy - will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): - Required. The data policy to create. The ``name`` field does - not need to be provided for the data policy creation. - """ - - parent: str = proto.Field( - proto.STRING, - number=1, - ) - data_policy: 'DataPolicy' = proto.Field( - proto.MESSAGE, - number=2, - message='DataPolicy', - ) - - -class UpdateDataPolicyRequest(proto.Message): - r"""Response message for the UpdateDataPolicy method. - - Attributes: - data_policy (google.cloud.bigquery_datapolicies_v1.types.DataPolicy): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` field. - Other fields are updated to the specified values based on - the field masks. - update_mask (google.protobuf.field_mask_pb2.FieldMask): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are allowed - to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are not - allowed. - """ - - data_policy: 'DataPolicy' = proto.Field( - proto.MESSAGE, - number=1, - message='DataPolicy', - ) - update_mask: field_mask_pb2.FieldMask = proto.Field( - proto.MESSAGE, - number=2, - message=field_mask_pb2.FieldMask, - ) - - -class RenameDataPolicyRequest(proto.Message): - r"""Request message for the RenameDataPolicy method. - - Attributes: - name (str): - Required. Resource name of the data policy to rename. The - format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}`` - new_data_policy_id (str): - Required. The new data policy id. - """ - - name: str = proto.Field( - proto.STRING, - number=1, - ) - new_data_policy_id: str = proto.Field( - proto.STRING, - number=2, - ) - - -class DeleteDataPolicyRequest(proto.Message): - r"""Request message for the DeleteDataPolicy method. - - Attributes: - name (str): - Required. Resource name of the data policy to delete. Format - is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - """ - - name: str = proto.Field( - proto.STRING, - number=1, - ) - - -class GetDataPolicyRequest(proto.Message): - r"""Request message for the GetDataPolicy method. - - Attributes: - name (str): - Required. Resource name of the requested data policy. Format - is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - """ - - name: str = proto.Field( - proto.STRING, - number=1, - ) - - -class ListDataPoliciesRequest(proto.Message): - r"""Request message for the ListDataPolicies method. - - Attributes: - parent (str): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - page_size (int): - The maximum number of data policies to - return. Must be a value between 1 and 1000. - If not set, defaults to 50. - page_token (str): - The ``nextPageToken`` value returned from a previous list - request, if any. If not set, defaults to an empty string. - filter (str): - Filters the data policies by policy tags that they are - associated with. Currently filter only supports - "policy\_tag" based filtering and OR based predicates. - Sample filter can be "policy\_tag: - projects/1/locations/us/taxonomies/2/policyTags/3". You may - also use wildcard such as "policy\_tag: - projects/1/locations/us/taxonomies/2*". Please note that OR - predicates cannot be used with wildcard filters. - """ - - parent: str = proto.Field( - proto.STRING, - number=1, - ) - page_size: int = proto.Field( - proto.INT32, - number=2, - ) - page_token: str = proto.Field( - proto.STRING, - number=3, - ) - filter: str = proto.Field( - proto.STRING, - number=4, - ) - - -class ListDataPoliciesResponse(proto.Message): - r"""Response message for the ListDataPolicies method. - - Attributes: - data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v1.types.DataPolicy]): - Data policies that belong to the requested - project. - next_page_token (str): - Token used to retrieve the next page of - results, or empty if there are no more results. - """ - - @property - def raw_page(self): - return self - - data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( - proto.MESSAGE, - number=1, - message='DataPolicy', - ) - next_page_token: str = proto.Field( - proto.STRING, - number=2, - ) - - -class DataPolicy(proto.Message): - r"""Represents the label-policy binding. - - .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields - - Attributes: - policy_tag (str): - Policy tag resource name, in the format of - ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. - - This field is a member of `oneof`_ ``matching_label``. - data_masking_policy (google.cloud.bigquery_datapolicies_v1.types.DataMaskingPolicy): - The data masking policy that specifies the - data masking rule to use. - - This field is a member of `oneof`_ ``policy``. - name (str): - Output only. Resource name of this data policy, in the - format of - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - data_policy_type (google.cloud.bigquery_datapolicies_v1.types.DataPolicy.DataPolicyType): - Type of data policy. - data_policy_id (str): - User-assigned (human readable) ID of the data policy that - needs to be unique within a project. Used as - {data_policy_id} in part of the resource name. - """ - class DataPolicyType(proto.Enum): - r"""A list of supported data policy types. - - Values: - DATA_POLICY_TYPE_UNSPECIFIED (0): - Default value for the data policy type. This - should not be used. - COLUMN_LEVEL_SECURITY_POLICY (3): - Used to create a data policy for column-level - security, without data masking. - DATA_MASKING_POLICY (2): - Used to create a data policy for data - masking. - """ - DATA_POLICY_TYPE_UNSPECIFIED = 0 - COLUMN_LEVEL_SECURITY_POLICY = 3 - DATA_MASKING_POLICY = 2 - - policy_tag: str = proto.Field( - proto.STRING, - number=4, - oneof='matching_label', - ) - data_masking_policy: 'DataMaskingPolicy' = proto.Field( - proto.MESSAGE, - number=5, - oneof='policy', - message='DataMaskingPolicy', - ) - name: str = proto.Field( - proto.STRING, - number=1, - ) - data_policy_type: DataPolicyType = proto.Field( - proto.ENUM, - number=2, - enum=DataPolicyType, - ) - data_policy_id: str = proto.Field( - proto.STRING, - number=3, - ) - - -class DataMaskingPolicy(proto.Message): - r"""The data masking policy that is used to specify data masking - rule. - - This message has `oneof`_ fields (mutually exclusive fields). - For each oneof, at most one member field can be set at the same time. - Setting any member of the oneof automatically clears all other - members. - - .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields - - Attributes: - predefined_expression (google.cloud.bigquery_datapolicies_v1.types.DataMaskingPolicy.PredefinedExpression): - A predefined masking expression. - - This field is a member of `oneof`_ ``masking_expression``. - routine (str): - The name of the BigQuery routine that contains the custom - masking routine, in the format of - ``projects/{project_number}/datasets/{dataset_id}/routines/{routine_id}``. - - This field is a member of `oneof`_ ``masking_expression``. - """ - class PredefinedExpression(proto.Enum): - r"""The available masking rules. Learn more here: - https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. - - Values: - PREDEFINED_EXPRESSION_UNSPECIFIED (0): - Default, unspecified predefined expression. - No masking will take place since no expression - is specified. - SHA256 (3): - Masking expression to replace data with - SHA-256 hash. - ALWAYS_NULL (5): - Masking expression to replace data with - NULLs. - DEFAULT_MASKING_VALUE (7): - Masking expression to replace data with their default - masking values. The default masking values for each type - listed as below: - - - STRING: "" - - BYTES: b'' - - INTEGER: 0 - - FLOAT: 0.0 - - NUMERIC: 0 - - BOOLEAN: FALSE - - TIMESTAMP: 1970-01-01 00:00:00 UTC - - DATE: 1970-01-01 - - TIME: 00:00:00 - - DATETIME: 1970-01-01T00:00:00 - - GEOGRAPHY: POINT(0 0) - - BIGNUMERIC: 0 - - ARRAY: [] - - STRUCT: NOT_APPLICABLE - - JSON: NULL - LAST_FOUR_CHARACTERS (9): - Masking expression shows the last four characters of text. - The masking behavior is as follows: - - - If text length > 4 characters: Replace text with XXXXX, - append last four characters of original text. - - If text length <= 4 characters: Apply SHA-256 hash. - FIRST_FOUR_CHARACTERS (10): - Masking expression shows the first four characters of text. - The masking behavior is as follows: - - - If text length > 4 characters: Replace text with XXXXX, - prepend first four characters of original text. - - If text length <= 4 characters: Apply SHA-256 hash. - EMAIL_MASK (12): - Masking expression for email addresses. The masking behavior - is as follows: - - - Syntax-valid email address: Replace username with XXXXX. - For example, cloudysanfrancisco@gmail.com becomes - XXXXX@gmail.com. - - Syntax-invalid email address: Apply SHA-256 hash. - - For more information, see `Email - mask `__. - DATE_YEAR_MASK (13): - Masking expression to only show the year of ``Date``, - ``DateTime`` and ``TimeStamp``. For example, with the year - 2076: - - - DATE : 2076-01-01 - - DATETIME : 2076-01-01T00:00:00 - - TIMESTAMP : 2076-01-01 00:00:00 UTC - - Truncation occurs according to the UTC time zone. To change - this, adjust the default time zone using the ``time_zone`` - system variable. For more information, see the System - variables reference. - """ - PREDEFINED_EXPRESSION_UNSPECIFIED = 0 - SHA256 = 3 - ALWAYS_NULL = 5 - DEFAULT_MASKING_VALUE = 7 - LAST_FOUR_CHARACTERS = 9 - FIRST_FOUR_CHARACTERS = 10 - EMAIL_MASK = 12 - DATE_YEAR_MASK = 13 - - predefined_expression: PredefinedExpression = proto.Field( - proto.ENUM, - number=1, - oneof='masking_expression', - enum=PredefinedExpression, - ) - routine: str = proto.Field( - proto.STRING, - number=3, - oneof='masking_expression', - ) - - -__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini deleted file mode 100644 index 574c5aed394b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/mypy.ini +++ /dev/null @@ -1,3 +0,0 @@ -[mypy] -python_version = 3.7 -namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py deleted file mode 100644 index 25d78ab7c0ff..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/noxfile.py +++ /dev/null @@ -1,591 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -import pathlib -import re -import shutil - -from typing import Dict, List -import warnings - -import nox - -BLACK_VERSION = "black[jupyter]==23.7.0" -ISORT_VERSION = "isort==5.11.0" - -LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] - -ALL_PYTHON = [ - "3.7", - "3.8", - "3.9", - "3.10", - "3.11", - "3.12", - "3.13", -] - -DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] - -CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() - -LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" -PACKAGE_NAME = "google-cloud-bigquery-datapolicies" - -UNIT_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "asyncmock", - "pytest", - "pytest-cov", - "pytest-asyncio", -] -UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_DEPENDENCIES: List[str] = [] -UNIT_TEST_EXTRAS: List[str] = [] -UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] -SYSTEM_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "pytest", - "google-cloud-testutils", -] -SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_EXTRAS: List[str] = [] -SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -nox.options.sessions = [ - "unit", - "system", - "cover", - "lint", - "lint_setup_py", - "blacken", - "docs", -] - -# Error if a python version is missing -nox.options.error_on_missing_interpreters = True - - -@nox.session(python=ALL_PYTHON) -def mypy(session): - """Run the type checker.""" - session.install( - "mypy", - "types-requests", - "types-protobuf", - ) - session.install(".") - session.run( - "mypy", - "-p", - "google", - ) - - -@nox.session -def update_lower_bounds(session): - """Update lower bounds in constraints.txt to match setup.py""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "update", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session -def check_lower_bounds(session): - """Check lower bounds in setup.py are reflected in constraints file""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "check", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint(session): - """Run linters. - - Returns a failure if the linters find linting errors or sufficiently - serious code quality issues. - """ - session.install("flake8", BLACK_VERSION) - session.run( - "black", - "--check", - *LINT_PATHS, - ) - - session.run("flake8", "google", "tests") - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def blacken(session): - """Run black. Format code to uniform standard.""" - session.install(BLACK_VERSION) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def format(session): - """ - Run isort to sort imports. Then run black - to format code to uniform standard. - """ - session.install(BLACK_VERSION, ISORT_VERSION) - # Use the --fss option to sort imports using strict alphabetical order. - # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections - session.run( - "isort", - "--fss", - *LINT_PATHS, - ) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint_setup_py(session): - """Verify that setup.py is valid (including RST check).""" - session.install("setuptools", "docutils", "pygments") - session.run("python", "setup.py", "check", "--restructuredtext", "--strict") - - -def install_unittest_dependencies(session, *constraints): - standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES - session.install(*standard_deps, *constraints) - - if UNIT_TEST_EXTERNAL_DEPENDENCIES: - warnings.warn( - "'unit_test_external_dependencies' is deprecated. Instead, please " - "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", - DeprecationWarning, - ) - session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_LOCAL_DEPENDENCIES: - session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_EXTRAS_BY_PYTHON: - extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif UNIT_TEST_EXTRAS: - extras = UNIT_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=ALL_PYTHON) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def unit(session, protobuf_implementation): - # Install all test dependencies, then install this package in-place. - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - install_unittest_dependencies(session, "-c", constraints_path) - - # TODO(https://github.com/googleapis/synthtool/issues/1976): - # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. - # The 'cpp' implementation requires Protobuf<4. - if protobuf_implementation == "cpp": - session.install("protobuf<4") - - # Run py.test against the unit tests. - session.run( - "py.test", - "--quiet", - f"--junitxml=unit_{session.python}_sponge_log.xml", - "--cov=google", - "--cov=tests/unit", - "--cov-append", - "--cov-config=.coveragerc", - "--cov-report=", - "--cov-fail-under=0", - os.path.join("tests", "unit"), - *session.posargs, - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -def install_systemtest_dependencies(session, *constraints): - session.install("--pre", "grpcio") - - session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: - session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_LOCAL_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTRAS_BY_PYTHON: - extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif SYSTEM_TEST_EXTRAS: - extras = SYSTEM_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) -def system(session): - """Run the system test suite.""" - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - system_test_path = os.path.join("tests", "system.py") - system_test_folder_path = os.path.join("tests", "system") - - # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. - if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": - session.skip("RUN_SYSTEM_TESTS is set to false, skipping") - # Install pyopenssl for mTLS testing. - if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": - session.install("pyopenssl") - - system_test_exists = os.path.exists(system_test_path) - system_test_folder_exists = os.path.exists(system_test_folder_path) - # Sanity check: only run tests if found. - if not system_test_exists and not system_test_folder_exists: - session.skip("System tests were not found") - - install_systemtest_dependencies(session, "-c", constraints_path) - - # Run py.test against the system tests. - if system_test_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_path, - *session.posargs, - ) - if system_test_folder_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_folder_path, - *session.posargs, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def cover(session): - """Run the final coverage report. - - This outputs the coverage report aggregating coverage from the unit - test runs (not system test runs), and then erases coverage data. - """ - session.install("coverage", "pytest-cov") - session.run("coverage", "report", "--show-missing", "--fail-under=100") - - session.run("coverage", "erase") - - -@nox.session(python="3.10") -def docs(session): - """Build the docs for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "sphinx==4.5.0", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-W", # warnings as errors - "-T", # show full traceback on exception - "-N", # no colors - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python="3.10") -def docfx(session): - """Build the docfx yaml files for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "gcp-sphinx-docfx-yaml", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-T", # show full traceback on exception - "-N", # no colors - "-D", - ( - "extensions=sphinx.ext.autodoc," - "sphinx.ext.autosummary," - "docfx_yaml.extension," - "sphinx.ext.intersphinx," - "sphinx.ext.coverage," - "sphinx.ext.napoleon," - "sphinx.ext.todo," - "sphinx.ext.viewcode," - "recommonmark" - ), - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def prerelease_deps(session, protobuf_implementation): - """ - Run all tests with pre-release versions of dependencies installed - rather than the standard non pre-release versions. - Pre-release versions can be installed using - `pip install --pre `. - """ - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # Note: If a dependency is added to the `prerel_deps` list, - # the `core_dependencies_from_source` list in the `core_deps_from_source` - # nox session should also be updated. - prerel_deps = [ - "googleapis-common-protos", - "google-api-core", - "google-auth", - "grpc-google-iam-v1", - "grpcio", - "grpcio-status", - "protobuf", - "proto-plus", - ] - - for dep in prerel_deps: - session.install("--pre", "--no-deps", "--ignore-installed", dep) - # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` - # to the dictionary below once this bug is fixed. - # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add - # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below - # once this bug is fixed. - package_namespaces = { - "google-api-core": "google.api_core", - "google-auth": "google.auth", - "grpcio": "grpc", - "protobuf": "google.protobuf", - "proto-plus": "proto", - } - - version_namespace = package_namespaces.get(dep) - - print(f"Installed {dep}") - if version_namespace: - session.run( - "python", - "-c", - f"import {version_namespace}; print({version_namespace}.__version__)", - ) - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb"], -) -def core_deps_from_source(session, protobuf_implementation): - """Run all tests with core dependencies installed from source - rather than pulling the dependencies from PyPI. - """ - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and - # `grpcio-status` should be added to the list below so that they are installed from source, - # rather than PyPI. - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be - # added to the list below so that it is installed from source, rather than PyPI - # Note: If a dependency is added to the `core_dependencies_from_source` list, - # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. - core_dependencies_from_source = [ - "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", - "google-api-core @ git+https://github.com/googleapis/python-api-core.git", - "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", - "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", - "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", - ] - - for dep in core_dependencies_from_source: - session.install(dep, "--no-deps", "--ignore-installed") - print(f"Installed {dep}") - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py deleted file mode 100644 index 3435852d6d72..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py +++ /dev/null @@ -1,57 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for CreateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = await client.create_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py deleted file mode 100644 index 416215eaf8a0..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py +++ /dev/null @@ -1,57 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for CreateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = client.create_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py deleted file mode 100644 index bd938f6cd0a4..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for DeleteDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - await client.delete_data_policy(request=request) - - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py deleted file mode 100644 index 88dde1367751..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for DeleteDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - client.delete_data_policy(request=request) - - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py deleted file mode 100644 index 609b7bb8dac1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py +++ /dev/null @@ -1,52 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = await client.get_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py deleted file mode 100644 index f3cf35a06ba8..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py +++ /dev/null @@ -1,52 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = client.get_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py deleted file mode 100644 index 1006832c420e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.get_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py deleted file mode 100644 index 026f90ae6db9..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.get_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py deleted file mode 100644 index 865a7a51b5bb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for ListDataPolicies -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - async for response in page_result: - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py deleted file mode 100644 index 1df6eea1eee2..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for ListDataPolicies -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - for response in page_result: - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py deleted file mode 100644 index f01f13869a60..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for RenameDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_rename_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.RenameDataPolicyRequest( - name="name_value", - new_data_policy_id="new_data_policy_id_value", - ) - - # Make the request - response = await client.rename_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py deleted file mode 100644 index 076e44ed782d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for RenameDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_rename_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1.RenameDataPolicyRequest( - name="name_value", - new_data_policy_id="new_data_policy_id_value", - ) - - # Make the request - response = client.rename_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py deleted file mode 100644 index 432013f9b7ba..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for SetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.set_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py deleted file mode 100644 index 5c8e19df921c..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for SetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.set_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py deleted file mode 100644 index fb2ec8a593bb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for TestIamPermissions -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = await client.test_iam_permissions(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py deleted file mode 100644 index 55228548e624..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for TestIamPermissions -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = client.test_iam_permissions(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py deleted file mode 100644 index 9699aef81753..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py +++ /dev/null @@ -1,56 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for UpdateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -async def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = await client.update_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py deleted file mode 100644 index 25671a027b8d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py +++ /dev/null @@ -1,56 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for UpdateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1 - - -def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DATE_YEAR_MASK" - - request = bigquery_datapolicies_v1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = client.update_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json deleted file mode 100644 index 8f3adb520dfb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json +++ /dev/null @@ -1,1458 +0,0 @@ -{ - "clientLibrary": { - "apis": [ - { - "id": "google.cloud.bigquery.datapolicies.v1", - "version": "v1" - } - ], - "language": "PYTHON", - "name": "google-cloud-bigquery-datapolicies", - "version": "0.1.0" - }, - "snippets": [ - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.create_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.CreateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "CreateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "create_data_policy" - }, - "description": "Sample for CreateDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_async", - "segments": [ - { - "end": 56, - "start": 27, - "type": "FULL" - }, - { - "end": 56, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 50, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 53, - "start": 51, - "type": "REQUEST_EXECUTION" - }, - { - "end": 57, - "start": 54, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.create_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.CreateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "CreateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.CreateDataPolicyRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "create_data_policy" - }, - "description": "Sample for CreateDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_CreateDataPolicy_sync", - "segments": [ - { - "end": 56, - "start": 27, - "type": "FULL" - }, - { - "end": 56, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 50, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 53, - "start": 51, - "type": "REQUEST_EXECUTION" - }, - { - "end": 57, - "start": 54, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_create_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.delete_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.DeleteDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "DeleteDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "shortName": "delete_data_policy" - }, - "description": "Sample for DeleteDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_async", - "segments": [ - { - "end": 49, - "start": 27, - "type": "FULL" - }, - { - "end": 49, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.delete_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.DeleteDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "DeleteDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.DeleteDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "shortName": "delete_data_policy" - }, - "description": "Sample for DeleteDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_DeleteDataPolicy_sync", - "segments": [ - { - "end": 49, - "start": 27, - "type": "FULL" - }, - { - "end": 49, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_delete_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.get_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "get_data_policy" - }, - "description": "Sample for GetDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_async", - "segments": [ - { - "end": 51, - "start": 27, - "type": "FULL" - }, - { - "end": 51, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 52, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.get_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.GetDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "get_data_policy" - }, - "description": "Sample for GetDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetDataPolicy_sync", - "segments": [ - { - "end": 51, - "start": 27, - "type": "FULL" - }, - { - "end": 51, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 52, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.get_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "get_iam_policy" - }, - "description": "Sample for GetIamPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.get_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.GetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "get_iam_policy" - }, - "description": "Sample for GetIamPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_GetIamPolicy_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_get_iam_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.list_data_policies", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.ListDataPolicies", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "ListDataPolicies" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", - "shortName": "list_data_policies" - }, - "description": "Sample for ListDataPolicies", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.list_data_policies", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.ListDataPolicies", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "ListDataPolicies" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.ListDataPoliciesRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.services.data_policy_service.pagers.ListDataPoliciesPager", - "shortName": "list_data_policies" - }, - "description": "Sample for ListDataPolicies", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_ListDataPolicies_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_list_data_policies_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.rename_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.RenameDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "RenameDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "new_data_policy_id", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "rename_data_policy" - }, - "description": "Sample for RenameDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.rename_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.RenameDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "RenameDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.RenameDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "new_data_policy_id", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "rename_data_policy" - }, - "description": "Sample for RenameDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_RenameDataPolicy_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_rename_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.set_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.SetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "SetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "set_iam_policy" - }, - "description": "Sample for SetIamPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.set_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.SetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "SetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "set_iam_policy" - }, - "description": "Sample for SetIamPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_SetIamPolicy_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_set_iam_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.test_iam_permissions", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.TestIamPermissions", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "TestIamPermissions" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", - "shortName": "test_iam_permissions" - }, - "description": "Sample for TestIamPermissions", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_async", - "segments": [ - { - "end": 53, - "start": 27, - "type": "FULL" - }, - { - "end": 53, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 47, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 50, - "start": 48, - "type": "REQUEST_EXECUTION" - }, - { - "end": 54, - "start": 51, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.test_iam_permissions", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.TestIamPermissions", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "TestIamPermissions" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", - "shortName": "test_iam_permissions" - }, - "description": "Sample for TestIamPermissions", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_TestIamPermissions_sync", - "segments": [ - { - "end": 53, - "start": 27, - "type": "FULL" - }, - { - "end": 53, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 47, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 50, - "start": 48, - "type": "REQUEST_EXECUTION" - }, - { - "end": 54, - "start": 51, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_test_iam_permissions_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceAsyncClient.update_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.UpdateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "UpdateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" - }, - { - "name": "update_mask", - "type": "google.protobuf.field_mask_pb2.FieldMask" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "update_data_policy" - }, - "description": "Sample for UpdateDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_async", - "segments": [ - { - "end": 55, - "start": 27, - "type": "FULL" - }, - { - "end": 55, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 49, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 52, - "start": 50, - "type": "REQUEST_EXECUTION" - }, - { - "end": 56, - "start": 53, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1.DataPolicyServiceClient.update_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService.UpdateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "UpdateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1.types.UpdateDataPolicyRequest" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy" - }, - { - "name": "update_mask", - "type": "google.protobuf.field_mask_pb2.FieldMask" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1.types.DataPolicy", - "shortName": "update_data_policy" - }, - "description": "Sample for UpdateDataPolicy", - "file": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1_generated_DataPolicyService_UpdateDataPolicy_sync", - "segments": [ - { - "end": 55, - "start": 27, - "type": "FULL" - }, - { - "end": 55, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 49, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 52, - "start": 50, - "type": "REQUEST_EXECUTION" - }, - { - "end": 56, - "start": 53, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1_generated_data_policy_service_update_data_policy_sync.py" - } - ] -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py deleted file mode 100644 index 4d2cb9622b50..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/scripts/fixup_bigquery_datapolicies_v1_keywords.py +++ /dev/null @@ -1,184 +0,0 @@ -#! /usr/bin/env python3 -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import argparse -import os -import libcst as cst -import pathlib -import sys -from typing import (Any, Callable, Dict, List, Sequence, Tuple) - - -def partition( - predicate: Callable[[Any], bool], - iterator: Sequence[Any] -) -> Tuple[List[Any], List[Any]]: - """A stable, out-of-place partition.""" - results = ([], []) - - for i in iterator: - results[int(predicate(i))].append(i) - - # Returns trueList, falseList - return results[1], results[0] - - -class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): - CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') - METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { - 'create_data_policy': ('parent', 'data_policy', ), - 'delete_data_policy': ('name', ), - 'get_data_policy': ('name', ), - 'get_iam_policy': ('resource', 'options', ), - 'list_data_policies': ('parent', 'page_size', 'page_token', 'filter', ), - 'rename_data_policy': ('name', 'new_data_policy_id', ), - 'set_iam_policy': ('resource', 'policy', 'update_mask', ), - 'test_iam_permissions': ('resource', 'permissions', ), - 'update_data_policy': ('data_policy', 'update_mask', ), - } - - def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: - try: - key = original.func.attr.value - kword_params = self.METHOD_TO_PARAMS[key] - except (AttributeError, KeyError): - # Either not a method from the API or too convoluted to be sure. - return updated - - # If the existing code is valid, keyword args come after positional args. - # Therefore, all positional args must map to the first parameters. - args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) - if any(k.keyword.value == "request" for k in kwargs): - # We've already fixed this file, don't fix it again. - return updated - - kwargs, ctrl_kwargs = partition( - lambda a: a.keyword.value not in self.CTRL_PARAMS, - kwargs - ) - - args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] - ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) - for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) - - request_arg = cst.Arg( - value=cst.Dict([ - cst.DictElement( - cst.SimpleString("'{}'".format(name)), -cst.Element(value=arg.value) - ) - # Note: the args + kwargs looks silly, but keep in mind that - # the control parameters had to be stripped out, and that - # those could have been passed positionally or by keyword. - for name, arg in zip(kword_params, args + kwargs)]), - keyword=cst.Name("request") - ) - - return updated.with_changes( - args=[request_arg] + ctrl_kwargs - ) - - -def fix_files( - in_dir: pathlib.Path, - out_dir: pathlib.Path, - *, - transformer=bigquery_datapoliciesCallTransformer(), -): - """Duplicate the input dir to the output dir, fixing file method calls. - - Preconditions: - * in_dir is a real directory - * out_dir is a real, empty directory - """ - pyfile_gen = ( - pathlib.Path(os.path.join(root, f)) - for root, _, files in os.walk(in_dir) - for f in files if os.path.splitext(f)[1] == ".py" - ) - - for fpath in pyfile_gen: - with open(fpath, 'r') as f: - src = f.read() - - # Parse the code and insert method call fixes. - tree = cst.parse_module(src) - updated = tree.visit(transformer) - - # Create the path and directory structure for the new file. - updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) - updated_path.parent.mkdir(parents=True, exist_ok=True) - - # Generate the updated source file at the corresponding path. - with open(updated_path, 'w') as f: - f.write(updated.code) - - -if __name__ == '__main__': - parser = argparse.ArgumentParser( - description="""Fix up source that uses the bigquery_datapolicies client library. - -The existing sources are NOT overwritten but are copied to output_dir with changes made. - -Note: This tool operates at a best-effort level at converting positional - parameters in client method calls to keyword based parameters. - Cases where it WILL FAIL include - A) * or ** expansion in a method call. - B) Calls via function or method alias (includes free function calls) - C) Indirect or dispatched calls (e.g. the method is looked up dynamically) - - These all constitute false negatives. The tool will also detect false - positives when an API method shares a name with another method. -""") - parser.add_argument( - '-d', - '--input-directory', - required=True, - dest='input_dir', - help='the input directory to walk for python files to fix up', - ) - parser.add_argument( - '-o', - '--output-directory', - required=True, - dest='output_dir', - help='the directory to output files fixed via un-flattening', - ) - args = parser.parse_args() - input_dir = pathlib.Path(args.input_dir) - output_dir = pathlib.Path(args.output_dir) - if not input_dir.is_dir(): - print( - f"input directory '{input_dir}' does not exist or is not a directory", - file=sys.stderr, - ) - sys.exit(-1) - - if not output_dir.is_dir(): - print( - f"output directory '{output_dir}' does not exist or is not a directory", - file=sys.stderr, - ) - sys.exit(-1) - - if os.listdir(output_dir): - print( - f"output directory '{output_dir}' is not empty", - file=sys.stderr, - ) - sys.exit(-1) - - fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py deleted file mode 100644 index 40366686e783..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/setup.py +++ /dev/null @@ -1,99 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import io -import os -import re - -import setuptools # type: ignore - -package_root = os.path.abspath(os.path.dirname(__file__)) - -name = 'google-cloud-bigquery-datapolicies' - - -description = "Google Cloud Bigquery Datapolicies API client library" - -version = None - -with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: - version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) - assert (len(version_candidates) == 1) - version = version_candidates[0] - -if version[0] == "0": - release_status = "Development Status :: 4 - Beta" -else: - release_status = "Development Status :: 5 - Production/Stable" - -dependencies = [ - "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", - # Exclude incompatible versions of `google-auth` - # See https://github.com/googleapis/google-cloud-python/issues/12364 - "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", - "proto-plus >= 1.22.3, <2.0.0", - "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", - "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", - "grpc-google-iam-v1 >= 0.14.0, <1.0.0", -] -extras = { -} -url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" - -package_root = os.path.abspath(os.path.dirname(__file__)) - -readme_filename = os.path.join(package_root, "README.rst") -with io.open(readme_filename, encoding="utf-8") as readme_file: - readme = readme_file.read() - -packages = [ - package - for package in setuptools.find_namespace_packages() - if package.startswith("google") -] - -setuptools.setup( - name=name, - version=version, - description=description, - long_description=readme, - author="Google LLC", - author_email="googleapis-packages@google.com", - license="Apache 2.0", - url=url, - classifiers=[ - release_status, - "Intended Audience :: Developers", - "License :: OSI Approved :: Apache Software License", - "Programming Language :: Python", - "Programming Language :: Python :: 3", - "Programming Language :: Python :: 3.7", - "Programming Language :: Python :: 3.8", - "Programming Language :: Python :: 3.9", - "Programming Language :: Python :: 3.10", - "Programming Language :: Python :: 3.11", - "Programming Language :: Python :: 3.12", - "Programming Language :: Python :: 3.13", - "Operating System :: OS Independent", - "Topic :: Internet", - ], - platforms="Posix; MacOS X; Windows", - packages=packages, - python_requires=">=3.7", - install_requires=dependencies, - extras_require=extras, - include_package_data=True, - zip_safe=False, -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.10.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.11.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.12.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt deleted file mode 100644 index 2010e549cceb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.13.txt +++ /dev/null @@ -1,12 +0,0 @@ -# We use the constraints file for the latest Python version -# (currently this file) to check that the latest -# major versions of dependencies are supported in setup.py. -# List all library dependencies and extras in this file. -# Require the latest major version be installed for each dependency. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo>=1 -google-api-core>=2 -google-auth>=2 -proto-plus>=1 -protobuf>=6 -grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt deleted file mode 100644 index 56affbd9bd75..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.7.txt +++ /dev/null @@ -1,11 +0,0 @@ -# This constraints file is used to check that lower bounds -# are correct in setup.py -# List all library dependencies and extras in this file. -# Pin the version to the lower bound. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo==1.14.0 -google-api-core==1.34.1 -google-auth==2.14.1 -proto-plus==1.22.3 -protobuf==3.20.2 -grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.8.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/testing/constraints-3.9.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py deleted file mode 100644 index b39b50d578a9..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/tests/unit/gapic/bigquery_datapolicies_v1/test_data_policy_service.py +++ /dev/null @@ -1,7526 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -# try/except added for compatibility with python < 3.8 -try: - from unittest import mock - from unittest.mock import AsyncMock # pragma: NO COVER -except ImportError: # pragma: NO COVER - import mock - -import grpc -from grpc.experimental import aio -from collections.abc import Iterable, AsyncIterable -from google.protobuf import json_format -import json -import math -import pytest -from google.api_core import api_core_version -from proto.marshal.rules.dates import DurationRule, TimestampRule -from proto.marshal.rules import wrappers -from requests import Response -from requests import Request, PreparedRequest -from requests.sessions import Session -from google.protobuf import json_format - -try: - from google.auth.aio import credentials as ga_credentials_async - HAS_GOOGLE_AUTH_AIO = True -except ImportError: # pragma: NO COVER - HAS_GOOGLE_AUTH_AIO = False - -from google.api_core import client_options -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers -from google.api_core import grpc_helpers_async -from google.api_core import path_template -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials -from google.auth.exceptions import MutualTLSChannelError -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import DataPolicyServiceAsyncClient -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1.services.data_policy_service import transports -from google.cloud.bigquery_datapolicies_v1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import options_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.oauth2 import service_account -from google.protobuf import field_mask_pb2 # type: ignore -from google.type import expr_pb2 # type: ignore -import google.auth - - - -CRED_INFO_JSON = { - "credential_source": "/path/to/file", - "credential_type": "service account credentials", - "principal": "service-account@example.com", -} -CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) - - -async def mock_async_gen(data, chunk_size=1): - for i in range(0, len(data)): # pragma: NO COVER - chunk = data[i : i + chunk_size] - yield chunk.encode("utf-8") - -def client_cert_source_callback(): - return b"cert bytes", b"key bytes" - -# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. -# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. -def async_anonymous_credentials(): - if HAS_GOOGLE_AUTH_AIO: - return ga_credentials_async.AnonymousCredentials() - return ga_credentials.AnonymousCredentials() - -# If default endpoint is localhost, then default mtls endpoint will be the same. -# This method modifies the default endpoint so the client can produce a different -# mtls endpoint for endpoint testing purposes. -def modify_default_endpoint(client): - return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT - -# If default endpoint template is localhost, then default mtls endpoint will be the same. -# This method modifies the default endpoint template so the client can produce a different -# mtls endpoint for endpoint testing purposes. -def modify_default_endpoint_template(client): - return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE - - -def test__get_default_mtls_endpoint(): - api_endpoint = "example.googleapis.com" - api_mtls_endpoint = "example.mtls.googleapis.com" - sandbox_endpoint = "example.sandbox.googleapis.com" - sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" - non_googleapi = "api.example.com" - - assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi - -def test__read_environment_variables(): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") - -def test__get_client_cert_source(): - mock_provided_cert_source = mock.Mock() - mock_default_cert_source = mock.Mock() - - assert DataPolicyServiceClient._get_client_cert_source(None, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source - - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): - assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source - -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test__get_api_endpoint(): - api_override = "foo.com" - mock_client_cert_source = mock.Mock() - default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) - mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) - - assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint - - with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") - assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." - - -def test__get_universe_domain(): - client_universe_domain = "foo.com" - universe_domain_env = "bar.com" - - assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain - assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env - assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE - - with pytest.raises(ValueError) as excinfo: - DataPolicyServiceClient._get_universe_domain("", None) - assert str(excinfo.value) == "Universe Domain cannot be an empty string." - -@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ - (401, CRED_INFO_JSON, True), - (403, CRED_INFO_JSON, True), - (404, CRED_INFO_JSON, True), - (500, CRED_INFO_JSON, False), - (401, None, False), - (403, None, False), - (404, None, False), - (500, None, False) -]) -def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): - cred = mock.Mock(["get_cred_info"]) - cred.get_cred_info = mock.Mock(return_value=cred_info_json) - client = DataPolicyServiceClient(credentials=cred) - client._transport._credentials = cred - - error = core_exceptions.GoogleAPICallError("message", details=["foo"]) - error.code = error_code - - client._add_cred_info_for_auth_errors(error) - if show_cred_info: - assert error.details == ["foo", CRED_INFO_STRING] - else: - assert error.details == ["foo"] - -@pytest.mark.parametrize("error_code", [401,403,404,500]) -def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): - cred = mock.Mock([]) - assert not hasattr(cred, "get_cred_info") - client = DataPolicyServiceClient(credentials=cred) - client._transport._credentials = cred - - error = core_exceptions.GoogleAPICallError("message", details=[]) - error.code = error_code - - client._add_cred_info_for_auth_errors(error) - assert error.details == [] - -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_info(client_class, transport_name): - creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: - factory.return_value = creds - info = {"valid": True} - client = client_class.from_service_account_info(info, transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' - ) - - -@pytest.mark.parametrize("transport_class,transport_name", [ - (transports.DataPolicyServiceGrpcTransport, "grpc"), - (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: - creds = service_account.Credentials(None, None, None) - transport = transport_class(credentials=creds, always_use_jwt_access=True) - use_jwt.assert_called_once_with(True) - - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: - creds = service_account.Credentials(None, None, None) - transport = transport_class(credentials=creds, always_use_jwt_access=False) - use_jwt.assert_not_called() - - -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_file(client_class, transport_name): - creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: - factory.return_value = creds - client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' - ) - - -def test_data_policy_service_client_get_transport_class(): - transport = DataPolicyServiceClient.get_transport_class() - available_transports = [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceRestTransport, - ] - assert transport in available_transports - - transport = DataPolicyServiceClient.get_transport_class("grpc") - assert transport == transports.DataPolicyServiceGrpcTransport - - -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): - # Check that if channel is provided we won't create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials() - ) - client = client_class(transport=transport) - gtc.assert_not_called() - - # Check that if channel is provided via str we will create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - client = client_class(transport=transport_name) - gtc.assert_called() - - # Check the case api_endpoint is provided. - options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name, client_options=options) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host="squid.clam.whelk", - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is - # "never". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is - # "always". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client.DEFAULT_MTLS_ENDPOINT, - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has - # unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - - # Check the case quota_project_id is provided - options = client_options.ClientOptions(quota_project_id="octopus") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id="octopus", - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - # Check the case api_endpoint is provided - options = client_options.ClientOptions(api_audience="https://language.googleapis.com") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience="https://language.googleapis.com" - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) -def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): - # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default - # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. - - # Check the case client_cert_source is provided. Whether client cert is used depends on - # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - - if use_client_cert_env == "false": - expected_client_cert_source = None - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) - else: - expected_client_cert_source = client_cert_source_callback - expected_host = client.DEFAULT_MTLS_ENDPOINT - - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=expected_host, - scopes=None, - client_cert_source_for_mtls=expected_client_cert_source, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case ADC client cert is provided. Whether client cert is used depends on - # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): - if use_client_cert_env == "false": - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) - expected_client_cert_source = None - else: - expected_host = client.DEFAULT_MTLS_ENDPOINT - expected_client_cert_source = client_cert_source_callback - - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=expected_host, - scopes=None, - client_cert_source_for_mtls=expected_client_cert_source, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case client_cert_source and ADC client cert are not provided. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): - mock_client_cert_source = mock.Mock() - - # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) - assert api_endpoint == mock_api_endpoint - assert cert_source == mock_client_cert_source - - # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - mock_client_cert_source = mock.Mock() - mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) - assert api_endpoint == mock_api_endpoint - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - assert cert_source == mock_client_cert_source - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has - # unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - client_class.get_mtls_endpoint_and_cert_source() - - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - client_class.get_mtls_endpoint_and_cert_source() - - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_api_endpoint(client_class): - mock_client_cert_source = client_cert_source_callback - api_override = "foo.com" - default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) - mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) - - # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", - # use ClientOptions.api_endpoint as the api endpoint regardless. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == api_override - - # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == default_endpoint - - # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", - # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - client = client_class(credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - - # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), - # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, - # and ClientOptions.universe_domain="bar.com", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. - options = client_options.ClientOptions() - universe_exists = hasattr(options, "universe_domain") - if universe_exists: - options = client_options.ClientOptions(universe_domain=mock_universe) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - else: - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) - assert client.universe_domain == (mock_universe if universe_exists else default_universe) - - # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. - options = client_options.ClientOptions() - if hasattr(options, "universe_domain"): - delattr(options, "universe_domain") - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == default_endpoint - - -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): - # Check the case scopes are provided. - options = client_options.ClientOptions( - scopes=["1", "2"], - ) - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=["1", "2"], - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), -]) -def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): - # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) - - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - -def test_data_policy_service_client_client_options_from_dict(): - with mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: - grpc_transport.return_value = None - client = DataPolicyServiceClient( - client_options={'api_endpoint': 'squid.clam.whelk'} - ) - grpc_transport.assert_called_once_with( - credentials=None, - credentials_file=None, - host="squid.clam.whelk", - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), -]) -def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): - # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) - - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # test that the credentials from file are saved and used as the credentials. - with mock.patch.object( - google.auth, "load_credentials_from_file", autospec=True - ) as load_creds, mock.patch.object( - google.auth, "default", autospec=True - ) as adc, mock.patch.object( - grpc_helpers, "create_channel" - ) as create_channel: - creds = ga_credentials.AnonymousCredentials() - file_creds = ga_credentials.AnonymousCredentials() - load_creds.return_value = (file_creds, None) - adc.return_value = (creds, None) - client = client_class(client_options=options, transport=transport_name) - create_channel.assert_called_with( - "bigquerydatapolicy.googleapis.com:443", - credentials=file_creds, - credentials_file=None, - quota_project_id=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - scopes=None, - default_host="bigquerydatapolicy.googleapis.com", - ssl_credentials=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) -def test_create_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.CreateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_create_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.CreateDataPolicyRequest( - parent='parent_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.create_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.CreateDataPolicyRequest( - parent='parent_value', - ) - -def test_create_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc - request = {} - client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.create_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc - - request = {} - await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.create_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.CreateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_create_data_policy_async_from_dict(): - await test_create_data_policy_async(request_type=dict) - -def test_create_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.CreateDataPolicyRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_create_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.CreateDataPolicyRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -def test_create_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - - -def test_create_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.create_data_policy( - datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - -@pytest.mark.asyncio -async def test_create_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - -@pytest.mark.asyncio -async def test_create_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.create_data_policy( - datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) -def test_update_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.UpdateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_update_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.UpdateDataPolicyRequest( - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.update_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.UpdateDataPolicyRequest( - ) - -def test_update_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc - request = {} - client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.update_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc - - request = {} - await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.update_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.UpdateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_update_data_policy_async_from_dict(): - await test_update_data_policy_async(request_type=dict) - -def test_update_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.UpdateDataPolicyRequest() - - request.data_policy.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_update_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.UpdateDataPolicyRequest() - - request.data_policy.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] - - -def test_update_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.update_data_policy( - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) - assert arg == mock_val - - -def test_update_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.update_data_policy( - datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - -@pytest.mark.asyncio -async def test_update_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.update_data_policy( - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) - assert arg == mock_val - -@pytest.mark.asyncio -async def test_update_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.update_data_policy( - datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.RenameDataPolicyRequest, - dict, -]) -def test_rename_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.RenameDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_rename_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.RenameDataPolicyRequest( - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.rename_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.RenameDataPolicyRequest( - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - -def test_rename_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.rename_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.rename_data_policy] = mock_rpc - request = {} - client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.rename_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_rename_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.rename_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.rename_data_policy] = mock_rpc - - request = {} - await client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.rename_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_rename_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RenameDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.RenameDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_rename_data_policy_async_from_dict(): - await test_rename_data_policy_async(request_type=dict) - -def test_rename_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.RenameDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_rename_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.RenameDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -def test_rename_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.rename_data_policy( - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - arg = args[0].new_data_policy_id - mock_val = 'new_data_policy_id_value' - assert arg == mock_val - - -def test_rename_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.rename_data_policy( - datapolicy.RenameDataPolicyRequest(), - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - -@pytest.mark.asyncio -async def test_rename_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.rename_data_policy( - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - arg = args[0].new_data_policy_id - mock_val = 'new_data_policy_id_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_rename_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.rename_data_policy( - datapolicy.RenameDataPolicyRequest(), - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) -def test_delete_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - response = client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.DeleteDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert response is None - - -def test_delete_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.DeleteDataPolicyRequest( - name='name_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.delete_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.DeleteDataPolicyRequest( - name='name_value', - ) - -def test_delete_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc - request = {} - client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.delete_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc - - request = {} - await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.delete_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - response = await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.DeleteDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert response is None - - -@pytest.mark.asyncio -async def test_delete_data_policy_async_from_dict(): - await test_delete_data_policy_async(request_type=dict) - -def test_delete_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.DeleteDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = None - client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_delete_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.DeleteDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -def test_delete_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.delete_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - - -def test_delete_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.delete_data_policy( - datapolicy.DeleteDataPolicyRequest(), - name='name_value', - ) - -@pytest.mark.asyncio -async def test_delete_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.delete_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_delete_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.delete_data_policy( - datapolicy.DeleteDataPolicyRequest(), - name='name_value', - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) -def test_get_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.GetDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_get_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.GetDataPolicyRequest( - name='name_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.get_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.GetDataPolicyRequest( - name='name_value', - ) - -def test_get_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc - request = {} - client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc - - request = {} - await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.get_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.GetDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_get_data_policy_async_from_dict(): - await test_get_data_policy_async(request_type=dict) - -def test_get_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.GetDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_get_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.GetDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -def test_get_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.get_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - - -def test_get_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.get_data_policy( - datapolicy.GetDataPolicyRequest(), - name='name_value', - ) - -@pytest.mark.asyncio -async def test_get_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.get_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_get_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.get_data_policy( - datapolicy.GetDataPolicyRequest(), - name='name_value', - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) -def test_list_data_policies(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - ) - response = client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.ListDataPoliciesRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' - - -def test_list_data_policies_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - filter='filter_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.list_data_policies(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - filter='filter_value', - ) - -def test_list_data_policies_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc - request = {} - client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.list_data_policies(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc - - request = {} - await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.list_data_policies(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) - response = await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.ListDataPoliciesRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, pagers.ListDataPoliciesAsyncPager) - assert response.next_page_token == 'next_page_token_value' - - -@pytest.mark.asyncio -async def test_list_data_policies_async_from_dict(): - await test_list_data_policies_async(request_type=dict) - -def test_list_data_policies_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.ListDataPoliciesRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = datapolicy.ListDataPoliciesResponse() - client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_list_data_policies_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.ListDataPoliciesRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) - await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -def test_list_data_policies_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.list_data_policies( - parent='parent_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - - -def test_list_data_policies_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.list_data_policies( - datapolicy.ListDataPoliciesRequest(), - parent='parent_value', - ) - -@pytest.mark.asyncio -async def test_list_data_policies_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.list_data_policies( - parent='parent_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_list_data_policies_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.list_data_policies( - datapolicy.ListDataPoliciesRequest(), - parent='parent_value', - ) - - -def test_list_data_policies_pager(transport_name: str = "grpc"): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport_name, - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - - expected_metadata = () - retry = retries.Retry() - timeout = 5 - expected_metadata = tuple(expected_metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ('parent', ''), - )), - ) - pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) - - assert pager._metadata == expected_metadata - assert pager._retry == retry - assert pager._timeout == timeout - - results = list(pager) - assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) -def test_list_data_policies_pages(transport_name: str = "grpc"): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport_name, - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - pages = list(client.list_data_policies(request={}).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): - assert page_.raw_page.next_page_token == token - -@pytest.mark.asyncio -async def test_list_data_policies_async_pager(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - async_pager = await client.list_data_policies(request={},) - assert async_pager.next_page_token == 'abc' - responses = [] - async for response in async_pager: # pragma: no branch - responses.append(response) - - assert len(responses) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in responses) - - -@pytest.mark.asyncio -async def test_list_data_policies_async_pages(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - pages = [] - # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` - # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 - async for page_ in ( # pragma: no branch - await client.list_data_policies(request={}) - ).pages: - pages.append(page_) - for page_, token in zip(pages, ['abc','def','ghi', '']): - assert page_.raw_page.next_page_token == token - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) -def test_get_iam_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - response = client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.GetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -def test_get_iam_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.get_iam_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', - ) - -def test_get_iam_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc - request = {} - client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc - - request = {} - await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.get_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - response = await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.GetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.asyncio -async def test_get_iam_policy_async_from_dict(): - await test_get_iam_policy_async(request_type=dict) - -def test_get_iam_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.GetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_get_iam_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.GetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) - await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_get_iam_policy_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy() - response = client.get_iam_policy(request={ - 'resource': 'resource_value', - 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), - } - ) - call.assert_called() - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) -def test_set_iam_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - response = client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.SetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -def test_set_iam_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.set_iam_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', - ) - -def test_set_iam_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.set_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc - request = {} - client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.set_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc - - request = {} - await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.set_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - response = await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.SetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.asyncio -async def test_set_iam_policy_async_from_dict(): - await test_set_iam_policy_async(request_type=dict) - -def test_set_iam_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.SetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_set_iam_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.SetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) - await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_set_iam_policy_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy() - response = client.set_iam_policy(request={ - 'resource': 'resource_value', - 'policy': policy_pb2.Policy(version=774), - 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), - } - ) - call.assert_called() - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) -def test_test_iam_permissions(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - ) - response = client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.TestIamPermissionsRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] - - -def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.test_iam_permissions(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', - ) - -def test_test_iam_permissions_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc - request = {} - client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.test_iam_permissions(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc - - request = {} - await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.test_iam_permissions(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) - response = await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.TestIamPermissionsRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] - - -@pytest.mark.asyncio -async def test_test_iam_permissions_async_from_dict(): - await test_test_iam_permissions_async(request_type=dict) - -def test_test_iam_permissions_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.TestIamPermissionsRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_test_iam_permissions_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.TestIamPermissionsRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) - await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_test_iam_permissions_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - response = client.test_iam_permissions(request={ - 'resource': 'resource_value', - 'permissions': ['permissions_value'], - } - ) - call.assert_called() - - -def test_create_data_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc - - request = {} - client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.create_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["parent"] = "" - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["parent"] = 'parent_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.create_data_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_create_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.create_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("parent", "dataPolicy", ))) - - -def test_create_data_policy_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - - # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} - - # get truthy value for each flattened field - mock_args = dict( - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.create_data_policy(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) - - -def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.create_data_policy( - datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - -def test_update_data_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc - - request = {} - client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.update_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) - # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("update_mask", )) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "patch", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.update_data_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_update_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.update_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(("updateMask", )) & set(("dataPolicy", ))) - - -def test_update_data_policy_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - - # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} - - # get truthy value for each flattened field - mock_args = dict( - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.update_data_policy(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) - - -def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.update_data_policy( - datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - -def test_rename_data_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.rename_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.rename_data_policy] = mock_rpc - - request = {} - client.rename_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.rename_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_rename_data_policy_rest_required_fields(request_type=datapolicy.RenameDataPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["name"] = "" - request_init["new_data_policy_id"] = "" - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).rename_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["name"] = 'name_value' - jsonified_request["newDataPolicyId"] = 'new_data_policy_id_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).rename_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' - assert "newDataPolicyId" in jsonified_request - assert jsonified_request["newDataPolicyId"] == 'new_data_policy_id_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.rename_data_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_rename_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.rename_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", "newDataPolicyId", ))) - - -def test_rename_data_policy_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - - # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - - # get truthy value for each flattened field - mock_args = dict( - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.rename_data_policy(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}:rename" % client.transport._host, args[1]) - - -def test_rename_data_policy_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.rename_data_policy( - datapolicy.RenameDataPolicyRequest(), - name='name_value', - new_data_policy_id='new_data_policy_id_value', - ) - - -def test_delete_data_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc - - request = {} - client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.delete_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["name"] = "" - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["name"] = 'name_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = None - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "delete", - 'query_params': pb_request, - } - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - json_return_value = '' - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.delete_data_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_delete_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.delete_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) - - -def test_delete_data_policy_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = None - - # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - - # get truthy value for each flattened field - mock_args = dict( - name='name_value', - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - json_return_value = '' - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.delete_data_policy(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) - - -def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.delete_data_policy( - datapolicy.DeleteDataPolicyRequest(), - name='name_value', - ) - - -def test_get_data_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc - - request = {} - client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["name"] = "" - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["name"] = 'name_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, - } - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.get_data_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_get_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.get_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) - - -def test_get_data_policy_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy() - - # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - - # get truthy value for each flattened field - mock_args = dict( - name='name_value', - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.get_data_policy(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) - - -def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.get_data_policy( - datapolicy.GetDataPolicyRequest(), - name='name_value', - ) - - -def test_list_data_policies_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc - - request = {} - client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.list_data_policies(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["parent"] = "" - request = request_type(**request_init) - pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["parent"] = 'parent_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) - # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("filter", "page_size", "page_token", )) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = datapolicy.ListDataPoliciesResponse() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request_type.pb(request) - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, - } - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.list_data_policies(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_list_data_policies_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.list_data_policies._get_unset_required_fields({}) - assert set(unset_fields) == (set(("filter", "pageSize", "pageToken", )) & set(("parent", ))) - - -def test_list_data_policies_rest_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.ListDataPoliciesResponse() - - # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} - - # get truthy value for each flattened field - mock_args = dict( - parent='parent_value', - ) - mock_args.update(sample_request) - - # Wrap the value into a proper Response obj - response_value = Response() - response_value.status_code = 200 - # Convert return value to protobuf type - return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - client.list_data_policies(**mock_args) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(req.mock_calls) == 1 - _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) - - -def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.list_data_policies( - datapolicy.ListDataPoliciesRequest(), - parent='parent_value', - ) - - -def test_list_data_policies_rest_pager(transport: str = 'rest'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # TODO(kbandes): remove this mock unless there's a good reason for it. - #with mock.patch.object(path_template, 'transcode') as transcode: - # Set the response as a series of pages - response = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - ) - # Two responses for two calls - response = response + response - - # Wrap the values into proper Response objs - response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) - return_values = tuple(Response() for i in response) - for return_val, response_val in zip(return_values, response): - return_val._content = response_val.encode('UTF-8') - return_val.status_code = 200 - req.side_effect = return_values - - sample_request = {'parent': 'projects/sample1/locations/sample2'} - - pager = client.list_data_policies(request=sample_request) - - results = list(pager) - assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) - - pages = list(client.list_data_policies(request=sample_request).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): - assert page_.raw_page.next_page_token == token - - -def test_get_iam_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc - - request = {} - client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["resource"] = "" - request = request_type(**request_init) - pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["resource"] = 'resource_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = policy_pb2.Policy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.get_iam_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_get_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.get_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", ))) - - -def test_set_iam_policy_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.set_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc - - request = {} - client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.set_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["resource"] = "" - request = request_type(**request_init) - pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["resource"] = 'resource_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = policy_pb2.Policy() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.set_iam_policy(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_set_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.set_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) - - -def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc - - request = {} - client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.test_iam_permissions(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - - -def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): - transport_class = transports.DataPolicyServiceRestTransport - - request_init = {} - request_init["resource"] = "" - request_init["permissions"] = "" - request = request_type(**request_init) - pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) - - # verify fields with default values are dropped - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with default values are now present - - jsonified_request["resource"] = 'resource_value' - jsonified_request["permissions"] = 'permissions_value' - - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) - jsonified_request.update(unset_fields) - - # verify required fields with non-default values are left alone - assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' - assert "permissions" in jsonified_request - assert jsonified_request["permissions"] == 'permissions_value' - - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='rest', - ) - request = request_type(**request_init) - - # Designate an appropriate value for the returned response. - return_value = iam_policy_pb2.TestIamPermissionsResponse() - # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: - # We need to mock transcode() because providing default values - # for required fields will fail the real version if the http_options - # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: - # A uri without fields and an empty body will force all the - # request fields to show up in the query_params. - pb_request = request - transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, - } - transcode_result['body'] = pb_request - transcode.return_value = transcode_result - - response_value = Response() - response_value.status_code = 200 - - json_return_value = json_format.MessageToJson(return_value) - - response_value._content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - response = client.test_iam_permissions(request) - - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] - assert expected_params == actual_params - - -def test_test_iam_permissions_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) - - unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) - - -def test_credentials_transport_error(): - # It is an error to provide credentials and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # It is an error to provide a credentials file and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options={"credentials_file": "credentials.json"}, - transport=transport, - ) - - # It is an error to provide an api_key and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options=options, - transport=transport, - ) - - # It is an error to provide an api_key and a credential. - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options=options, - credentials=ga_credentials.AnonymousCredentials() - ) - - # It is an error to provide scopes and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options={"scopes": ["1", "2"]}, - transport=transport, - ) - - -def test_transport_instance(): - # A client may be instantiated with a custom transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - client = DataPolicyServiceClient(transport=transport) - assert client.transport is transport - -def test_transport_get_channel(): - # A client may be instantiated with a custom transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel - - transport = transports.DataPolicyServiceGrpcAsyncIOTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel - -@pytest.mark.parametrize("transport_class", [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - transports.DataPolicyServiceRestTransport, -]) -def test_transport_adc(transport_class): - # Test default credentials are used if not provided. - with mock.patch.object(google.auth, 'default') as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class() - adc.assert_called_once() - -def test_transport_kind_grpc(): - transport = DataPolicyServiceClient.get_transport_class("grpc")( - credentials=ga_credentials.AnonymousCredentials() - ) - assert transport.kind == "grpc" - - -def test_initialize_client_w_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" - ) - assert client is not None - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_create_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.create_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.CreateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_update_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.update_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.UpdateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_rename_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.rename_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.RenameDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_delete_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = None - client.delete_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.DeleteDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.get_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.GetDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_list_data_policies_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = datapolicy.ListDataPoliciesResponse() - client.list_data_policies(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.ListDataPoliciesRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_iam_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.get_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.GetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_set_iam_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.set_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.SetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_test_iam_permissions_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - client.test_iam_permissions(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.TestIamPermissionsRequest() - - assert args[0] == request_msg - - -def test_transport_kind_grpc_asyncio(): - transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( - credentials=async_anonymous_credentials() - ) - assert transport.kind == "grpc_asyncio" - - -def test_initialize_client_w_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" - ) - assert client is not None - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_create_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.create_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.CreateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_update_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.update_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.UpdateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_rename_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.rename_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.RenameDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_delete_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - await client.delete_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.DeleteDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_get_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.get_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.GetDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_list_data_policies_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) - await client.list_data_policies(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.ListDataPoliciesRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_get_iam_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - await client.get_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.GetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_set_iam_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - await client.set_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.SetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_test_iam_permissions_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) - await client.test_iam_permissions(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.TestIamPermissionsRequest() - - assert args[0] == request_msg - - -def test_transport_kind_rest(): - transport = DataPolicyServiceClient.get_transport_class("rest")( - credentials=ga_credentials.AnonymousCredentials() - ) - assert transport.kind == "rest" - - -def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.create_data_policy(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) -def test_create_data_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} - request_init["data_policy"] = {'policy_tag': 'policy_tag_value', 'data_masking_policy': {'predefined_expression': 3, 'routine': 'routine_value'}, 'name': 'name_value', 'data_policy_type': 3, 'data_policy_id': 'data_policy_id_value'} - # The version of a generated dependency at test runtime may differ from the version used during generation. - # Delete any fields which are not present in the current runtime dependency - # See https://github.com/googleapis/gapic-generator-python/issues/1748 - - # Determine if the message type is proto-plus or protobuf - test_field = datapolicy.CreateDataPolicyRequest.meta.fields["data_policy"] - - def get_message_fields(field): - # Given a field which is a message (composite type), return a list with - # all the fields of the message. - # If the field is not a composite type, return an empty list. - message_fields = [] - - if hasattr(field, "message") and field.message: - is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") - - if is_field_type_proto_plus_type: - message_fields = field.message.meta.fields.values() - # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types - else: # pragma: NO COVER - message_fields = field.message.DESCRIPTOR.fields - return message_fields - - runtime_nested_fields = [ - (field.name, nested_field.name) - for field in get_message_fields(test_field) - for nested_field in get_message_fields(field) - ] - - subfields_not_in_runtime = [] - - # For each item in the sample request, create a list of sub fields which are not present at runtime - # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for field, value in request_init["data_policy"].items(): # pragma: NO COVER - result = None - is_repeated = False - # For repeated fields - if isinstance(value, list) and len(value): - is_repeated = True - result = value[0] - # For fields where the type is another message - if isinstance(value, dict): - result = value - - if result and hasattr(result, "keys"): - for subfield in result.keys(): - if (field, subfield) not in runtime_nested_fields: - subfields_not_in_runtime.append( - {"field": field, "subfield": subfield, "is_repeated": is_repeated} - ) - - # Remove fields from the sample request which are not present in the runtime version of the dependency - # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER - field = subfield_to_delete.get("field") - field_repeated = subfield_to_delete.get("is_repeated") - subfield = subfield_to_delete.get("subfield") - if subfield: - if field_repeated: - for i in range(0, len(request_init["data_policy"][field])): - del request_init["data_policy"][field][i][subfield] - else: - del request_init["data_policy"][field][subfield] - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.create_data_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_create_data_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) - req.return_value.content = return_value - - request = datapolicy.CreateDataPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = datapolicy.DataPolicy() - post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - - client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.update_data_policy(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) -def test_update_data_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} - request_init["data_policy"] = {'policy_tag': 'policy_tag_value', 'data_masking_policy': {'predefined_expression': 3, 'routine': 'routine_value'}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_type': 3, 'data_policy_id': 'data_policy_id_value'} - # The version of a generated dependency at test runtime may differ from the version used during generation. - # Delete any fields which are not present in the current runtime dependency - # See https://github.com/googleapis/gapic-generator-python/issues/1748 - - # Determine if the message type is proto-plus or protobuf - test_field = datapolicy.UpdateDataPolicyRequest.meta.fields["data_policy"] - - def get_message_fields(field): - # Given a field which is a message (composite type), return a list with - # all the fields of the message. - # If the field is not a composite type, return an empty list. - message_fields = [] - - if hasattr(field, "message") and field.message: - is_field_type_proto_plus_type = not hasattr(field.message, "DESCRIPTOR") - - if is_field_type_proto_plus_type: - message_fields = field.message.meta.fields.values() - # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types - else: # pragma: NO COVER - message_fields = field.message.DESCRIPTOR.fields - return message_fields - - runtime_nested_fields = [ - (field.name, nested_field.name) - for field in get_message_fields(test_field) - for nested_field in get_message_fields(field) - ] - - subfields_not_in_runtime = [] - - # For each item in the sample request, create a list of sub fields which are not present at runtime - # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for field, value in request_init["data_policy"].items(): # pragma: NO COVER - result = None - is_repeated = False - # For repeated fields - if isinstance(value, list) and len(value): - is_repeated = True - result = value[0] - # For fields where the type is another message - if isinstance(value, dict): - result = value - - if result and hasattr(result, "keys"): - for subfield in result.keys(): - if (field, subfield) not in runtime_nested_fields: - subfields_not_in_runtime.append( - {"field": field, "subfield": subfield, "is_repeated": is_repeated} - ) - - # Remove fields from the sample request which are not present in the runtime version of the dependency - # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER - field = subfield_to_delete.get("field") - field_repeated = subfield_to_delete.get("is_repeated") - subfield = subfield_to_delete.get("subfield") - if subfield: - if field_repeated: - for i in range(0, len(request_init["data_policy"][field])): - del request_init["data_policy"][field][i][subfield] - else: - del request_init["data_policy"][field][subfield] - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.update_data_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_update_data_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) - req.return_value.content = return_value - - request = datapolicy.UpdateDataPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = datapolicy.DataPolicy() - post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - - client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_rename_data_policy_rest_bad_request(request_type=datapolicy.RenameDataPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.rename_data_policy(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.RenameDataPolicyRequest, - dict, -]) -def test_rename_data_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.rename_data_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_rename_data_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_rename_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_rename_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_rename_data_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = datapolicy.RenameDataPolicyRequest.pb(datapolicy.RenameDataPolicyRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) - req.return_value.content = return_value - - request = datapolicy.RenameDataPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = datapolicy.DataPolicy() - post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - - client.rename_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.delete_data_policy(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) -def test_delete_data_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = None - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - json_return_value = '' - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.delete_data_policy(request) - - # Establish that the response is the type that we expect. - assert response is None - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_delete_data_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: - pre.assert_not_called() - pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - - request = datapolicy.DeleteDataPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - - client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - - -def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.get_data_policy(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) -def test_get_data_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.DataPolicy.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.get_data_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_get_data_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.DataPolicy.to_json(datapolicy.DataPolicy()) - req.return_value.content = return_value - - request = datapolicy.GetDataPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = datapolicy.DataPolicy() - post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - - client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.list_data_policies(request) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) -def test_list_data_policies_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - - # Convert return value to protobuf type - return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.list_data_policies(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_list_data_policies_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) - req.return_value.content = return_value - - request = datapolicy.ListDataPoliciesRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = datapolicy.ListDataPoliciesResponse() - post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata - - client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.get_iam_policy(request) - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) -def test_get_iam_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.get_iam_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_get_iam_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = iam_policy_pb2.GetIamPolicyRequest() - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = json_format.MessageToJson(policy_pb2.Policy()) - req.return_value.content = return_value - - request = iam_policy_pb2.GetIamPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = policy_pb2.Policy() - post_with_metadata.return_value = policy_pb2.Policy(), metadata - - client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.set_iam_policy(request) - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) -def test_set_iam_policy_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.set_iam_policy(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_set_iam_policy_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = iam_policy_pb2.SetIamPolicyRequest() - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = json_format.MessageToJson(policy_pb2.Policy()) - req.return_value.content = return_value - - request = iam_policy_pb2.SetIamPolicyRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = policy_pb2.Policy() - post_with_metadata.return_value = policy_pb2.Policy(), metadata - - client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - - -def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): - # Wrap the value into a proper Response obj - response_value = mock.Mock() - json_return_value = '' - response_value.json = mock.Mock(return_value={}) - response_value.status_code = 400 - response_value.request = mock.Mock() - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - client.test_iam_permissions(request) - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) -def test_test_iam_permissions_rest_call_success(request_type): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - - # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} - request = request_type(**request_init) - - # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: - # Designate an appropriate value for the returned response. - return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - ) - - # Wrap the value into a proper Response obj - response_value = mock.Mock() - response_value.status_code = 200 - json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') - req.return_value = response_value - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - response = client.test_iam_permissions(request) - - # Establish that the response is the type that we expect. - assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] - - -@pytest.mark.parametrize("null_interceptor", [True, False]) -def test_test_iam_permissions_rest_interceptors(null_interceptor): - transport = transports.DataPolicyServiceRestTransport( - credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) - client = DataPolicyServiceClient(transport=transport) - - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: - pre.assert_not_called() - post.assert_not_called() - post_with_metadata.assert_not_called() - pb_message = iam_policy_pb2.TestIamPermissionsRequest() - transcode.return_value = { - "method": "post", - "uri": "my_uri", - "body": pb_message, - "query_params": pb_message, - } - - req.return_value = mock.Mock() - req.return_value.status_code = 200 - req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) - req.return_value.content = return_value - - request = iam_policy_pb2.TestIamPermissionsRequest() - metadata =[ - ("key", "val"), - ("cephalopod", "squid"), - ] - pre.return_value = request, metadata - post.return_value = iam_policy_pb2.TestIamPermissionsResponse() - post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata - - client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) - - pre.assert_called_once() - post.assert_called_once() - post_with_metadata.assert_called_once() - -def test_initialize_client_w_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - assert client is not None - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_create_data_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - client.create_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.CreateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_update_data_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - client.update_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.UpdateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_rename_data_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.rename_data_policy), - '__call__') as call: - client.rename_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.RenameDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_delete_data_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - client.delete_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.DeleteDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_data_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - client.get_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.GetDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_list_data_policies_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - client.list_data_policies(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.ListDataPoliciesRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_iam_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - client.get_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.GetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_set_iam_policy_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - client.set_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.SetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_test_iam_permissions_empty_call_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - client.test_iam_permissions(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.TestIamPermissionsRequest() - - assert args[0] == request_msg - - -def test_transport_grpc_default(): - # A client should use the gRPC transport by default. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - assert isinstance( - client.transport, - transports.DataPolicyServiceGrpcTransport, - ) - -def test_data_policy_service_base_transport_error(): - # Passing both a credentials object and credentials_file should raise an error - with pytest.raises(core_exceptions.DuplicateCredentialArgs): - transport = transports.DataPolicyServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json" - ) - - -def test_data_policy_service_base_transport(): - # Instantiate the base transport. - with mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: - Transport.return_value = None - transport = transports.DataPolicyServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Every method on the transport should just blindly - # raise NotImplementedError. - methods = ( - 'create_data_policy', - 'update_data_policy', - 'rename_data_policy', - 'delete_data_policy', - 'get_data_policy', - 'list_data_policies', - 'get_iam_policy', - 'set_iam_policy', - 'test_iam_permissions', - ) - for method in methods: - with pytest.raises(NotImplementedError): - getattr(transport, method)(request=object()) - - with pytest.raises(NotImplementedError): - transport.close() - - # Catch all for all remaining methods and properties - remainder = [ - 'kind', - ] - for r in remainder: - with pytest.raises(NotImplementedError): - getattr(transport, r)() - - -def test_data_policy_service_base_transport_with_credentials_file(): - # Instantiate the base transport with a credentials file - with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: - Transport.return_value = None - load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.DataPolicyServiceTransport( - credentials_file="credentials.json", - quota_project_id="octopus", - ) - load_creds.assert_called_once_with("credentials.json", - scopes=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - quota_project_id="octopus", - ) - - -def test_data_policy_service_base_transport_with_adc(): - # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: - Transport.return_value = None - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.DataPolicyServiceTransport() - adc.assert_called_once() - - -def test_data_policy_service_auth_adc(): - # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - DataPolicyServiceClient() - adc.assert_called_once_with( - scopes=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - quota_project_id=None, - ) - - -@pytest.mark.parametrize( - "transport_class", - [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - ], -) -def test_data_policy_service_transport_auth_adc(transport_class): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class(quota_project_id="octopus", scopes=["1", "2"]) - adc.assert_called_once_with( - scopes=["1", "2"], - default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), - quota_project_id="octopus", - ) - - -@pytest.mark.parametrize( - "transport_class", - [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - transports.DataPolicyServiceRestTransport, - ], -) -def test_data_policy_service_transport_auth_gdch_credentials(transport_class): - host = 'https://language.com' - api_audience_tests = [None, 'https://language2.com'] - api_audience_expect = [host, 'https://language2.com'] - for t, e in zip(api_audience_tests, api_audience_expect): - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - gdch_mock = mock.MagicMock() - type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) - adc.return_value = (gdch_mock, None) - transport_class(host=host, api_audience=t) - gdch_mock.with_gdch_audience.assert_called_once_with( - e - ) - - -@pytest.mark.parametrize( - "transport_class,grpc_helpers", - [ - (transports.DataPolicyServiceGrpcTransport, grpc_helpers), - (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) - ], -) -def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( - grpc_helpers, "create_channel", autospec=True - ) as create_channel: - creds = ga_credentials.AnonymousCredentials() - adc.return_value = (creds, None) - transport_class( - quota_project_id="octopus", - scopes=["1", "2"] - ) - - create_channel.assert_called_with( - "bigquerydatapolicy.googleapis.com:443", - credentials=creds, - credentials_file=None, - quota_project_id="octopus", - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - scopes=["1", "2"], - default_host="bigquerydatapolicy.googleapis.com", - ssl_credentials=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( - transport_class -): - cred = ga_credentials.AnonymousCredentials() - - # Check ssl_channel_credentials is used if provided. - with mock.patch.object(transport_class, "create_channel") as mock_create_channel: - mock_ssl_channel_creds = mock.Mock() - transport_class( - host="squid.clam.whelk", - credentials=cred, - ssl_channel_credentials=mock_ssl_channel_creds - ) - mock_create_channel.assert_called_once_with( - "squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_channel_creds, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls - # is used. - with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): - with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: - transport_class( - credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback - ) - expected_cert, expected_key = client_cert_source_callback() - mock_ssl_cred.assert_called_once_with( - certificate_chain=expected_cert, - private_key=expected_key - ) - -def test_data_policy_service_http_transport_client_cert_source_for_mtls(): - cred = ga_credentials.AnonymousCredentials() - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: - transports.DataPolicyServiceRestTransport ( - credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback - ) - mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) - - -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) -def test_data_policy_service_host_no_port(transport_name): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), - transport=transport_name, - ) - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com' - ) - -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) -def test_data_policy_service_host_with_port(transport_name): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), - transport=transport_name, - ) - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:8000' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com:8000' - ) - -@pytest.mark.parametrize("transport_name", [ - "rest", -]) -def test_data_policy_service_client_transport_session_collision(transport_name): - creds1 = ga_credentials.AnonymousCredentials() - creds2 = ga_credentials.AnonymousCredentials() - client1 = DataPolicyServiceClient( - credentials=creds1, - transport=transport_name, - ) - client2 = DataPolicyServiceClient( - credentials=creds2, - transport=transport_name, - ) - session1 = client1.transport.create_data_policy._session - session2 = client2.transport.create_data_policy._session - assert session1 != session2 - session1 = client1.transport.update_data_policy._session - session2 = client2.transport.update_data_policy._session - assert session1 != session2 - session1 = client1.transport.rename_data_policy._session - session2 = client2.transport.rename_data_policy._session - assert session1 != session2 - session1 = client1.transport.delete_data_policy._session - session2 = client2.transport.delete_data_policy._session - assert session1 != session2 - session1 = client1.transport.get_data_policy._session - session2 = client2.transport.get_data_policy._session - assert session1 != session2 - session1 = client1.transport.list_data_policies._session - session2 = client2.transport.list_data_policies._session - assert session1 != session2 - session1 = client1.transport.get_iam_policy._session - session2 = client2.transport.get_iam_policy._session - assert session1 != session2 - session1 = client1.transport.set_iam_policy._session - session2 = client2.transport.set_iam_policy._session - assert session1 != session2 - session1 = client1.transport.test_iam_permissions._session - session2 = client2.transport.test_iam_permissions._session - assert session1 != session2 -def test_data_policy_service_grpc_transport_channel(): - channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) - - # Check that channel is used if provided. - transport = transports.DataPolicyServiceGrpcTransport( - host="squid.clam.whelk", - channel=channel, - ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None - - -def test_data_policy_service_grpc_asyncio_transport_channel(): - channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) - - # Check that channel is used if provided. - transport = transports.DataPolicyServiceGrpcAsyncIOTransport( - host="squid.clam.whelk", - channel=channel, - ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None - - -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_client_cert_source( - transport_class -): - with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: - mock_ssl_cred = mock.Mock() - grpc_ssl_channel_cred.return_value = mock_ssl_cred - - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel - - cred = ga_credentials.AnonymousCredentials() - with pytest.warns(DeprecationWarning): - with mock.patch.object(google.auth, 'default') as adc: - adc.return_value = (cred, None) - transport = transport_class( - host="squid.clam.whelk", - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=client_cert_source_callback, - ) - adc.assert_called_once() - - grpc_ssl_channel_cred.assert_called_once_with( - certificate_chain=b"cert bytes", private_key=b"key bytes" - ) - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel - assert transport._ssl_channel_credentials == mock_ssl_cred - - -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_adc( - transport_class -): - mock_ssl_cred = mock.Mock() - with mock.patch.multiple( - "google.auth.transport.grpc.SslCredentials", - __init__=mock.Mock(return_value=None), - ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), - ): - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel - mock_cred = mock.Mock() - - with pytest.warns(DeprecationWarning): - transport = transport_class( - host="squid.clam.whelk", - credentials=mock_cred, - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=None, - ) - - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=mock_cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel - - -def test_data_policy_path(): - project = "squid" - location = "clam" - data_policy = "whelk" - expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) - actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) - assert expected == actual - - -def test_parse_data_policy_path(): - expected = { - "project": "octopus", - "location": "oyster", - "data_policy": "nudibranch", - } - path = DataPolicyServiceClient.data_policy_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_data_policy_path(path) - assert expected == actual - -def test_common_billing_account_path(): - billing_account = "cuttlefish" - expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) - actual = DataPolicyServiceClient.common_billing_account_path(billing_account) - assert expected == actual - - -def test_parse_common_billing_account_path(): - expected = { - "billing_account": "mussel", - } - path = DataPolicyServiceClient.common_billing_account_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_billing_account_path(path) - assert expected == actual - -def test_common_folder_path(): - folder = "winkle" - expected = "folders/{folder}".format(folder=folder, ) - actual = DataPolicyServiceClient.common_folder_path(folder) - assert expected == actual - - -def test_parse_common_folder_path(): - expected = { - "folder": "nautilus", - } - path = DataPolicyServiceClient.common_folder_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_folder_path(path) - assert expected == actual - -def test_common_organization_path(): - organization = "scallop" - expected = "organizations/{organization}".format(organization=organization, ) - actual = DataPolicyServiceClient.common_organization_path(organization) - assert expected == actual - - -def test_parse_common_organization_path(): - expected = { - "organization": "abalone", - } - path = DataPolicyServiceClient.common_organization_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_organization_path(path) - assert expected == actual - -def test_common_project_path(): - project = "squid" - expected = "projects/{project}".format(project=project, ) - actual = DataPolicyServiceClient.common_project_path(project) - assert expected == actual - - -def test_parse_common_project_path(): - expected = { - "project": "clam", - } - path = DataPolicyServiceClient.common_project_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_project_path(path) - assert expected == actual - -def test_common_location_path(): - project = "whelk" - location = "octopus" - expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) - actual = DataPolicyServiceClient.common_location_path(project, location) - assert expected == actual - - -def test_parse_common_location_path(): - expected = { - "project": "oyster", - "location": "nudibranch", - } - path = DataPolicyServiceClient.common_location_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_location_path(path) - assert expected == actual - - -def test_client_with_default_client_info(): - client_info = gapic_v1.client_info.ClientInfo() - - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) - - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: - transport_class = DataPolicyServiceClient.get_transport_class() - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) - - -def test_transport_close_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" - ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: - with client: - close.assert_not_called() - close.assert_called_once() - - -@pytest.mark.asyncio -async def test_transport_close_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" - ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: - async with client: - close.assert_not_called() - close.assert_called_once() - - -def test_transport_close_rest(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" - ) - with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: - with client: - close.assert_not_called() - close.assert_called_once() - - -def test_client_ctx(): - transports = [ - 'rest', - 'grpc', - ] - for transport in transports: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport - ) - # Test client calls underlying transport. - with mock.patch.object(type(client.transport), "close") as close: - close.assert_not_called() - with client: - pass - close.assert_called() - -@pytest.mark.parametrize("client_class,transport_class", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), -]) -def test_api_key_credentials(client_class, transport_class): - with mock.patch.object( - google.auth._default, "get_api_key_credentials", create=True - ) as get_api_key_credentials: - mock_cred = mock.Mock() - get_api_key_credentials.return_value = mock_cred - options = client_options.ClientOptions() - options.api_key = "api_key" - with mock.patch.object(transport_class, "__init__") as patched: - patched.return_value = None - client = client_class(client_options=options) - patched.assert_called_once_with( - credentials=mock_cred, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc deleted file mode 100644 index 0c3effcc3668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.coveragerc +++ /dev/null @@ -1,13 +0,0 @@ -[run] -branch = True - -[report] -show_missing = True -omit = - google/cloud/bigquery_datapolicies/__init__.py - google/cloud/bigquery_datapolicies/gapic_version.py -exclude_lines = - # Re-enable the standard pragma - pragma: NO COVER - # Ignore debug-only repr - def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 deleted file mode 100644 index 90316de21489..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/.flake8 +++ /dev/null @@ -1,34 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -[flake8] -# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): -# Resolve flake8 lint issues -ignore = E203, E231, E266, E501, W503 -exclude = - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): - # Ensure that generated code passes flake8 lint - **/gapic/** - **/services/** - **/types/** - # Exclude Protobuf gencode - *_pb2.py - - # Standard linting exemptions. - **/.nox/** - __pycache__, - .git, - *.pyc, - conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE deleted file mode 100644 index d64569567334..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/LICENSE +++ /dev/null @@ -1,202 +0,0 @@ - - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in deleted file mode 100644 index dae249ec8976..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/MANIFEST.in +++ /dev/null @@ -1,20 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -include README.rst LICENSE -recursive-include google *.py *.pyi *.json *.proto py.typed -recursive-include tests * -global-exclude *.py[co] -global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst deleted file mode 100644 index 074e1245b6d1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/README.rst +++ /dev/null @@ -1,143 +0,0 @@ -Python Client for Google Cloud Bigquery Datapolicies API -================================================= - -Quick Start ------------ - -In order to use this library, you first need to go through the following steps: - -1. `Select or create a Cloud Platform project.`_ -2. `Enable billing for your project.`_ -3. Enable the Google Cloud Bigquery Datapolicies API. -4. `Setup Authentication.`_ - -.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project -.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project -.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html - -Installation -~~~~~~~~~~~~ - -Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to -create isolated Python environments. The basic problem it addresses is one of -dependencies and versions, and indirectly permissions. - -With `virtualenv`_, it's possible to install this library without needing system -install permissions, and without clashing with the installed system -dependencies. - -.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ - - -Mac/Linux -^^^^^^^^^ - -.. code-block:: console - - python3 -m venv - source /bin/activate - /bin/pip install /path/to/library - - -Windows -^^^^^^^ - -.. code-block:: console - - python3 -m venv - \Scripts\activate - \Scripts\pip.exe install \path\to\library - - -Logging -------- - -This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. -Note the following: - -#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. -#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. -#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. - - -Simple, environment-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google -logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged -messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging -event. - -A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. - -- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. -- Invalid logging scopes: :code:`foo`, :code:`123`, etc. - -**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. - - -Examples -^^^^^^^^ - -- Enabling the default handler for all Google-based loggers - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google - -- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 - - -Advanced, code-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -You can also configure a valid logging scope using Python's standard `logging` mechanism. - - -Examples -^^^^^^^^ - -- Configuring a handler for all Google-based loggers - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - -- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google.cloud.library_v1") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - - -Logging details -~~~~~~~~~~~~~~~ - -#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root - logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set - :code:`logging.getLogger("google").propagate = True` in your code. -#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for - one library, but decide you need to also set up environment-based logging configuration for another library. - - #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual - if the code -based configuration gets applied first. - -#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get - executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. - (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css deleted file mode 100644 index b0a295464b23..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_static/custom.css +++ /dev/null @@ -1,20 +0,0 @@ -div#python2-eol { - border-color: red; - border-width: medium; -} - -/* Ensure minimum width for 'Parameters' / 'Returns' column */ -dl.field-list > dt { - min-width: 100px -} - -/* Insert space between methods for readability */ -dl.method { - padding-top: 10px; - padding-bottom: 10px -} - -/* Insert empty space between classes */ -dl.class { - padding-bottom: 50px -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html deleted file mode 100644 index 95e9c77fcfe1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/_templates/layout.html +++ /dev/null @@ -1,50 +0,0 @@ - -{% extends "!layout.html" %} -{%- block content %} -{%- if theme_fixed_sidebar|lower == 'true' %} -
- {{ sidebar() }} - {%- block document %} -
- {%- if render_sidebar %} -
- {%- endif %} - - {%- block relbar_top %} - {%- if theme_show_relbar_top|tobool %} - - {%- endif %} - {% endblock %} - -
-
- As of January 1, 2020 this library no longer supports Python 2 on the latest released version. - Library versions released prior to that date will continue to be available. For more information please - visit Python 2 support on Google Cloud. -
- {% block body %} {% endblock %} -
- - {%- block relbar_bottom %} - {%- if theme_show_relbar_bottom|tobool %} - - {%- endif %} - {% endblock %} - - {%- if render_sidebar %} -
- {%- endif %} -
- {%- endblock %} -
-
-{%- else %} -{{ super() }} -{%- endif %} -{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst deleted file mode 100644 index e4198c590cde..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/data_policy_service.rst +++ /dev/null @@ -1,10 +0,0 @@ -DataPolicyService ------------------------------------ - -.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service - :members: - :inherited-members: - -.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers - :members: - :inherited-members: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst deleted file mode 100644 index 38e5512e1111..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/services_.rst +++ /dev/null @@ -1,6 +0,0 @@ -Services for Google Cloud Bigquery Datapolicies v1beta1 API -=========================================================== -.. toctree:: - :maxdepth: 2 - - data_policy_service diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst deleted file mode 100644 index 2322c0ee11d4..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/bigquery_datapolicies_v1beta1/types_.rst +++ /dev/null @@ -1,6 +0,0 @@ -Types for Google Cloud Bigquery Datapolicies v1beta1 API -======================================================== - -.. automodule:: google.cloud.bigquery_datapolicies_v1beta1.types - :members: - :show-inheritance: diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py deleted file mode 100644 index babd226a574e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/conf.py +++ /dev/null @@ -1,385 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# -# google-cloud-bigquery-datapolicies documentation build configuration file -# -# This file is execfile()d with the current directory set to its -# containing dir. -# -# Note that not all possible configuration values are present in this -# autogenerated file. -# -# All configuration values have a default; values that are commented out -# serve to show the default. - -import sys -import os -import shlex - -# If extensions (or modules to document with autodoc) are in another directory, -# add these directories to sys.path here. If the directory is relative to the -# documentation root, use os.path.abspath to make it absolute, like shown here. -sys.path.insert(0, os.path.abspath("..")) - -# For plugins that can not read conf.py. -# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 -sys.path.insert(0, os.path.abspath(".")) - -__version__ = "" - -# -- General configuration ------------------------------------------------ - -# If your documentation needs a minimal Sphinx version, state it here. -needs_sphinx = "4.5.0" - -# Add any Sphinx extension module names here, as strings. They can be -# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom -# ones. -extensions = [ - "sphinx.ext.autodoc", - "sphinx.ext.autosummary", - "sphinx.ext.intersphinx", - "sphinx.ext.coverage", - "sphinx.ext.doctest", - "sphinx.ext.napoleon", - "sphinx.ext.todo", - "sphinx.ext.viewcode", - "recommonmark", -] - -# autodoc/autosummary flags -autoclass_content = "both" -autodoc_default_options = {"members": True} -autosummary_generate = True - - -# Add any paths that contain templates here, relative to this directory. -templates_path = ["_templates"] - -# The suffix(es) of source filenames. -# You can specify multiple suffix as a list of string: -# source_suffix = ['.rst', '.md'] -source_suffix = [".rst", ".md"] - -# The encoding of source files. -# source_encoding = 'utf-8-sig' - -# The root toctree document. -root_doc = "index" - -# General information about the project. -project = u"google-cloud-bigquery-datapolicies" -copyright = u"2025, Google, LLC" -author = u"Google APIs" - -# The version info for the project you're documenting, acts as replacement for -# |version| and |release|, also used in various other places throughout the -# built documents. -# -# The full version, including alpha/beta/rc tags. -release = __version__ -# The short X.Y version. -version = ".".join(release.split(".")[0:2]) - -# The language for content autogenerated by Sphinx. Refer to documentation -# for a list of supported languages. -# -# This is also used if you do content translation via gettext catalogs. -# Usually you set "language" from the command line for these cases. -language = None - -# There are two options for replacing |today|: either, you set today to some -# non-false value, then it is used: -# today = '' -# Else, today_fmt is used as the format for a strftime call. -# today_fmt = '%B %d, %Y' - -# List of patterns, relative to source directory, that match files and -# directories to ignore when looking for source files. -exclude_patterns = [ - "_build", - "**/.nox/**/*", - "samples/AUTHORING_GUIDE.md", - "samples/CONTRIBUTING.md", - "samples/snippets/README.rst", -] - -# The reST default role (used for this markup: `text`) to use for all -# documents. -# default_role = None - -# If true, '()' will be appended to :func: etc. cross-reference text. -# add_function_parentheses = True - -# If true, the current module name will be prepended to all description -# unit titles (such as .. function::). -# add_module_names = True - -# If true, sectionauthor and moduleauthor directives will be shown in the -# output. They are ignored by default. -# show_authors = False - -# The name of the Pygments (syntax highlighting) style to use. -pygments_style = "sphinx" - -# A list of ignored prefixes for module index sorting. -# modindex_common_prefix = [] - -# If true, keep warnings as "system message" paragraphs in the built documents. -# keep_warnings = False - -# If true, `todo` and `todoList` produce output, else they produce nothing. -todo_include_todos = True - - -# -- Options for HTML output ---------------------------------------------- - -# The theme to use for HTML and HTML Help pages. See the documentation for -# a list of builtin themes. -html_theme = "alabaster" - -# Theme options are theme-specific and customize the look and feel of a theme -# further. For a list of options available for each theme, see the -# documentation. -html_theme_options = { - "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", - "github_user": "googleapis", - "github_repo": "google-cloud-python", - "github_banner": True, - "font_family": "'Roboto', Georgia, sans", - "head_font_family": "'Roboto', Georgia, serif", - "code_font_family": "'Roboto Mono', 'Consolas', monospace", -} - -# Add any paths that contain custom themes here, relative to this directory. -# html_theme_path = [] - -# The name for this set of Sphinx documents. If None, it defaults to -# " v documentation". -# html_title = None - -# A shorter title for the navigation bar. Default is the same as html_title. -# html_short_title = None - -# The name of an image file (relative to this directory) to place at the top -# of the sidebar. -# html_logo = None - -# The name of an image file (within the static path) to use as favicon of the -# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 -# pixels large. -# html_favicon = None - -# Add any paths that contain custom static files (such as style sheets) here, -# relative to this directory. They are copied after the builtin static files, -# so a file named "default.css" will overwrite the builtin "default.css". -html_static_path = ["_static"] - -# Add any extra paths that contain custom files (such as robots.txt or -# .htaccess) here, relative to this directory. These files are copied -# directly to the root of the documentation. -# html_extra_path = [] - -# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, -# using the given strftime format. -# html_last_updated_fmt = '%b %d, %Y' - -# If true, SmartyPants will be used to convert quotes and dashes to -# typographically correct entities. -# html_use_smartypants = True - -# Custom sidebar templates, maps document names to template names. -# html_sidebars = {} - -# Additional templates that should be rendered to pages, maps page names to -# template names. -# html_additional_pages = {} - -# If false, no module index is generated. -# html_domain_indices = True - -# If false, no index is generated. -# html_use_index = True - -# If true, the index is split into individual pages for each letter. -# html_split_index = False - -# If true, links to the reST sources are added to the pages. -# html_show_sourcelink = True - -# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. -# html_show_sphinx = True - -# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. -# html_show_copyright = True - -# If true, an OpenSearch description file will be output, and all pages will -# contain a tag referring to it. The value of this option must be the -# base URL from which the finished HTML is served. -# html_use_opensearch = '' - -# This is the file name suffix for HTML files (e.g. ".xhtml"). -# html_file_suffix = None - -# Language to be used for generating the HTML full-text search index. -# Sphinx supports the following languages: -# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' -# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' -# html_search_language = 'en' - -# A dictionary with options for the search language support, empty by default. -# Now only 'ja' uses this config value -# html_search_options = {'type': 'default'} - -# The name of a javascript file (relative to the configuration directory) that -# implements a search results scorer. If empty, the default will be used. -# html_search_scorer = 'scorer.js' - -# Output file base name for HTML help builder. -htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" - -# -- Options for warnings ------------------------------------------------------ - - -suppress_warnings = [ - # Temporarily suppress this to avoid "more than one target found for - # cross-reference" warning, which are intractable for us to avoid while in - # a mono-repo. - # See https://github.com/sphinx-doc/sphinx/blob - # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 - "ref.python" -] - -# -- Options for LaTeX output --------------------------------------------- - -latex_elements = { - # The paper size ('letterpaper' or 'a4paper'). - # 'papersize': 'letterpaper', - # The font size ('10pt', '11pt' or '12pt'). - # 'pointsize': '10pt', - # Additional stuff for the LaTeX preamble. - # 'preamble': '', - # Latex figure (float) alignment - # 'figure_align': 'htbp', -} - -# Grouping the document tree into LaTeX files. List of tuples -# (source start file, target name, title, -# author, documentclass [howto, manual, or own class]). -latex_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies.tex", - u"google-cloud-bigquery-datapolicies Documentation", - author, - "manual", - ) -] - -# The name of an image file (relative to this directory) to place at the top of -# the title page. -# latex_logo = None - -# For "manual" documents, if this is true, then toplevel headings are parts, -# not chapters. -# latex_use_parts = False - -# If true, show page references after internal links. -# latex_show_pagerefs = False - -# If true, show URL addresses after external links. -# latex_show_urls = False - -# Documents to append as an appendix to all manuals. -# latex_appendices = [] - -# If false, no module index is generated. -# latex_domain_indices = True - - -# -- Options for manual page output --------------------------------------- - -# One entry per manual page. List of tuples -# (source start file, name, description, authors, manual section). -man_pages = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - [author], - 1, - ) -] - -# If true, show URL addresses after external links. -# man_show_urls = False - - -# -- Options for Texinfo output ------------------------------------------- - -# Grouping the document tree into Texinfo files. List of tuples -# (source start file, target name, title, author, -# dir menu entry, description, category) -texinfo_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - author, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Library", - "APIs", - ) -] - -# Documents to append as an appendix to all manuals. -# texinfo_appendices = [] - -# If false, no module index is generated. -# texinfo_domain_indices = True - -# How to display URL addresses: 'footnote', 'no', or 'inline'. -# texinfo_show_urls = 'footnote' - -# If true, do not generate a @detailmenu in the "Top" node's menu. -# texinfo_no_detailmenu = False - - -# Example configuration for intersphinx: refer to the Python standard library. -intersphinx_mapping = { - "python": ("https://python.readthedocs.org/en/latest/", None), - "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), - "google.api_core": ( - "https://googleapis.dev/python/google-api-core/latest/", - None, - ), - "grpc": ("https://grpc.github.io/grpc/python/", None), - "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), - "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), -} - - -# Napoleon settings -napoleon_google_docstring = True -napoleon_numpy_docstring = True -napoleon_include_private_with_doc = False -napoleon_include_special_with_doc = True -napoleon_use_admonition_for_examples = False -napoleon_use_admonition_for_notes = False -napoleon_use_admonition_for_references = False -napoleon_use_ivar = False -napoleon_use_param = True -napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst deleted file mode 100644 index 30c4f11b89cf..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/index.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. include:: multiprocessing.rst - - -API Reference -------------- -.. toctree:: - :maxdepth: 2 - - bigquery_datapolicies_v1beta1/services_ - bigquery_datapolicies_v1beta1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst deleted file mode 100644 index 536d17b2ea65..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/docs/multiprocessing.rst +++ /dev/null @@ -1,7 +0,0 @@ -.. note:: - - Because this client uses :mod:`grpc` library, it is safe to - share instances across threads. In multiprocessing scenarios, the best - practice is to create client instances *after* the invocation of - :func:`os.fork` by :class:`multiprocessing.pool.Pool` or - :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py deleted file mode 100644 index 705e708d1ff2..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/__init__.py +++ /dev/null @@ -1,43 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies import gapic_version as package_version - -__version__ = package_version.__version__ - - -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.client import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient - -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import CreateDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DataMaskingPolicy -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DataPolicy -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import DeleteDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import GetDataPolicyRequest -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import ListDataPoliciesRequest -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import ListDataPoliciesResponse -from google.cloud.bigquery_datapolicies_v1beta1.types.datapolicy import UpdateDataPolicyRequest - -__all__ = ('DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py deleted file mode 100644 index 611003d729c9..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/__init__.py +++ /dev/null @@ -1,44 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version - -__version__ = package_version.__version__ - - -from .services.data_policy_service import DataPolicyServiceClient -from .services.data_policy_service import DataPolicyServiceAsyncClient - -from .types.datapolicy import CreateDataPolicyRequest -from .types.datapolicy import DataMaskingPolicy -from .types.datapolicy import DataPolicy -from .types.datapolicy import DeleteDataPolicyRequest -from .types.datapolicy import GetDataPolicyRequest -from .types.datapolicy import ListDataPoliciesRequest -from .types.datapolicy import ListDataPoliciesResponse -from .types.datapolicy import UpdateDataPolicyRequest - -__all__ = ( - 'DataPolicyServiceAsyncClient', -'CreateDataPolicyRequest', -'DataMaskingPolicy', -'DataPolicy', -'DataPolicyServiceClient', -'DeleteDataPolicyRequest', -'GetDataPolicyRequest', -'ListDataPoliciesRequest', -'ListDataPoliciesResponse', -'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json deleted file mode 100644 index 229de39247fe..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_metadata.json +++ /dev/null @@ -1,103 +0,0 @@ - { - "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", - "language": "python", - "libraryPackage": "google.cloud.bigquery_datapolicies_v1beta1", - "protoPackage": "google.cloud.bigquery.datapolicies.v1beta1", - "schema": "1.0", - "services": { - "DataPolicyService": { - "clients": { - "grpc": { - "libraryClient": "DataPolicyServiceClient", - "rpcs": { - "CreateDataPolicy": { - "methods": [ - "create_data_policy" - ] - }, - "DeleteDataPolicy": { - "methods": [ - "delete_data_policy" - ] - }, - "GetDataPolicy": { - "methods": [ - "get_data_policy" - ] - }, - "GetIamPolicy": { - "methods": [ - "get_iam_policy" - ] - }, - "ListDataPolicies": { - "methods": [ - "list_data_policies" - ] - }, - "SetIamPolicy": { - "methods": [ - "set_iam_policy" - ] - }, - "TestIamPermissions": { - "methods": [ - "test_iam_permissions" - ] - }, - "UpdateDataPolicy": { - "methods": [ - "update_data_policy" - ] - } - } - }, - "grpc-async": { - "libraryClient": "DataPolicyServiceAsyncClient", - "rpcs": { - "CreateDataPolicy": { - "methods": [ - "create_data_policy" - ] - }, - "DeleteDataPolicy": { - "methods": [ - "delete_data_policy" - ] - }, - "GetDataPolicy": { - "methods": [ - "get_data_policy" - ] - }, - "GetIamPolicy": { - "methods": [ - "get_iam_policy" - ] - }, - "ListDataPolicies": { - "methods": [ - "list_data_policies" - ] - }, - "SetIamPolicy": { - "methods": [ - "set_iam_policy" - ] - }, - "TestIamPermissions": { - "methods": [ - "test_iam_permissions" - ] - }, - "UpdateDataPolicy": { - "methods": [ - "update_data_policy" - ] - } - } - } - } - } - } -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py deleted file mode 100644 index f2f6d40070dd..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/async_client.py +++ /dev/null @@ -1,1162 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import logging as std_logging -from collections import OrderedDict -import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union - -from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version - -from google.api_core.client_options import ClientOptions -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - - -try: - OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore - -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .client import DataPolicyServiceClient - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - -class DataPolicyServiceAsyncClient: - """Data Policy Service provides APIs for managing the - label-policy bindings. - """ - - _client: DataPolicyServiceClient - - # Copy defaults from the synchronous client for use here. - # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. - DEFAULT_ENDPOINT = DataPolicyServiceClient.DEFAULT_ENDPOINT - DEFAULT_MTLS_ENDPOINT = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - _DEFAULT_ENDPOINT_TEMPLATE = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE - _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE - - data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) - parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) - common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) - parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) - common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) - parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) - common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) - parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) - common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) - parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) - common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) - parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) - - @classmethod - def from_service_account_info(cls, info: dict, *args, **kwargs): - """Creates an instance of this client using the provided credentials - info. - - Args: - info (dict): The service account private key info. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceAsyncClient: The constructed client. - """ - return DataPolicyServiceClient.from_service_account_info.__func__(DataPolicyServiceAsyncClient, info, *args, **kwargs) # type: ignore - - @classmethod - def from_service_account_file(cls, filename: str, *args, **kwargs): - """Creates an instance of this client using the provided credentials - file. - - Args: - filename (str): The path to the service account private key json - file. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceAsyncClient: The constructed client. - """ - return DataPolicyServiceClient.from_service_account_file.__func__(DataPolicyServiceAsyncClient, filename, *args, **kwargs) # type: ignore - - from_service_account_json = from_service_account_file - - @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): - """Return the API endpoint and client cert source for mutual TLS. - - The client cert source is determined in the following order: - (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the - client cert source is None. - (2) if `client_options.client_cert_source` is provided, use the provided one; if the - default client cert source exists, use the default one; otherwise the client cert - source is None. - - The API endpoint is determined in the following order: - (1) if `client_options.api_endpoint` if provided, use the provided one. - (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the - default mTLS endpoint; if the environment variable is "never", use the default API - endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise - use the default API endpoint. - - More details can be found at https://google.aip.dev/auth/4114. - - Args: - client_options (google.api_core.client_options.ClientOptions): Custom options for the - client. Only the `api_endpoint` and `client_cert_source` properties may be used - in this method. - - Returns: - Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the - client cert source to use. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If any errors happen. - """ - return DataPolicyServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore - - @property - def transport(self) -> DataPolicyServiceTransport: - """Returns the transport used by the client instance. - - Returns: - DataPolicyServiceTransport: The transport used by the client instance. - """ - return self._client.transport - - @property - def api_endpoint(self): - """Return the API endpoint used by the client instance. - - Returns: - str: The API endpoint used by the client instance. - """ - return self._client._api_endpoint - - @property - def universe_domain(self) -> str: - """Return the universe domain used by the client instance. - - Returns: - str: The universe domain used - by the client instance. - """ - return self._client._universe_domain - - get_transport_class = DataPolicyServiceClient.get_transport_class - - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", - client_options: Optional[ClientOptions] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: - """Instantiates the data policy service async client. - - Args: - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): - The transport to use, or a Callable that constructs and returns a new transport to use. - If a Callable is given, it will be called with the same set of initialization - arguments as used in the DataPolicyServiceTransport constructor. - If set to None, a transport is chosen automatically. - client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): - Custom options for the client. - - 1. The ``api_endpoint`` property can be used to override the - default endpoint provided by the client when ``transport`` is - not explicitly provided. Only if this property is not set and - ``transport`` was not explicitly provided, the endpoint is - determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment - variable, which have one of the following values: - "always" (always use the default mTLS endpoint), "never" (always - use the default regular endpoint) and "auto" (auto-switch to the - default mTLS endpoint if client certificate is present; this is - the default value). - - 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable - is "true", then the ``client_cert_source`` property can be used - to provide a client certificate for mTLS transport. If - not provided, the default SSL client certificate will be used if - present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not - set, no client certificate will be used. - - 3. The ``universe_domain`` property can be used to override the - default "googleapis.com" universe. Note that ``api_endpoint`` - property still takes precedence; and ``universe_domain`` is - currently not supported for mTLS. - - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - - Raises: - google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport - creation failed for any reason. - """ - self._client = DataPolicyServiceClient( - credentials=credentials, - transport=transport, - client_options=client_options, - client_info=client_info, - - ) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER - _LOGGER.debug( - "Created client `google.cloud.bigquery.datapolicies_v1beta1.DataPolicyServiceAsyncClient`.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), - "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._client._transport, "_credentials") else { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "credentialsType": None, - } - ) - - async def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - async def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = await client.create_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest, dict]]): - The request object. Request message for the - CreateDataPolicy method. - parent (:class:`str`): - Required. Resource name of the project that the data - policy will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - data_policy (:class:`google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy`): - Required. The data policy to create. The ``name`` field - does not need to be provided for the data policy - creation. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent, data_policy] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.CreateDataPolicyRequest): - request = datapolicy.CreateDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - if data_policy is not None: - request.data_policy = data_policy - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - async def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = await client.update_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest, dict]]): - The request object. Response message for the - UpdateDataPolicy method. - data_policy (:class:`google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy`): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` - field. Other fields are updated to the specified values - based on the field masks. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - update_mask (:class:`google.protobuf.field_mask_pb2.FieldMask`): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are - allowed to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are - not allowed. - - This corresponds to the ``update_mask`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.UpdateDataPolicyRequest): - request = datapolicy.UpdateDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if data_policy is not None: - request.data_policy = data_policy - if update_mask is not None: - request.update_mask = update_mask - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: - r"""Deletes the data policy specified by its resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - async def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - await client.delete_data_policy(request=request) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest, dict]]): - The request object. Request message for the - DeleteDataPolicy method. - name (:class:`str`): - Required. Resource name of the data policy to delete. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.DeleteDataPolicyRequest): - request = datapolicy.DeleteDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - async def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Gets the data policy specified by its resource name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - async def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = await client.get_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest, dict]]): - The request object. Request message for the GetDataPolicy - method. - name (:class:`str`): - Required. Resource name of the requested data policy. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.GetDataPolicyRequest): - request = datapolicy.GetDataPolicyRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesAsyncPager: - r"""List all of the data policies in the specified parent - project. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - async def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - async for response in page_result: - print(response) - - Args: - request (Optional[Union[google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest, dict]]): - The request object. Request message for the - ListDataPolicies method. - parent (:class:`str`): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager: - Response message for the - ListDataPolicies method. - Iterating over this object will yield - results and resolve additional pages - automatically. - - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.ListDataPoliciesRequest): - request = datapolicy.ListDataPoliciesRequest(request) - - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # This method is paged; wrap the response in a pager, which provides - # an `__aiter__` convenience method. - response = pagers.ListDataPoliciesAsyncPager( - method=rpc, - request=request, - response=response, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Gets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.get_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]]): - The request object. Request message for ``GetIamPolicy`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.GetIamPolicyRequest(**request) - elif not request: - request = iam_policy_pb2.GetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Sets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.set_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]]): - The request object. Request message for ``SetIamPolicy`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.SetIamPolicyRequest(**request) - elif not request: - request = iam_policy_pb2.SetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: - r"""Returns the caller's permission on the specified data - policy resource. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - async def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = await client.test_iam_permissions(request=request) - - # Handle the response - print(response) - - Args: - request (Optional[Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]]): - The request object. Request message for ``TestIamPermissions`` method. - retry (google.api_core.retry_async.AsyncRetry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: - Response message for TestIamPermissions method. - """ - # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - if isinstance(request, dict): - request = iam_policy_pb2.TestIamPermissionsRequest(**request) - elif not request: - request = iam_policy_pb2.TestIamPermissionsRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._client._validate_universe_domain() - - # Send the request. - response = await rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - async def __aenter__(self) -> "DataPolicyServiceAsyncClient": - return self - - async def __aexit__(self, exc_type, exc, tb): - await self.transport.close() - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - - -__all__ = ( - "DataPolicyServiceAsyncClient", -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py deleted file mode 100644 index c30a37b9f313..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/client.py +++ /dev/null @@ -1,1519 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from collections import OrderedDict -from http import HTTPStatus -import json -import logging as std_logging -import os -import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast -import warnings - -from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version - -from google.api_core import client_options as client_options_lib -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport import mtls # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.auth.exceptions import MutualTLSChannelError # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -try: - OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.Retry, object, None] # type: ignore - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc import DataPolicyServiceGrpcTransport -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport - - -class DataPolicyServiceClientMeta(type): - """Metaclass for the DataPolicyService client. - - This provides class-level methods for building and retrieving - support objects (e.g. transport) without polluting the client instance - objects. - """ - _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] - _transport_registry["grpc"] = DataPolicyServiceGrpcTransport - _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport - - def get_transport_class(cls, - label: Optional[str] = None, - ) -> Type[DataPolicyServiceTransport]: - """Returns an appropriate transport class. - - Args: - label: The name of the desired transport. If none is - provided, then the first transport in the registry is used. - - Returns: - The transport class to use. - """ - # If a specific transport is requested, return that one. - if label: - return cls._transport_registry[label] - - # No transport is requested; return the default (that is, the first one - # in the dictionary). - return next(iter(cls._transport_registry.values())) - - -class DataPolicyServiceClient(metaclass=DataPolicyServiceClientMeta): - """Data Policy Service provides APIs for managing the - label-policy bindings. - """ - - @staticmethod - def _get_default_mtls_endpoint(api_endpoint): - """Converts api endpoint to mTLS endpoint. - - Convert "*.sandbox.googleapis.com" and "*.googleapis.com" to - "*.mtls.sandbox.googleapis.com" and "*.mtls.googleapis.com" respectively. - Args: - api_endpoint (Optional[str]): the api endpoint to convert. - Returns: - str: converted mTLS api endpoint. - """ - if not api_endpoint: - return api_endpoint - - mtls_endpoint_re = re.compile( - r"(?P[^.]+)(?P\.mtls)?(?P\.sandbox)?(?P\.googleapis\.com)?" - ) - - m = mtls_endpoint_re.match(api_endpoint) - name, mtls, sandbox, googledomain = m.groups() - if mtls or not googledomain: - return api_endpoint - - if sandbox: - return api_endpoint.replace( - "sandbox.googleapis.com", "mtls.sandbox.googleapis.com" - ) - - return api_endpoint.replace(".googleapis.com", ".mtls.googleapis.com") - - # Note: DEFAULT_ENDPOINT is deprecated. Use _DEFAULT_ENDPOINT_TEMPLATE instead. - DEFAULT_ENDPOINT = "bigquerydatapolicy.googleapis.com" - DEFAULT_MTLS_ENDPOINT = _get_default_mtls_endpoint.__func__( # type: ignore - DEFAULT_ENDPOINT - ) - - _DEFAULT_ENDPOINT_TEMPLATE = "bigquerydatapolicy.{UNIVERSE_DOMAIN}" - _DEFAULT_UNIVERSE = "googleapis.com" - - @classmethod - def from_service_account_info(cls, info: dict, *args, **kwargs): - """Creates an instance of this client using the provided credentials - info. - - Args: - info (dict): The service account private key info. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceClient: The constructed client. - """ - credentials = service_account.Credentials.from_service_account_info(info) - kwargs["credentials"] = credentials - return cls(*args, **kwargs) - - @classmethod - def from_service_account_file(cls, filename: str, *args, **kwargs): - """Creates an instance of this client using the provided credentials - file. - - Args: - filename (str): The path to the service account private key json - file. - args: Additional arguments to pass to the constructor. - kwargs: Additional arguments to pass to the constructor. - - Returns: - DataPolicyServiceClient: The constructed client. - """ - credentials = service_account.Credentials.from_service_account_file( - filename) - kwargs["credentials"] = credentials - return cls(*args, **kwargs) - - from_service_account_json = from_service_account_file - - @property - def transport(self) -> DataPolicyServiceTransport: - """Returns the transport used by the client instance. - - Returns: - DataPolicyServiceTransport: The transport used by the client - instance. - """ - return self._transport - - @staticmethod - def data_policy_path(project: str,location: str,data_policy: str,) -> str: - """Returns a fully-qualified data_policy string.""" - return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) - - @staticmethod - def parse_data_policy_path(path: str) -> Dict[str,str]: - """Parses a data_policy path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_billing_account_path(billing_account: str, ) -> str: - """Returns a fully-qualified billing_account string.""" - return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) - - @staticmethod - def parse_common_billing_account_path(path: str) -> Dict[str,str]: - """Parse a billing_account path into its component segments.""" - m = re.match(r"^billingAccounts/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_folder_path(folder: str, ) -> str: - """Returns a fully-qualified folder string.""" - return "folders/{folder}".format(folder=folder, ) - - @staticmethod - def parse_common_folder_path(path: str) -> Dict[str,str]: - """Parse a folder path into its component segments.""" - m = re.match(r"^folders/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_organization_path(organization: str, ) -> str: - """Returns a fully-qualified organization string.""" - return "organizations/{organization}".format(organization=organization, ) - - @staticmethod - def parse_common_organization_path(path: str) -> Dict[str,str]: - """Parse a organization path into its component segments.""" - m = re.match(r"^organizations/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_project_path(project: str, ) -> str: - """Returns a fully-qualified project string.""" - return "projects/{project}".format(project=project, ) - - @staticmethod - def parse_common_project_path(path: str) -> Dict[str,str]: - """Parse a project path into its component segments.""" - m = re.match(r"^projects/(?P.+?)$", path) - return m.groupdict() if m else {} - - @staticmethod - def common_location_path(project: str, location: str, ) -> str: - """Returns a fully-qualified location string.""" - return "projects/{project}/locations/{location}".format(project=project, location=location, ) - - @staticmethod - def parse_common_location_path(path: str) -> Dict[str,str]: - """Parse a location path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) - return m.groupdict() if m else {} - - @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): - """Deprecated. Return the API endpoint and client cert source for mutual TLS. - - The client cert source is determined in the following order: - (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the - client cert source is None. - (2) if `client_options.client_cert_source` is provided, use the provided one; if the - default client cert source exists, use the default one; otherwise the client cert - source is None. - - The API endpoint is determined in the following order: - (1) if `client_options.api_endpoint` if provided, use the provided one. - (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the - default mTLS endpoint; if the environment variable is "never", use the default API - endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise - use the default API endpoint. - - More details can be found at https://google.aip.dev/auth/4114. - - Args: - client_options (google.api_core.client_options.ClientOptions): Custom options for the - client. Only the `api_endpoint` and `client_cert_source` properties may be used - in this method. - - Returns: - Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the - client cert source to use. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If any errors happen. - """ - - warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", - DeprecationWarning) - if client_options is None: - client_options = client_options_lib.ClientOptions() - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") - use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") - if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") - if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") - - # Figure out the client cert source to use. - client_cert_source = None - if use_client_cert == "true": - if client_options.client_cert_source: - client_cert_source = client_options.client_cert_source - elif mtls.has_default_client_cert_source(): - client_cert_source = mtls.default_client_cert_source() - - # Figure out which api endpoint to use. - if client_options.api_endpoint is not None: - api_endpoint = client_options.api_endpoint - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): - api_endpoint = cls.DEFAULT_MTLS_ENDPOINT - else: - api_endpoint = cls.DEFAULT_ENDPOINT - - return api_endpoint, client_cert_source - - @staticmethod - def _read_environment_variables(): - """Returns the environment variables used by the client. - - Returns: - Tuple[bool, str, str]: returns the GOOGLE_API_USE_CLIENT_CERTIFICATE, - GOOGLE_API_USE_MTLS_ENDPOINT, and GOOGLE_CLOUD_UNIVERSE_DOMAIN environment variables. - - Raises: - ValueError: If GOOGLE_API_USE_CLIENT_CERTIFICATE is not - any of ["true", "false"]. - google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT - is not any of ["auto", "never", "always"]. - """ - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() - use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() - universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") - if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") - if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") - return use_client_cert == "true", use_mtls_endpoint, universe_domain_env - - @staticmethod - def _get_client_cert_source(provided_cert_source, use_cert_flag): - """Return the client cert source to be used by the client. - - Args: - provided_cert_source (bytes): The client certificate source provided. - use_cert_flag (bool): A flag indicating whether to use the client certificate. - - Returns: - bytes or None: The client cert source to be used by the client. - """ - client_cert_source = None - if use_cert_flag: - if provided_cert_source: - client_cert_source = provided_cert_source - elif mtls.has_default_client_cert_source(): - client_cert_source = mtls.default_client_cert_source() - return client_cert_source - - @staticmethod - def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): - """Return the API endpoint used by the client. - - Args: - api_override (str): The API endpoint override. If specified, this is always - the return value of this function and the other arguments are not used. - client_cert_source (bytes): The client certificate source used by the client. - universe_domain (str): The universe domain used by the client. - use_mtls_endpoint (str): How to use the mTLS endpoint, which depends also on the other parameters. - Possible values are "always", "auto", or "never". - - Returns: - str: The API endpoint to be used by the client. - """ - if api_override is not None: - api_endpoint = api_override - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): - _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - if universe_domain != _default_universe: - raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") - api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - else: - api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) - return api_endpoint - - @staticmethod - def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: - """Return the universe domain used by the client. - - Args: - client_universe_domain (Optional[str]): The universe domain configured via the client options. - universe_domain_env (Optional[str]): The universe domain configured via the "GOOGLE_CLOUD_UNIVERSE_DOMAIN" environment variable. - - Returns: - str: The universe domain to be used by the client. - - Raises: - ValueError: If the universe domain is an empty string. - """ - universe_domain = DataPolicyServiceClient._DEFAULT_UNIVERSE - if client_universe_domain is not None: - universe_domain = client_universe_domain - elif universe_domain_env is not None: - universe_domain = universe_domain_env - if len(universe_domain.strip()) == 0: - raise ValueError("Universe Domain cannot be an empty string.") - return universe_domain - - def _validate_universe_domain(self): - """Validates client's and credentials' universe domains are consistent. - - Returns: - bool: True iff the configured universe domain is valid. - - Raises: - ValueError: If the configured universe domain is not valid. - """ - - # NOTE (b/349488459): universe validation is disabled until further notice. - return True - - def _add_cred_info_for_auth_errors( - self, - error: core_exceptions.GoogleAPICallError - ) -> None: - """Adds credential info string to error details for 401/403/404 errors. - - Args: - error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. - """ - if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: - return - - cred = self._transport._credentials - - # get_cred_info is only available in google-auth>=2.35.0 - if not hasattr(cred, "get_cred_info"): - return - - # ignore the type check since pypy test fails when get_cred_info - # is not available - cred_info = cred.get_cred_info() # type: ignore - if cred_info and hasattr(error._details, "append"): - error._details.append(json.dumps(cred_info)) - - @property - def api_endpoint(self): - """Return the API endpoint used by the client instance. - - Returns: - str: The API endpoint used by the client instance. - """ - return self._api_endpoint - - @property - def universe_domain(self) -> str: - """Return the universe domain used by the client instance. - - Returns: - str: The universe domain used by the client instance. - """ - return self._universe_domain - - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, - client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: - """Instantiates the data policy service client. - - Args: - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - transport (Optional[Union[str,DataPolicyServiceTransport,Callable[..., DataPolicyServiceTransport]]]): - The transport to use, or a Callable that constructs and returns a new transport. - If a Callable is given, it will be called with the same set of initialization - arguments as used in the DataPolicyServiceTransport constructor. - If set to None, a transport is chosen automatically. - client_options (Optional[Union[google.api_core.client_options.ClientOptions, dict]]): - Custom options for the client. - - 1. The ``api_endpoint`` property can be used to override the - default endpoint provided by the client when ``transport`` is - not explicitly provided. Only if this property is not set and - ``transport`` was not explicitly provided, the endpoint is - determined by the GOOGLE_API_USE_MTLS_ENDPOINT environment - variable, which have one of the following values: - "always" (always use the default mTLS endpoint), "never" (always - use the default regular endpoint) and "auto" (auto-switch to the - default mTLS endpoint if client certificate is present; this is - the default value). - - 2. If the GOOGLE_API_USE_CLIENT_CERTIFICATE environment variable - is "true", then the ``client_cert_source`` property can be used - to provide a client certificate for mTLS transport. If - not provided, the default SSL client certificate will be used if - present. If GOOGLE_API_USE_CLIENT_CERTIFICATE is "false" or not - set, no client certificate will be used. - - 3. The ``universe_domain`` property can be used to override the - default "googleapis.com" universe. Note that the ``api_endpoint`` - property still takes precedence; and ``universe_domain`` is - currently not supported for mTLS. - - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport - creation failed for any reason. - """ - self._client_options = client_options - if isinstance(self._client_options, dict): - self._client_options = client_options_lib.from_dict(self._client_options) - if self._client_options is None: - self._client_options = client_options_lib.ClientOptions() - self._client_options = cast(client_options_lib.ClientOptions, self._client_options) - - universe_domain_opt = getattr(self._client_options, 'universe_domain', None) - - self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() - self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) - self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) - self._api_endpoint = None # updated below, depending on `transport` - - # Initialize the universe domain validation. - self._is_universe_domain_valid = False - - if CLIENT_LOGGING_SUPPORTED: # pragma: NO COVER - # Setup logging. - client_logging.initialize_logging() - - api_key_value = getattr(self._client_options, "api_key", None) - if api_key_value and credentials: - raise ValueError("client_options.api_key and credentials are mutually exclusive") - - # Save or instantiate the transport. - # Ordinarily, we provide the transport, but allowing a custom transport - # instance provides an extensibility point for unusual situations. - transport_provided = isinstance(transport, DataPolicyServiceTransport) - if transport_provided: - # transport is a DataPolicyServiceTransport instance. - if credentials or self._client_options.credentials_file or api_key_value: - raise ValueError("When providing a transport instance, " - "provide its credentials directly.") - if self._client_options.scopes: - raise ValueError( - "When providing a transport instance, provide its scopes " - "directly." - ) - self._transport = cast(DataPolicyServiceTransport, transport) - self._api_endpoint = self._transport.host - - self._api_endpoint = (self._api_endpoint or - DataPolicyServiceClient._get_api_endpoint( - self._client_options.api_endpoint, - self._client_cert_source, - self._universe_domain, - self._use_mtls_endpoint)) - - if not transport_provided: - import google.auth._default # type: ignore - - if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): - credentials = google.auth._default.get_api_key_credentials(api_key_value) - - transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( - DataPolicyServiceClient.get_transport_class(transport) - if isinstance(transport, str) or transport is None - else cast(Callable[..., DataPolicyServiceTransport], transport) - ) - # initialize with the provided callable or the passed in class - self._transport = transport_init( - credentials=credentials, - credentials_file=self._client_options.credentials_file, - host=self._api_endpoint, - scopes=self._client_options.scopes, - client_cert_source_for_mtls=self._client_cert_source, - quota_project_id=self._client_options.quota_project_id, - client_info=client_info, - always_use_jwt_access=True, - api_audience=self._client_options.api_audience, - ) - - if "async" not in str(self._transport): - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER - _LOGGER.debug( - "Created client `google.cloud.bigquery.datapolicies_v1beta1.DataPolicyServiceClient`.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), - "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._transport, "_credentials") else { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "credentialsType": None, - } - ) - - def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = client.create_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest, dict]): - The request object. Request message for the - CreateDataPolicy method. - parent (str): - Required. Resource name of the project that the data - policy will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): - Required. The data policy to create. The ``name`` field - does not need to be provided for the data policy - creation. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent, data_policy] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.CreateDataPolicyRequest): - request = datapolicy.CreateDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - if data_policy is not None: - request.data_policy = data_policy - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.create_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = client.update_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest, dict]): - The request object. Response message for the - UpdateDataPolicy method. - data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` - field. Other fields are updated to the specified values - based on the field masks. - - This corresponds to the ``data_policy`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - update_mask (google.protobuf.field_mask_pb2.FieldMask): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are - allowed to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are - not allowed. - - This corresponds to the ``update_mask`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.UpdateDataPolicyRequest): - request = datapolicy.UpdateDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if data_policy is not None: - request.data_policy = data_policy - if update_mask is not None: - request.update_mask = update_mask - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.update_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: - r"""Deletes the data policy specified by its resource - name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - client.delete_data_policy(request=request) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest, dict]): - The request object. Request message for the - DeleteDataPolicy method. - name (str): - Required. Resource name of the data policy to delete. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.DeleteDataPolicyRequest): - request = datapolicy.DeleteDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.delete_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: - r"""Gets the data policy specified by its resource name. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = client.get_data_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest, dict]): - The request object. Request message for the GetDataPolicy - method. - name (str): - Required. Resource name of the requested data policy. - Format is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - - This corresponds to the ``name`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy: - Represents the label-policy binding. - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.GetDataPolicyRequest): - request = datapolicy.GetDataPolicyRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if name is not None: - request.name = name - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.get_data_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesPager: - r"""List all of the data policies in the specified parent - project. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - - def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - for response in page_result: - print(response) - - Args: - request (Union[google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest, dict]): - The request object. Request message for the - ListDataPolicies method. - parent (str): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - - This corresponds to the ``parent`` field - on the ``request`` instance; if ``request`` is provided, this - should not be set. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesPager: - Response message for the - ListDataPolicies method. - Iterating over this object will yield - results and resolve additional pages - automatically. - - """ - # Create or coerce a protobuf request object. - # - Quick check: If we got a request object, we should *not* have - # gotten any keyword arguments that map to the request. - flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 - if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') - - # - Use the request object if provided (there's no risk of modifying the input as - # there are no flattened fields), or create one. - if not isinstance(request, datapolicy.ListDataPoliciesRequest): - request = datapolicy.ListDataPoliciesRequest(request) - # If we have keyword arguments corresponding to fields on the - # request, apply these. - if parent is not None: - request.parent = parent - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.list_data_policies] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # This method is paged; wrap the response in a pager, which provides - # an `__iter__` convenience method. - response = pagers.ListDataPoliciesPager( - method=rpc, - request=request, - response=response, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Gets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.get_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): - The request object. Request message for ``GetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.GetIamPolicyRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.GetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.get_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: - r"""Sets the IAM policy for the specified data policy. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.set_iam_policy(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): - The request object. Request message for ``SetIamPolicy`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.policy_pb2.Policy: - An Identity and Access Management (IAM) policy, which specifies access - controls for Google Cloud resources. - - A Policy is a collection of bindings. A binding binds - one or more members, or principals, to a single role. - Principals can be user accounts, service accounts, - Google groups, and domains (such as G Suite). A role - is a named list of permissions; each role can be an - IAM predefined role or a user-created custom role. - - For some types of Google Cloud resources, a binding - can also specify a condition, which is a logical - expression that allows access to a resource only if - the expression evaluates to true. A condition can add - constraints based on attributes of the request, the - resource, or both. To learn which resources support - conditions in their IAM policies, see the [IAM - documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies). - - **JSON example:** - - :literal:`\` { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }`\ \` - - **YAML example:** - - :literal:`\` bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \` - - For a description of IAM and its features, see the - [IAM - documentation](\ https://cloud.google.com/iam/docs/). - - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.SetIamPolicyRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.SetIamPolicyRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.set_iam_policy] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: - r"""Returns the caller's permission on the specified data - policy resource. - - .. code-block:: python - - # This snippet has been automatically generated and should be regarded as a - # code template only. - # It will require modifications to work: - # - It may require correct/in-range values for request initialization. - # - It may require specifying regional endpoints when creating the service - # client as shown in: - # https://googleapis.dev/python/google-api-core/latest/client_options.html - from google.cloud import bigquery_datapolicies_v1beta1 - from google.iam.v1 import iam_policy_pb2 # type: ignore - - def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = client.test_iam_permissions(request=request) - - # Handle the response - print(response) - - Args: - request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): - The request object. Request message for ``TestIamPermissions`` method. - retry (google.api_core.retry.Retry): Designation of what errors, if any, - should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - - Returns: - google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse: - Response message for TestIamPermissions method. - """ - # Create or coerce a protobuf request object. - if isinstance(request, dict): - # - The request isn't a proto-plus wrapped type, - # so it must be constructed via keyword expansion. - request = iam_policy_pb2.TestIamPermissionsRequest(**request) - elif not request: - # Null request, just make one. - request = iam_policy_pb2.TestIamPermissionsRequest() - - # Wrap the RPC method; this adds retry and timeout information, - # and friendly error handling. - rpc = self._transport._wrapped_methods[self._transport.test_iam_permissions] - - # Certain fields should be provided within the metadata header; - # add these here. - metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), - ) - - # Validate the universe domain. - self._validate_universe_domain() - - # Send the request. - response = rpc( - request, - retry=retry, - timeout=timeout, - metadata=metadata, - ) - - # Done; return the response. - return response - - def __enter__(self) -> "DataPolicyServiceClient": - return self - - def __exit__(self, type, value, traceback): - """Releases underlying transport's resources. - - .. warning:: - ONLY use as a context manager if the transport is NOT shared - with other clients! Exiting the with block will CLOSE the transport - and may cause errors in other clients! - """ - self.transport.close() - - - - - - - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - -__all__ = ( - "DataPolicyServiceClient", -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py deleted file mode 100644 index 6a42e5f218a9..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/pagers.py +++ /dev/null @@ -1,166 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.api_core import retry_async as retries_async -from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union -try: - OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] - OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] -except AttributeError: # pragma: NO COVER - OptionalRetry = Union[retries.Retry, object, None] # type: ignore - OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore - -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy - - -class ListDataPoliciesPager: - """A pager for iterating through ``list_data_policies`` requests. - - This class thinly wraps an initial - :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` object, and - provides an ``__iter__`` method to iterate through its - ``data_policies`` field. - - If there are more pages, the ``__iter__`` method will make additional - ``ListDataPolicies`` requests and continue to iterate - through the ``data_policies`` field on the - corresponding responses. - - All the usual :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` - attributes are available on the pager. If multiple requests are made, only - the most recent response is retained, and thus used for attribute lookup. - """ - def __init__(self, - method: Callable[..., datapolicy.ListDataPoliciesResponse], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): - """Instantiate the pager. - - Args: - method (Callable): The method that was originally called, and - which instantiated this pager. - request (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest): - The initial request object. - response (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse): - The initial response object. - retry (google.api_core.retry.Retry): Designation of what errors, - if any, should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - self._method = method - self._request = datapolicy.ListDataPoliciesRequest(request) - self._response = response - self._retry = retry - self._timeout = timeout - self._metadata = metadata - - def __getattr__(self, name: str) -> Any: - return getattr(self._response, name) - - @property - def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: - yield self._response - while self._response.next_page_token: - self._request.page_token = self._response.next_page_token - self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) - yield self._response - - def __iter__(self) -> Iterator[datapolicy.DataPolicy]: - for page in self.pages: - yield from page.data_policies - - def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) - - -class ListDataPoliciesAsyncPager: - """A pager for iterating through ``list_data_policies`` requests. - - This class thinly wraps an initial - :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` object, and - provides an ``__aiter__`` method to iterate through its - ``data_policies`` field. - - If there are more pages, the ``__aiter__`` method will make additional - ``ListDataPolicies`` requests and continue to iterate - through the ``data_policies`` field on the - corresponding responses. - - All the usual :class:`google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse` - attributes are available on the pager. If multiple requests are made, only - the most recent response is retained, and thus used for attribute lookup. - """ - def __init__(self, - method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): - """Instantiates the pager. - - Args: - method (Callable): The method that was originally called, and - which instantiated this pager. - request (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest): - The initial request object. - response (google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesResponse): - The initial response object. - retry (google.api_core.retry.AsyncRetry): Designation of what errors, - if any, should be retried. - timeout (float): The timeout for this request. - metadata (Sequence[Tuple[str, Union[str, bytes]]]): Key/value pairs which should be - sent along with the request as metadata. Normally, each value must be of type `str`, - but for metadata keys ending with the suffix `-bin`, the corresponding values must - be of type `bytes`. - """ - self._method = method - self._request = datapolicy.ListDataPoliciesRequest(request) - self._response = response - self._retry = retry - self._timeout = timeout - self._metadata = metadata - - def __getattr__(self, name: str) -> Any: - return getattr(self._response, name) - - @property - async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: - yield self._response - while self._response.next_page_token: - self._request.page_token = self._response.next_page_token - self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) - yield self._response - def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: - async def async_generator(): - async for page in self.pages: - for response in page.data_policies: - yield response - - return async_generator() - - def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py deleted file mode 100644 index e66bac610f73..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/base.py +++ /dev/null @@ -1,333 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import abc -from typing import Awaitable, Callable, Dict, Optional, Sequence, Union - -from google.cloud.bigquery_datapolicies_v1beta1 import gapic_version as package_version - -import google.auth # type: ignore -import google.api_core -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) - -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER - DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ - - -class DataPolicyServiceTransport(abc.ABC): - """Abstract transport class for DataPolicyService.""" - - AUTH_SCOPES = ( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', - ) - - DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' - - def __init__( - self, *, - host: str = DEFAULT_HOST, - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - **kwargs, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is mutually exclusive with credentials. - scopes (Optional[Sequence[str]]): A list of scopes. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - """ - - scopes_kwargs = {"scopes": scopes, "default_scopes": self.AUTH_SCOPES} - - # Save the scopes. - self._scopes = scopes - if not hasattr(self, "_ignore_credentials"): - self._ignore_credentials: bool = False - - # If no credentials are provided, then determine the appropriate - # defaults. - if credentials and credentials_file: - raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") - - if credentials_file is not None: - credentials, _ = google.auth.load_credentials_from_file( - credentials_file, - **scopes_kwargs, - quota_project_id=quota_project_id - ) - elif credentials is None and not self._ignore_credentials: - credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) - # Don't apply audience if the credentials file passed from user. - if hasattr(credentials, "with_gdch_audience"): - credentials = credentials.with_gdch_audience(api_audience if api_audience else host) - - # If the credentials are service account credentials, then always try to use self signed JWT. - if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): - credentials = credentials.with_always_use_jwt_access(True) - - # Save the credentials. - self._credentials = credentials - - # Save the hostname. Default to port 443 (HTTPS) if none is specified. - if ':' not in host: - host += ':443' - self._host = host - - @property - def host(self): - return self._host - - def _prep_wrapped_messages(self, client_info): - # Precompute the wrapped methods. - self._wrapped_methods = { - self.create_data_policy: gapic_v1.method.wrap_method( - self.create_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.update_data_policy: gapic_v1.method.wrap_method( - self.update_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.delete_data_policy: gapic_v1.method.wrap_method( - self.delete_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_data_policy: gapic_v1.method.wrap_method( - self.get_data_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.list_data_policies: gapic_v1.method.wrap_method( - self.list_data_policies, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_iam_policy: gapic_v1.method.wrap_method( - self.get_iam_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.set_iam_policy: gapic_v1.method.wrap_method( - self.set_iam_policy, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.test_iam_permissions: gapic_v1.method.wrap_method( - self.test_iam_permissions, - default_retry=retries.Retry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - } - - def close(self): - """Closes resources associated with the transport. - - .. warning:: - Only call this method if the transport is NOT shared - with other clients - this may cause errors in other clients! - """ - raise NotImplementedError() - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Union[ - empty_pb2.Empty, - Awaitable[empty_pb2.Empty] - ]]: - raise NotImplementedError() - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: - raise NotImplementedError() - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Union[ - datapolicy.ListDataPoliciesResponse, - Awaitable[datapolicy.ListDataPoliciesResponse] - ]]: - raise NotImplementedError() - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: - raise NotImplementedError() - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: - raise NotImplementedError() - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Union[ - iam_policy_pb2.TestIamPermissionsResponse, - Awaitable[iam_policy_pb2.TestIamPermissionsResponse] - ]]: - raise NotImplementedError() - - @property - def kind(self) -> str: - raise NotImplementedError() - - -__all__ = ( - 'DataPolicyServiceTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py deleted file mode 100644 index b002d2deac25..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc.py +++ /dev/null @@ -1,539 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import json -import logging as std_logging -import pickle -import warnings -from typing import Callable, Dict, Optional, Sequence, Tuple, Union - -from google.api_core import grpc_helpers -from google.api_core import gapic_v1 -import google.auth # type: ignore -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.protobuf.json_format import MessageToJson -import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore - -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - - -class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER - def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) - if logging_enabled: # pragma: NO COVER - request_metadata = client_call_details.metadata - if isinstance(request, proto.Message): - request_payload = type(request).to_json(request) - elif isinstance(request, google.protobuf.message.Message): - request_payload = MessageToJson(request) - else: - request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" - - request_metadata = { - key: value.decode("utf-8") if isinstance(value, bytes) else value - for key, value in request_metadata - } - grpc_request = { - "payload": request_payload, - "requestMethod": "grpc", - "metadata": dict(request_metadata), - } - _LOGGER.debug( - f"Sending request for {client_call_details.method}", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "rpcName": str(client_call_details.method), - "request": grpc_request, - "metadata": grpc_request["metadata"], - }, - ) - response = continuation(client_call_details, request) - if logging_enabled: # pragma: NO COVER - response_metadata = response.trailing_metadata() - # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None - result = response.result() - if isinstance(result, proto.Message): - response_payload = type(result).to_json(result) - elif isinstance(result, google.protobuf.message.Message): - response_payload = MessageToJson(result) - else: - response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" - grpc_response = { - "payload": response_payload, - "metadata": metadata, - "status": "OK", - } - _LOGGER.debug( - f"Received response for {client_call_details.method}.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "rpcName": client_call_details.method, - "response": grpc_response, - "metadata": grpc_response["metadata"], - }, - ) - return response - - -class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): - """gRPC backend transport for DataPolicyService. - - Data Policy Service provides APIs for managing the - label-policy bindings. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends protocol buffers over the wire using gRPC (which is built on - top of HTTP/2); the ``grpcio`` package must be installed. - """ - _stubs: Dict[str, Callable] - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - This argument is ignored if a ``channel`` instance is provided. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is ignored if a ``channel`` instance is provided. - scopes (Optional(Sequence[str])): A list of scopes. This argument is - ignored if a ``channel`` instance is provided. - channel (Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]]): - A ``Channel`` instance through which to make calls, or a Callable - that constructs and returns one. If set to None, ``self.create_channel`` - is used to create the channel. If a Callable is given, it will be called - with the same arguments as used in ``self.create_channel``. - api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. - If provided, it overrides the ``host`` argument and tries to create - a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or application default SSL credentials. - client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): - Deprecated. A callback to provide client SSL certificate bytes and - private key bytes, both in PEM format. It is ignored if - ``api_mtls_endpoint`` is None. - ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for the grpc channel. It is ignored if a ``channel`` instance is provided. - client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): - A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure a mutual TLS channel. It is - ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - - Raises: - google.auth.exceptions.MutualTLSChannelError: If mutual TLS transport - creation failed for any reason. - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - self._grpc_channel = None - self._ssl_channel_credentials = ssl_channel_credentials - self._stubs: Dict[str, Callable] = {} - - if api_mtls_endpoint: - warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) - if client_cert_source: - warnings.warn("client_cert_source is deprecated", DeprecationWarning) - - if isinstance(channel, grpc.Channel): - # Ignore credentials if a channel was passed. - credentials = None - self._ignore_credentials = True - # If a channel was explicitly provided, set it. - self._grpc_channel = channel - self._ssl_channel_credentials = None - - else: - if api_mtls_endpoint: - host = api_mtls_endpoint - - # Create SSL credentials with client_cert_source or application - # default SSL credentials. - if client_cert_source: - cert, key = client_cert_source() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - else: - self._ssl_channel_credentials = SslCredentials().ssl_credentials - - else: - if client_cert_source_for_mtls and not ssl_channel_credentials: - cert, key = client_cert_source_for_mtls() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - - # The base transport sets the host, credentials and scopes - super().__init__( - host=host, - credentials=credentials, - credentials_file=credentials_file, - scopes=scopes, - quota_project_id=quota_project_id, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience, - ) - - if not self._grpc_channel: - # initialize with the provided callable or the default channel - channel_init = channel or type(self).create_channel - self._grpc_channel = channel_init( - self._host, - # use the credentials which are saved - credentials=self._credentials, - # Set ``credentials_file`` to ``None`` here as - # the credentials that we saved earlier should be used. - credentials_file=None, - scopes=self._scopes, - ssl_credentials=self._ssl_channel_credentials, - quota_project_id=quota_project_id, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - self._interceptor = _LoggingClientInterceptor() - self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) - - # Wrap messages. This must be done after self._logged_channel exists - self._prep_wrapped_messages(client_info) - - @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> grpc.Channel: - """Create and return a gRPC channel object. - Args: - host (Optional[str]): The host for the channel to use. - credentials (Optional[~.Credentials]): The - authorization credentials to attach to requests. These - credentials identify this application to the service. If - none are specified, the client will attempt to ascertain - the credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is mutually exclusive with credentials. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - kwargs (Optional[dict]): Keyword arguments, which are passed to the - channel creation. - Returns: - grpc.Channel: A gRPC channel object. - - Raises: - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - - return grpc_helpers.create_channel( - host, - credentials=credentials, - credentials_file=credentials_file, - quota_project_id=quota_project_id, - default_scopes=cls.AUTH_SCOPES, - scopes=scopes, - default_host=cls.DEFAULT_HOST, - **kwargs - ) - - @property - def grpc_channel(self) -> grpc.Channel: - """Return the channel designed to connect to this service. - """ - return self._grpc_channel - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the create data policy method over gRPC. - - Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - Returns: - Callable[[~.CreateDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/CreateDataPolicy', - request_serializer=datapolicy.CreateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['create_data_policy'] - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the update data policy method over gRPC. - - Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - Returns: - Callable[[~.UpdateDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/UpdateDataPolicy', - request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['update_data_policy'] - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: - r"""Return a callable for the delete data policy method over gRPC. - - Deletes the data policy specified by its resource - name. - - Returns: - Callable[[~.DeleteDataPolicyRequest], - ~.Empty]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/DeleteDataPolicy', - request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, - response_deserializer=empty_pb2.Empty.FromString, - ) - return self._stubs['delete_data_policy'] - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: - r"""Return a callable for the get data policy method over gRPC. - - Gets the data policy specified by its resource name. - - Returns: - Callable[[~.GetDataPolicyRequest], - ~.DataPolicy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetDataPolicy', - request_serializer=datapolicy.GetDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['get_data_policy'] - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: - r"""Return a callable for the list data policies method over gRPC. - - List all of the data policies in the specified parent - project. - - Returns: - Callable[[~.ListDataPoliciesRequest], - ~.ListDataPoliciesResponse]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/ListDataPolicies', - request_serializer=datapolicy.ListDataPoliciesRequest.serialize, - response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, - ) - return self._stubs['list_data_policies'] - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: - r"""Return a callable for the get iam policy method over gRPC. - - Gets the IAM policy for the specified data policy. - - Returns: - Callable[[~.GetIamPolicyRequest], - ~.Policy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetIamPolicy', - request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['get_iam_policy'] - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: - r"""Return a callable for the set iam policy method over gRPC. - - Sets the IAM policy for the specified data policy. - - Returns: - Callable[[~.SetIamPolicyRequest], - ~.Policy]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/SetIamPolicy', - request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['set_iam_policy'] - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: - r"""Return a callable for the test iam permissions method over gRPC. - - Returns the caller's permission on the specified data - policy resource. - - Returns: - Callable[[~.TestIamPermissionsRequest], - ~.TestIamPermissionsResponse]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/TestIamPermissions', - request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, - response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, - ) - return self._stubs['test_iam_permissions'] - - def close(self): - self._logged_channel.close() - - @property - def kind(self) -> str: - return "grpc" - - -__all__ = ( - 'DataPolicyServiceGrpcTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py deleted file mode 100644 index 36bdf106655f..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/grpc_asyncio.py +++ /dev/null @@ -1,667 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import inspect -import json -import pickle -import logging as std_logging -import warnings -from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union - -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers_async -from google.api_core import exceptions as core_exceptions -from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.protobuf.json_format import MessageToJson -import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore -from grpc.experimental import aio # type: ignore - -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .grpc import DataPolicyServiceGrpcTransport - -try: - from google.api_core import client_logging # type: ignore - CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER -except ImportError: # pragma: NO COVER - CLIENT_LOGGING_SUPPORTED = False - -_LOGGER = std_logging.getLogger(__name__) - - -class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER - async def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) - if logging_enabled: # pragma: NO COVER - request_metadata = client_call_details.metadata - if isinstance(request, proto.Message): - request_payload = type(request).to_json(request) - elif isinstance(request, google.protobuf.message.Message): - request_payload = MessageToJson(request) - else: - request_payload = f"{type(request).__name__}: {pickle.dumps(request)}" - - request_metadata = { - key: value.decode("utf-8") if isinstance(value, bytes) else value - for key, value in request_metadata - } - grpc_request = { - "payload": request_payload, - "requestMethod": "grpc", - "metadata": dict(request_metadata), - } - _LOGGER.debug( - f"Sending request for {client_call_details.method}", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "rpcName": str(client_call_details.method), - "request": grpc_request, - "metadata": grpc_request["metadata"], - }, - ) - response = await continuation(client_call_details, request) - if logging_enabled: # pragma: NO COVER - response_metadata = await response.trailing_metadata() - # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None - result = await response - if isinstance(result, proto.Message): - response_payload = type(result).to_json(result) - elif isinstance(result, google.protobuf.message.Message): - response_payload = MessageToJson(result) - else: - response_payload = f"{type(result).__name__}: {pickle.dumps(result)}" - grpc_response = { - "payload": response_payload, - "metadata": metadata, - "status": "OK", - } - _LOGGER.debug( - f"Received response to rpc {client_call_details.method}.", - extra = { - "serviceName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "rpcName": str(client_call_details.method), - "response": grpc_response, - "metadata": grpc_response["metadata"], - }, - ) - return response - - -class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): - """gRPC AsyncIO backend transport for DataPolicyService. - - Data Policy Service provides APIs for managing the - label-policy bindings. - - This class defines the same methods as the primary client, so the - primary client can load the underlying transport implementation - and call it. - - It sends protocol buffers over the wire using gRPC (which is built on - top of HTTP/2); the ``grpcio`` package must be installed. - """ - - _grpc_channel: aio.Channel - _stubs: Dict[str, Callable] = {} - - @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> aio.Channel: - """Create and return a gRPC AsyncIO channel object. - Args: - host (Optional[str]): The host for the channel to use. - credentials (Optional[~.Credentials]): The - authorization credentials to attach to requests. These - credentials identify this application to the service. If - none are specified, the client will attempt to ascertain - the credentials from the environment. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - kwargs (Optional[dict]): Keyword arguments, which are passed to the - channel creation. - Returns: - aio.Channel: A gRPC AsyncIO channel object. - """ - - return grpc_helpers_async.create_channel( - host, - credentials=credentials, - credentials_file=credentials_file, - quota_project_id=quota_project_id, - default_scopes=cls.AUTH_SCOPES, - scopes=scopes, - default_host=cls.DEFAULT_HOST, - **kwargs - ) - - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: - """Instantiate the transport. - - Args: - host (Optional[str]): - The hostname to connect to (default: 'bigquerydatapolicy.googleapis.com'). - credentials (Optional[google.auth.credentials.Credentials]): The - authorization credentials to attach to requests. These - credentials identify the application to the service; if none - are specified, the client will attempt to ascertain the - credentials from the environment. - This argument is ignored if a ``channel`` instance is provided. - credentials_file (Optional[str]): A file with credentials that can - be loaded with :func:`google.auth.load_credentials_from_file`. - This argument is ignored if a ``channel`` instance is provided. - scopes (Optional[Sequence[str]]): A optional list of scopes needed for this - service. These are only used when credentials are not specified and - are passed to :func:`google.auth.default`. - channel (Optional[Union[aio.Channel, Callable[..., aio.Channel]]]): - A ``Channel`` instance through which to make calls, or a Callable - that constructs and returns one. If set to None, ``self.create_channel`` - is used to create the channel. If a Callable is given, it will be called - with the same arguments as used in ``self.create_channel``. - api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. - If provided, it overrides the ``host`` argument and tries to create - a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or application default SSL credentials. - client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): - Deprecated. A callback to provide client SSL certificate bytes and - private key bytes, both in PEM format. It is ignored if - ``api_mtls_endpoint`` is None. - ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for the grpc channel. It is ignored if a ``channel`` instance is provided. - client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): - A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure a mutual TLS channel. It is - ignored if a ``channel`` instance or ``ssl_channel_credentials`` is provided. - quota_project_id (Optional[str]): An optional project to use for billing - and quota. - client_info (google.api_core.gapic_v1.client_info.ClientInfo): - The client info used to send a user-agent string along with - API requests. If ``None``, then default info will be used. - Generally, you only need to set this if you're developing - your own client library. - always_use_jwt_access (Optional[bool]): Whether self signed JWT should - be used for service account credentials. - - Raises: - google.auth.exceptions.MutualTlsChannelError: If mutual TLS transport - creation failed for any reason. - google.api_core.exceptions.DuplicateCredentialArgs: If both ``credentials`` - and ``credentials_file`` are passed. - """ - self._grpc_channel = None - self._ssl_channel_credentials = ssl_channel_credentials - self._stubs: Dict[str, Callable] = {} - - if api_mtls_endpoint: - warnings.warn("api_mtls_endpoint is deprecated", DeprecationWarning) - if client_cert_source: - warnings.warn("client_cert_source is deprecated", DeprecationWarning) - - if isinstance(channel, aio.Channel): - # Ignore credentials if a channel was passed. - credentials = None - self._ignore_credentials = True - # If a channel was explicitly provided, set it. - self._grpc_channel = channel - self._ssl_channel_credentials = None - else: - if api_mtls_endpoint: - host = api_mtls_endpoint - - # Create SSL credentials with client_cert_source or application - # default SSL credentials. - if client_cert_source: - cert, key = client_cert_source() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - else: - self._ssl_channel_credentials = SslCredentials().ssl_credentials - - else: - if client_cert_source_for_mtls and not ssl_channel_credentials: - cert, key = client_cert_source_for_mtls() - self._ssl_channel_credentials = grpc.ssl_channel_credentials( - certificate_chain=cert, private_key=key - ) - - # The base transport sets the host, credentials and scopes - super().__init__( - host=host, - credentials=credentials, - credentials_file=credentials_file, - scopes=scopes, - quota_project_id=quota_project_id, - client_info=client_info, - always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience, - ) - - if not self._grpc_channel: - # initialize with the provided callable or the default channel - channel_init = channel or type(self).create_channel - self._grpc_channel = channel_init( - self._host, - # use the credentials which are saved - credentials=self._credentials, - # Set ``credentials_file`` to ``None`` here as - # the credentials that we saved earlier should be used. - credentials_file=None, - scopes=self._scopes, - ssl_credentials=self._ssl_channel_credentials, - quota_project_id=quota_project_id, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - self._interceptor = _LoggingClientAIOInterceptor() - self._grpc_channel._unary_unary_interceptors.append(self._interceptor) - self._logged_channel = self._grpc_channel - self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters - # Wrap messages. This must be done after self._logged_channel exists - self._prep_wrapped_messages(client_info) - - @property - def grpc_channel(self) -> aio.Channel: - """Create the channel designed to connect to this service. - - This property caches on the instance; repeated calls return - the same channel. - """ - # Return the channel from cache. - return self._grpc_channel - - @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the create data policy method over gRPC. - - Creates a new data policy under a project with the given - ``dataPolicyId`` (used as the display name), policy tag, and - data policy type. - - Returns: - Callable[[~.CreateDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/CreateDataPolicy', - request_serializer=datapolicy.CreateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['create_data_policy'] - - @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the update data policy method over gRPC. - - Updates the metadata for an existing data policy. The - target data policy can be specified by the resource - name. - - Returns: - Callable[[~.UpdateDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/UpdateDataPolicy', - request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['update_data_policy'] - - @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Awaitable[empty_pb2.Empty]]: - r"""Return a callable for the delete data policy method over gRPC. - - Deletes the data policy specified by its resource - name. - - Returns: - Callable[[~.DeleteDataPolicyRequest], - Awaitable[~.Empty]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/DeleteDataPolicy', - request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, - response_deserializer=empty_pb2.Empty.FromString, - ) - return self._stubs['delete_data_policy'] - - @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: - r"""Return a callable for the get data policy method over gRPC. - - Gets the data policy specified by its resource name. - - Returns: - Callable[[~.GetDataPolicyRequest], - Awaitable[~.DataPolicy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetDataPolicy', - request_serializer=datapolicy.GetDataPolicyRequest.serialize, - response_deserializer=datapolicy.DataPolicy.deserialize, - ) - return self._stubs['get_data_policy'] - - @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Awaitable[datapolicy.ListDataPoliciesResponse]]: - r"""Return a callable for the list data policies method over gRPC. - - List all of the data policies in the specified parent - project. - - Returns: - Callable[[~.ListDataPoliciesRequest], - Awaitable[~.ListDataPoliciesResponse]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/ListDataPolicies', - request_serializer=datapolicy.ListDataPoliciesRequest.serialize, - response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, - ) - return self._stubs['list_data_policies'] - - @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: - r"""Return a callable for the get iam policy method over gRPC. - - Gets the IAM policy for the specified data policy. - - Returns: - Callable[[~.GetIamPolicyRequest], - Awaitable[~.Policy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/GetIamPolicy', - request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['get_iam_policy'] - - @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: - r"""Return a callable for the set iam policy method over gRPC. - - Sets the IAM policy for the specified data policy. - - Returns: - Callable[[~.SetIamPolicyRequest], - Awaitable[~.Policy]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/SetIamPolicy', - request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, - response_deserializer=policy_pb2.Policy.FromString, - ) - return self._stubs['set_iam_policy'] - - @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: - r"""Return a callable for the test iam permissions method over gRPC. - - Returns the caller's permission on the specified data - policy resource. - - Returns: - Callable[[~.TestIamPermissionsRequest], - Awaitable[~.TestIamPermissionsResponse]]: - A function that, when called, will call the underlying RPC - on the server. - """ - # Generate a "stub function" on-the-fly which will actually make - # the request. - # gRPC handles serialization and deserialization, so we just need - # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService/TestIamPermissions', - request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, - response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, - ) - return self._stubs['test_iam_permissions'] - - def _prep_wrapped_messages(self, client_info): - """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" - self._wrapped_methods = { - self.create_data_policy: self._wrap_method( - self.create_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.update_data_policy: self._wrap_method( - self.update_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.delete_data_policy: self._wrap_method( - self.delete_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_data_policy: self._wrap_method( - self.get_data_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.list_data_policies: self._wrap_method( - self.list_data_policies, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.get_iam_policy: self._wrap_method( - self.get_iam_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.set_iam_policy: self._wrap_method( - self.set_iam_policy, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - self.test_iam_permissions: self._wrap_method( - self.test_iam_permissions, - default_retry=retries.AsyncRetry( - initial=1.0, - maximum=10.0, - multiplier=1.3, - predicate=retries.if_exception_type( - core_exceptions.ServiceUnavailable, - ), - deadline=60.0, - ), - default_timeout=60.0, - client_info=client_info, - ), - } - - def _wrap_method(self, func, *args, **kwargs): - if self._wrap_with_kind: # pragma: NO COVER - kwargs["kind"] = self.kind - return gapic_v1.method_async.wrap_method(func, *args, **kwargs) - - def close(self): - return self._logged_channel.close() - - @property - def kind(self) -> str: - return "grpc_asyncio" - - -__all__ = ( - 'DataPolicyServiceGrpcAsyncIOTransport', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py deleted file mode 100644 index 9bcedeb0addd..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/datapolicy.py +++ /dev/null @@ -1,320 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from __future__ import annotations - -from typing import MutableMapping, MutableSequence - -import proto # type: ignore - -from google.protobuf import field_mask_pb2 # type: ignore - - -__protobuf__ = proto.module( - package='google.cloud.bigquery.datapolicies.v1beta1', - manifest={ - 'CreateDataPolicyRequest', - 'UpdateDataPolicyRequest', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'DataPolicy', - 'DataMaskingPolicy', - }, -) - - -class CreateDataPolicyRequest(proto.Message): - r"""Request message for the CreateDataPolicy method. - - Attributes: - parent (str): - Required. Resource name of the project that the data policy - will belong to. The format is - ``projects/{project_number}/locations/{location_id}``. - data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): - Required. The data policy to create. The ``name`` field does - not need to be provided for the data policy creation. - """ - - parent: str = proto.Field( - proto.STRING, - number=1, - ) - data_policy: 'DataPolicy' = proto.Field( - proto.MESSAGE, - number=2, - message='DataPolicy', - ) - - -class UpdateDataPolicyRequest(proto.Message): - r"""Response message for the UpdateDataPolicy method. - - Attributes: - data_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy): - Required. Update the data policy's metadata. - - The target data policy is determined by the ``name`` field. - Other fields are updated to the specified values based on - the field masks. - update_mask (google.protobuf.field_mask_pb2.FieldMask): - The update mask applies to the resource. For the - ``FieldMask`` definition, see - https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask - If not set, defaults to all of the fields that are allowed - to update. - - Updates to the ``name`` and ``dataPolicyId`` fields are not - allowed. - """ - - data_policy: 'DataPolicy' = proto.Field( - proto.MESSAGE, - number=1, - message='DataPolicy', - ) - update_mask: field_mask_pb2.FieldMask = proto.Field( - proto.MESSAGE, - number=2, - message=field_mask_pb2.FieldMask, - ) - - -class DeleteDataPolicyRequest(proto.Message): - r"""Request message for the DeleteDataPolicy method. - - Attributes: - name (str): - Required. Resource name of the data policy to delete. Format - is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - """ - - name: str = proto.Field( - proto.STRING, - number=1, - ) - - -class GetDataPolicyRequest(proto.Message): - r"""Request message for the GetDataPolicy method. - - Attributes: - name (str): - Required. Resource name of the requested data policy. Format - is - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - """ - - name: str = proto.Field( - proto.STRING, - number=1, - ) - - -class ListDataPoliciesRequest(proto.Message): - r"""Request message for the ListDataPolicies method. - - Attributes: - parent (str): - Required. Resource name of the project for which to list - data policies. Format is - ``projects/{project_number}/locations/{location_id}``. - page_size (int): - The maximum number of data policies to - return. Must be a value between 1 and 1000. - If not set, defaults to 50. - page_token (str): - The ``nextPageToken`` value returned from a previous list - request, if any. If not set, defaults to an empty string. - """ - - parent: str = proto.Field( - proto.STRING, - number=1, - ) - page_size: int = proto.Field( - proto.INT32, - number=2, - ) - page_token: str = proto.Field( - proto.STRING, - number=3, - ) - - -class ListDataPoliciesResponse(proto.Message): - r"""Response message for the ListDataPolicies method. - - Attributes: - data_policies (MutableSequence[google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy]): - Data policies that belong to the requested - project. - next_page_token (str): - Token used to retrieve the next page of - results, or empty if there are no more results. - """ - - @property - def raw_page(self): - return self - - data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( - proto.MESSAGE, - number=1, - message='DataPolicy', - ) - next_page_token: str = proto.Field( - proto.STRING, - number=2, - ) - - -class DataPolicy(proto.Message): - r"""Represents the label-policy binding. - - .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields - - Attributes: - policy_tag (str): - Policy tag resource name, in the format of - ``projects/{project_number}/locations/{location_id}/taxonomies/{taxonomy_id}/policyTags/{policyTag_id}``. - - This field is a member of `oneof`_ ``matching_label``. - data_masking_policy (google.cloud.bigquery_datapolicies_v1beta1.types.DataMaskingPolicy): - The data masking policy that specifies the - data masking rule to use. - - This field is a member of `oneof`_ ``policy``. - name (str): - Output only. Resource name of this data policy, in the - format of - ``projects/{project_number}/locations/{location_id}/dataPolicies/{data_policy_id}``. - data_policy_type (google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy.DataPolicyType): - Type of data policy. - data_policy_id (str): - User-assigned (human readable) ID of the data policy that - needs to be unique within a project. Used as - {data_policy_id} in part of the resource name. - """ - class DataPolicyType(proto.Enum): - r"""A list of supported data policy types. - - Values: - DATA_POLICY_TYPE_UNSPECIFIED (0): - Default value for the data policy type. This - should not be used. - COLUMN_LEVEL_SECURITY_POLICY (3): - Used to create a data policy for column-level - security, without data masking. - DATA_MASKING_POLICY (2): - Used to create a data policy for data - masking. - """ - DATA_POLICY_TYPE_UNSPECIFIED = 0 - COLUMN_LEVEL_SECURITY_POLICY = 3 - DATA_MASKING_POLICY = 2 - - policy_tag: str = proto.Field( - proto.STRING, - number=4, - oneof='matching_label', - ) - data_masking_policy: 'DataMaskingPolicy' = proto.Field( - proto.MESSAGE, - number=5, - oneof='policy', - message='DataMaskingPolicy', - ) - name: str = proto.Field( - proto.STRING, - number=1, - ) - data_policy_type: DataPolicyType = proto.Field( - proto.ENUM, - number=2, - enum=DataPolicyType, - ) - data_policy_id: str = proto.Field( - proto.STRING, - number=3, - ) - - -class DataMaskingPolicy(proto.Message): - r"""The data masking policy that is used to specify data masking - rule. - - - .. _oneof: https://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields - - Attributes: - predefined_expression (google.cloud.bigquery_datapolicies_v1beta1.types.DataMaskingPolicy.PredefinedExpression): - A predefined masking expression. - - This field is a member of `oneof`_ ``masking_expression``. - """ - class PredefinedExpression(proto.Enum): - r"""The available masking rules. Learn more here: - https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. - - Values: - PREDEFINED_EXPRESSION_UNSPECIFIED (0): - Default, unspecified predefined expression. - No masking will take place since no expression - is specified. - SHA256 (3): - Masking expression to replace data with - SHA-256 hash. - ALWAYS_NULL (5): - Masking expression to replace data with - NULLs. - DEFAULT_MASKING_VALUE (7): - Masking expression to replace data with their default - masking values. The default masking values for each type - listed as below: - - - STRING: "" - - BYTES: b'' - - INTEGER: 0 - - FLOAT: 0.0 - - NUMERIC: 0 - - BOOLEAN: FALSE - - TIMESTAMP: 0001-01-01 00:00:00 UTC - - DATE: 0001-01-01 - - TIME: 00:00:00 - - DATETIME: 0001-01-01T00:00:00 - - GEOGRAPHY: POINT(0 0) - - BIGNUMERIC: 0 - - ARRAY: [] - - STRUCT: NOT_APPLICABLE - - JSON: NULL - """ - PREDEFINED_EXPRESSION_UNSPECIFIED = 0 - SHA256 = 3 - ALWAYS_NULL = 5 - DEFAULT_MASKING_VALUE = 7 - - predefined_expression: PredefinedExpression = proto.Field( - proto.ENUM, - number=1, - oneof='masking_expression', - enum=PredefinedExpression, - ) - - -__all__ = tuple(sorted(__protobuf__.manifest)) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini deleted file mode 100644 index 574c5aed394b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/mypy.ini +++ /dev/null @@ -1,3 +0,0 @@ -[mypy] -python_version = 3.7 -namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py deleted file mode 100644 index 25d78ab7c0ff..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/noxfile.py +++ /dev/null @@ -1,591 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -import pathlib -import re -import shutil - -from typing import Dict, List -import warnings - -import nox - -BLACK_VERSION = "black[jupyter]==23.7.0" -ISORT_VERSION = "isort==5.11.0" - -LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] - -ALL_PYTHON = [ - "3.7", - "3.8", - "3.9", - "3.10", - "3.11", - "3.12", - "3.13", -] - -DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] - -CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() - -LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" -PACKAGE_NAME = "google-cloud-bigquery-datapolicies" - -UNIT_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "asyncmock", - "pytest", - "pytest-cov", - "pytest-asyncio", -] -UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_DEPENDENCIES: List[str] = [] -UNIT_TEST_EXTRAS: List[str] = [] -UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] -SYSTEM_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "pytest", - "google-cloud-testutils", -] -SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_EXTRAS: List[str] = [] -SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -nox.options.sessions = [ - "unit", - "system", - "cover", - "lint", - "lint_setup_py", - "blacken", - "docs", -] - -# Error if a python version is missing -nox.options.error_on_missing_interpreters = True - - -@nox.session(python=ALL_PYTHON) -def mypy(session): - """Run the type checker.""" - session.install( - "mypy", - "types-requests", - "types-protobuf", - ) - session.install(".") - session.run( - "mypy", - "-p", - "google", - ) - - -@nox.session -def update_lower_bounds(session): - """Update lower bounds in constraints.txt to match setup.py""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "update", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session -def check_lower_bounds(session): - """Check lower bounds in setup.py are reflected in constraints file""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "check", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint(session): - """Run linters. - - Returns a failure if the linters find linting errors or sufficiently - serious code quality issues. - """ - session.install("flake8", BLACK_VERSION) - session.run( - "black", - "--check", - *LINT_PATHS, - ) - - session.run("flake8", "google", "tests") - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def blacken(session): - """Run black. Format code to uniform standard.""" - session.install(BLACK_VERSION) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def format(session): - """ - Run isort to sort imports. Then run black - to format code to uniform standard. - """ - session.install(BLACK_VERSION, ISORT_VERSION) - # Use the --fss option to sort imports using strict alphabetical order. - # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections - session.run( - "isort", - "--fss", - *LINT_PATHS, - ) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint_setup_py(session): - """Verify that setup.py is valid (including RST check).""" - session.install("setuptools", "docutils", "pygments") - session.run("python", "setup.py", "check", "--restructuredtext", "--strict") - - -def install_unittest_dependencies(session, *constraints): - standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES - session.install(*standard_deps, *constraints) - - if UNIT_TEST_EXTERNAL_DEPENDENCIES: - warnings.warn( - "'unit_test_external_dependencies' is deprecated. Instead, please " - "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", - DeprecationWarning, - ) - session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_LOCAL_DEPENDENCIES: - session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_EXTRAS_BY_PYTHON: - extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif UNIT_TEST_EXTRAS: - extras = UNIT_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=ALL_PYTHON) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def unit(session, protobuf_implementation): - # Install all test dependencies, then install this package in-place. - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - install_unittest_dependencies(session, "-c", constraints_path) - - # TODO(https://github.com/googleapis/synthtool/issues/1976): - # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. - # The 'cpp' implementation requires Protobuf<4. - if protobuf_implementation == "cpp": - session.install("protobuf<4") - - # Run py.test against the unit tests. - session.run( - "py.test", - "--quiet", - f"--junitxml=unit_{session.python}_sponge_log.xml", - "--cov=google", - "--cov=tests/unit", - "--cov-append", - "--cov-config=.coveragerc", - "--cov-report=", - "--cov-fail-under=0", - os.path.join("tests", "unit"), - *session.posargs, - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -def install_systemtest_dependencies(session, *constraints): - session.install("--pre", "grpcio") - - session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: - session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_LOCAL_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTRAS_BY_PYTHON: - extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif SYSTEM_TEST_EXTRAS: - extras = SYSTEM_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) -def system(session): - """Run the system test suite.""" - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - system_test_path = os.path.join("tests", "system.py") - system_test_folder_path = os.path.join("tests", "system") - - # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. - if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": - session.skip("RUN_SYSTEM_TESTS is set to false, skipping") - # Install pyopenssl for mTLS testing. - if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": - session.install("pyopenssl") - - system_test_exists = os.path.exists(system_test_path) - system_test_folder_exists = os.path.exists(system_test_folder_path) - # Sanity check: only run tests if found. - if not system_test_exists and not system_test_folder_exists: - session.skip("System tests were not found") - - install_systemtest_dependencies(session, "-c", constraints_path) - - # Run py.test against the system tests. - if system_test_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_path, - *session.posargs, - ) - if system_test_folder_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_folder_path, - *session.posargs, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def cover(session): - """Run the final coverage report. - - This outputs the coverage report aggregating coverage from the unit - test runs (not system test runs), and then erases coverage data. - """ - session.install("coverage", "pytest-cov") - session.run("coverage", "report", "--show-missing", "--fail-under=100") - - session.run("coverage", "erase") - - -@nox.session(python="3.10") -def docs(session): - """Build the docs for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "sphinx==4.5.0", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-W", # warnings as errors - "-T", # show full traceback on exception - "-N", # no colors - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python="3.10") -def docfx(session): - """Build the docfx yaml files for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "gcp-sphinx-docfx-yaml", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-T", # show full traceback on exception - "-N", # no colors - "-D", - ( - "extensions=sphinx.ext.autodoc," - "sphinx.ext.autosummary," - "docfx_yaml.extension," - "sphinx.ext.intersphinx," - "sphinx.ext.coverage," - "sphinx.ext.napoleon," - "sphinx.ext.todo," - "sphinx.ext.viewcode," - "recommonmark" - ), - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def prerelease_deps(session, protobuf_implementation): - """ - Run all tests with pre-release versions of dependencies installed - rather than the standard non pre-release versions. - Pre-release versions can be installed using - `pip install --pre `. - """ - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # Note: If a dependency is added to the `prerel_deps` list, - # the `core_dependencies_from_source` list in the `core_deps_from_source` - # nox session should also be updated. - prerel_deps = [ - "googleapis-common-protos", - "google-api-core", - "google-auth", - "grpc-google-iam-v1", - "grpcio", - "grpcio-status", - "protobuf", - "proto-plus", - ] - - for dep in prerel_deps: - session.install("--pre", "--no-deps", "--ignore-installed", dep) - # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` - # to the dictionary below once this bug is fixed. - # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add - # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below - # once this bug is fixed. - package_namespaces = { - "google-api-core": "google.api_core", - "google-auth": "google.auth", - "grpcio": "grpc", - "protobuf": "google.protobuf", - "proto-plus": "proto", - } - - version_namespace = package_namespaces.get(dep) - - print(f"Installed {dep}") - if version_namespace: - session.run( - "python", - "-c", - f"import {version_namespace}; print({version_namespace}.__version__)", - ) - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb"], -) -def core_deps_from_source(session, protobuf_implementation): - """Run all tests with core dependencies installed from source - rather than pulling the dependencies from PyPI. - """ - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and - # `grpcio-status` should be added to the list below so that they are installed from source, - # rather than PyPI. - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be - # added to the list below so that it is installed from source, rather than PyPI - # Note: If a dependency is added to the `core_dependencies_from_source` list, - # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. - core_dependencies_from_source = [ - "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", - "google-api-core @ git+https://github.com/googleapis/python-api-core.git", - "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", - "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", - "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", - ] - - for dep in core_dependencies_from_source: - session.install(dep, "--no-deps", "--ignore-installed") - print(f"Installed {dep}") - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py deleted file mode 100644 index a7c72cfdef6e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py +++ /dev/null @@ -1,57 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for CreateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -async def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = await client.create_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py deleted file mode 100644 index f8585e08e431..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py +++ /dev/null @@ -1,57 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for CreateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -def sample_create_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.CreateDataPolicyRequest( - parent="parent_value", - data_policy=data_policy, - ) - - # Make the request - response = client.create_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py deleted file mode 100644 index 9824d31573e0..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for DeleteDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -async def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - await client.delete_data_policy(request=request) - - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py deleted file mode 100644 index 402a855549ac..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py +++ /dev/null @@ -1,50 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for DeleteDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -def sample_delete_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.DeleteDataPolicyRequest( - name="name_value", - ) - - # Make the request - client.delete_data_policy(request=request) - - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py deleted file mode 100644 index 287a588d313a..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py +++ /dev/null @@ -1,52 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -async def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = await client.get_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py deleted file mode 100644 index d66aca494389..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py +++ /dev/null @@ -1,52 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -def sample_get_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.GetDataPolicyRequest( - name="name_value", - ) - - # Make the request - response = client.get_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py deleted file mode 100644 index e26eb0af7c47..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.get_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py deleted file mode 100644 index bf7d3bbb18c0..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for GetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_get_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.GetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.get_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py deleted file mode 100644 index cec6128daa1e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for ListDataPolicies -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -async def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - async for response in page_result: - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py deleted file mode 100644 index fd210445e40b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for ListDataPolicies -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -def sample_list_data_policies(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = bigquery_datapolicies_v1beta1.ListDataPoliciesRequest( - parent="parent_value", - ) - - # Make the request - page_result = client.list_data_policies(request=request) - - # Handle the response - for response in page_result: - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py deleted file mode 100644 index e1030c07863a..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for SetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = await client.set_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py deleted file mode 100644 index 7e86291320dd..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py +++ /dev/null @@ -1,53 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for SetIamPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_set_iam_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.SetIamPolicyRequest( - resource="resource_value", - ) - - # Make the request - response = client.set_iam_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py deleted file mode 100644 index 1fdbf4f0c1b3..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for TestIamPermissions -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -async def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = await client.test_iam_permissions(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py deleted file mode 100644 index d3b770d02f67..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py +++ /dev/null @@ -1,54 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for TestIamPermissions -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 -from google.iam.v1 import iam_policy_pb2 # type: ignore - - -def sample_test_iam_permissions(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - request = iam_policy_pb2.TestIamPermissionsRequest( - resource="resource_value", - permissions=['permissions_value1', 'permissions_value2'], - ) - - # Make the request - response = client.test_iam_permissions(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py deleted file mode 100644 index a7253f2cb8e1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py +++ /dev/null @@ -1,56 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for UpdateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -async def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = await client.update_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py deleted file mode 100644 index 02dd6e6a1d0d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py +++ /dev/null @@ -1,56 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Generated code. DO NOT EDIT! -# -# Snippet for UpdateDataPolicy -# NOTE: This snippet has been automatically generated for illustrative purposes only. -# It may require modifications to work in your environment. - -# To install the latest published package dependency, execute the following: -# python3 -m pip install google-cloud-bigquery-datapolicies - - -# [START bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync] -# This snippet has been automatically generated and should be regarded as a -# code template only. -# It will require modifications to work: -# - It may require correct/in-range values for request initialization. -# - It may require specifying regional endpoints when creating the service -# client as shown in: -# https://googleapis.dev/python/google-api-core/latest/client_options.html -from google.cloud import bigquery_datapolicies_v1beta1 - - -def sample_update_data_policy(): - # Create a client - client = bigquery_datapolicies_v1beta1.DataPolicyServiceClient() - - # Initialize request argument(s) - data_policy = bigquery_datapolicies_v1beta1.DataPolicy() - data_policy.policy_tag = "policy_tag_value" - data_policy.data_masking_policy.predefined_expression = "DEFAULT_MASKING_VALUE" - - request = bigquery_datapolicies_v1beta1.UpdateDataPolicyRequest( - data_policy=data_policy, - ) - - # Make the request - response = client.update_data_policy(request=request) - - # Handle the response - print(response) - -# [END bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync] diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json deleted file mode 100644 index f5896d1aac3d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json +++ /dev/null @@ -1,1289 +0,0 @@ -{ - "clientLibrary": { - "apis": [ - { - "id": "google.cloud.bigquery.datapolicies.v1beta1", - "version": "v1beta1" - } - ], - "language": "PYTHON", - "name": "google-cloud-bigquery-datapolicies", - "version": "0.1.0" - }, - "snippets": [ - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.create_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.CreateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "CreateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "create_data_policy" - }, - "description": "Sample for CreateDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_async", - "segments": [ - { - "end": 56, - "start": 27, - "type": "FULL" - }, - { - "end": 56, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 50, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 53, - "start": 51, - "type": "REQUEST_EXECUTION" - }, - { - "end": 57, - "start": 54, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.create_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.CreateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "CreateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.CreateDataPolicyRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "create_data_policy" - }, - "description": "Sample for CreateDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_CreateDataPolicy_sync", - "segments": [ - { - "end": 56, - "start": 27, - "type": "FULL" - }, - { - "end": 56, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 50, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 53, - "start": 51, - "type": "REQUEST_EXECUTION" - }, - { - "end": 57, - "start": 54, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_create_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.delete_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.DeleteDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "DeleteDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "shortName": "delete_data_policy" - }, - "description": "Sample for DeleteDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_async", - "segments": [ - { - "end": 49, - "start": 27, - "type": "FULL" - }, - { - "end": 49, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.delete_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.DeleteDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "DeleteDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DeleteDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "shortName": "delete_data_policy" - }, - "description": "Sample for DeleteDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_DeleteDataPolicy_sync", - "segments": [ - { - "end": 49, - "start": 27, - "type": "FULL" - }, - { - "end": 49, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_delete_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.get_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "get_data_policy" - }, - "description": "Sample for GetDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_async", - "segments": [ - { - "end": 51, - "start": 27, - "type": "FULL" - }, - { - "end": 51, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 52, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.get_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.GetDataPolicyRequest" - }, - { - "name": "name", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "get_data_policy" - }, - "description": "Sample for GetDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetDataPolicy_sync", - "segments": [ - { - "end": 51, - "start": 27, - "type": "FULL" - }, - { - "end": 51, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 52, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_data_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.get_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "get_iam_policy" - }, - "description": "Sample for GetIamPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.get_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.GetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "GetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.GetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "get_iam_policy" - }, - "description": "Sample for GetIamPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_GetIamPolicy_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_get_iam_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.list_data_policies", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.ListDataPolicies", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "ListDataPolicies" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesAsyncPager", - "shortName": "list_data_policies" - }, - "description": "Sample for ListDataPolicies", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.list_data_policies", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.ListDataPolicies", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "ListDataPolicies" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.ListDataPoliciesRequest" - }, - { - "name": "parent", - "type": "str" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.pagers.ListDataPoliciesPager", - "shortName": "list_data_policies" - }, - "description": "Sample for ListDataPolicies", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_ListDataPolicies_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 45, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 48, - "start": 46, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 49, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_list_data_policies_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.set_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.SetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "SetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "set_iam_policy" - }, - "description": "Sample for SetIamPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_async", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.set_iam_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.SetIamPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "SetIamPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.SetIamPolicyRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.policy_pb2.Policy", - "shortName": "set_iam_policy" - }, - "description": "Sample for SetIamPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_SetIamPolicy_sync", - "segments": [ - { - "end": 52, - "start": 27, - "type": "FULL" - }, - { - "end": 52, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 46, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 49, - "start": 47, - "type": "REQUEST_EXECUTION" - }, - { - "end": 53, - "start": 50, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_set_iam_policy_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.test_iam_permissions", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.TestIamPermissions", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "TestIamPermissions" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", - "shortName": "test_iam_permissions" - }, - "description": "Sample for TestIamPermissions", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_async", - "segments": [ - { - "end": 53, - "start": 27, - "type": "FULL" - }, - { - "end": 53, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 47, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 50, - "start": 48, - "type": "REQUEST_EXECUTION" - }, - { - "end": 54, - "start": 51, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.test_iam_permissions", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.TestIamPermissions", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "TestIamPermissions" - }, - "parameters": [ - { - "name": "request", - "type": "google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.iam.v1.iam_policy_pb2.TestIamPermissionsResponse", - "shortName": "test_iam_permissions" - }, - "description": "Sample for TestIamPermissions", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_TestIamPermissions_sync", - "segments": [ - { - "end": 53, - "start": 27, - "type": "FULL" - }, - { - "end": 53, - "start": 27, - "type": "SHORT" - }, - { - "end": 41, - "start": 39, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 47, - "start": 42, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 50, - "start": 48, - "type": "REQUEST_EXECUTION" - }, - { - "end": 54, - "start": 51, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_test_iam_permissions_sync.py" - }, - { - "canonical": true, - "clientMethod": { - "async": true, - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient", - "shortName": "DataPolicyServiceAsyncClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceAsyncClient.update_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.UpdateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "UpdateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" - }, - { - "name": "update_mask", - "type": "google.protobuf.field_mask_pb2.FieldMask" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "update_data_policy" - }, - "description": "Sample for UpdateDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_async", - "segments": [ - { - "end": 55, - "start": 27, - "type": "FULL" - }, - { - "end": 55, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 49, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 52, - "start": 50, - "type": "REQUEST_EXECUTION" - }, - { - "end": 56, - "start": 53, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_async.py" - }, - { - "canonical": true, - "clientMethod": { - "client": { - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient", - "shortName": "DataPolicyServiceClient" - }, - "fullName": "google.cloud.bigquery_datapolicies_v1beta1.DataPolicyServiceClient.update_data_policy", - "method": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService.UpdateDataPolicy", - "service": { - "fullName": "google.cloud.bigquery.datapolicies.v1beta1.DataPolicyService", - "shortName": "DataPolicyService" - }, - "shortName": "UpdateDataPolicy" - }, - "parameters": [ - { - "name": "request", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.UpdateDataPolicyRequest" - }, - { - "name": "data_policy", - "type": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy" - }, - { - "name": "update_mask", - "type": "google.protobuf.field_mask_pb2.FieldMask" - }, - { - "name": "retry", - "type": "google.api_core.retry.Retry" - }, - { - "name": "timeout", - "type": "float" - }, - { - "name": "metadata", - "type": "Sequence[Tuple[str, Union[str, bytes]]]" - } - ], - "resultType": "google.cloud.bigquery_datapolicies_v1beta1.types.DataPolicy", - "shortName": "update_data_policy" - }, - "description": "Sample for UpdateDataPolicy", - "file": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py", - "language": "PYTHON", - "origin": "API_DEFINITION", - "regionTag": "bigquerydatapolicy_v1beta1_generated_DataPolicyService_UpdateDataPolicy_sync", - "segments": [ - { - "end": 55, - "start": 27, - "type": "FULL" - }, - { - "end": 55, - "start": 27, - "type": "SHORT" - }, - { - "end": 40, - "start": 38, - "type": "CLIENT_INITIALIZATION" - }, - { - "end": 49, - "start": 41, - "type": "REQUEST_INITIALIZATION" - }, - { - "end": 52, - "start": 50, - "type": "REQUEST_EXECUTION" - }, - { - "end": 56, - "start": 53, - "type": "RESPONSE_HANDLING" - } - ], - "title": "bigquerydatapolicy_v1beta1_generated_data_policy_service_update_data_policy_sync.py" - } - ] -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py deleted file mode 100644 index bbdc6beba34f..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/scripts/fixup_bigquery_datapolicies_v1beta1_keywords.py +++ /dev/null @@ -1,183 +0,0 @@ -#! /usr/bin/env python3 -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import argparse -import os -import libcst as cst -import pathlib -import sys -from typing import (Any, Callable, Dict, List, Sequence, Tuple) - - -def partition( - predicate: Callable[[Any], bool], - iterator: Sequence[Any] -) -> Tuple[List[Any], List[Any]]: - """A stable, out-of-place partition.""" - results = ([], []) - - for i in iterator: - results[int(predicate(i))].append(i) - - # Returns trueList, falseList - return results[1], results[0] - - -class bigquery_datapoliciesCallTransformer(cst.CSTTransformer): - CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') - METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { - 'create_data_policy': ('parent', 'data_policy', ), - 'delete_data_policy': ('name', ), - 'get_data_policy': ('name', ), - 'get_iam_policy': ('resource', 'options', ), - 'list_data_policies': ('parent', 'page_size', 'page_token', ), - 'set_iam_policy': ('resource', 'policy', 'update_mask', ), - 'test_iam_permissions': ('resource', 'permissions', ), - 'update_data_policy': ('data_policy', 'update_mask', ), - } - - def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: - try: - key = original.func.attr.value - kword_params = self.METHOD_TO_PARAMS[key] - except (AttributeError, KeyError): - # Either not a method from the API or too convoluted to be sure. - return updated - - # If the existing code is valid, keyword args come after positional args. - # Therefore, all positional args must map to the first parameters. - args, kwargs = partition(lambda a: not bool(a.keyword), updated.args) - if any(k.keyword.value == "request" for k in kwargs): - # We've already fixed this file, don't fix it again. - return updated - - kwargs, ctrl_kwargs = partition( - lambda a: a.keyword.value not in self.CTRL_PARAMS, - kwargs - ) - - args, ctrl_args = args[:len(kword_params)], args[len(kword_params):] - ctrl_kwargs.extend(cst.Arg(value=a.value, keyword=cst.Name(value=ctrl)) - for a, ctrl in zip(ctrl_args, self.CTRL_PARAMS)) - - request_arg = cst.Arg( - value=cst.Dict([ - cst.DictElement( - cst.SimpleString("'{}'".format(name)), -cst.Element(value=arg.value) - ) - # Note: the args + kwargs looks silly, but keep in mind that - # the control parameters had to be stripped out, and that - # those could have been passed positionally or by keyword. - for name, arg in zip(kword_params, args + kwargs)]), - keyword=cst.Name("request") - ) - - return updated.with_changes( - args=[request_arg] + ctrl_kwargs - ) - - -def fix_files( - in_dir: pathlib.Path, - out_dir: pathlib.Path, - *, - transformer=bigquery_datapoliciesCallTransformer(), -): - """Duplicate the input dir to the output dir, fixing file method calls. - - Preconditions: - * in_dir is a real directory - * out_dir is a real, empty directory - """ - pyfile_gen = ( - pathlib.Path(os.path.join(root, f)) - for root, _, files in os.walk(in_dir) - for f in files if os.path.splitext(f)[1] == ".py" - ) - - for fpath in pyfile_gen: - with open(fpath, 'r') as f: - src = f.read() - - # Parse the code and insert method call fixes. - tree = cst.parse_module(src) - updated = tree.visit(transformer) - - # Create the path and directory structure for the new file. - updated_path = out_dir.joinpath(fpath.relative_to(in_dir)) - updated_path.parent.mkdir(parents=True, exist_ok=True) - - # Generate the updated source file at the corresponding path. - with open(updated_path, 'w') as f: - f.write(updated.code) - - -if __name__ == '__main__': - parser = argparse.ArgumentParser( - description="""Fix up source that uses the bigquery_datapolicies client library. - -The existing sources are NOT overwritten but are copied to output_dir with changes made. - -Note: This tool operates at a best-effort level at converting positional - parameters in client method calls to keyword based parameters. - Cases where it WILL FAIL include - A) * or ** expansion in a method call. - B) Calls via function or method alias (includes free function calls) - C) Indirect or dispatched calls (e.g. the method is looked up dynamically) - - These all constitute false negatives. The tool will also detect false - positives when an API method shares a name with another method. -""") - parser.add_argument( - '-d', - '--input-directory', - required=True, - dest='input_dir', - help='the input directory to walk for python files to fix up', - ) - parser.add_argument( - '-o', - '--output-directory', - required=True, - dest='output_dir', - help='the directory to output files fixed via un-flattening', - ) - args = parser.parse_args() - input_dir = pathlib.Path(args.input_dir) - output_dir = pathlib.Path(args.output_dir) - if not input_dir.is_dir(): - print( - f"input directory '{input_dir}' does not exist or is not a directory", - file=sys.stderr, - ) - sys.exit(-1) - - if not output_dir.is_dir(): - print( - f"output directory '{output_dir}' does not exist or is not a directory", - file=sys.stderr, - ) - sys.exit(-1) - - if os.listdir(output_dir): - print( - f"output directory '{output_dir}' is not empty", - file=sys.stderr, - ) - sys.exit(-1) - - fix_files(input_dir, output_dir) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py deleted file mode 100644 index 40366686e783..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/setup.py +++ /dev/null @@ -1,99 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import io -import os -import re - -import setuptools # type: ignore - -package_root = os.path.abspath(os.path.dirname(__file__)) - -name = 'google-cloud-bigquery-datapolicies' - - -description = "Google Cloud Bigquery Datapolicies API client library" - -version = None - -with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: - version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) - assert (len(version_candidates) == 1) - version = version_candidates[0] - -if version[0] == "0": - release_status = "Development Status :: 4 - Beta" -else: - release_status = "Development Status :: 5 - Production/Stable" - -dependencies = [ - "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", - # Exclude incompatible versions of `google-auth` - # See https://github.com/googleapis/google-cloud-python/issues/12364 - "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", - "proto-plus >= 1.22.3, <2.0.0", - "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", - "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", - "grpc-google-iam-v1 >= 0.14.0, <1.0.0", -] -extras = { -} -url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" - -package_root = os.path.abspath(os.path.dirname(__file__)) - -readme_filename = os.path.join(package_root, "README.rst") -with io.open(readme_filename, encoding="utf-8") as readme_file: - readme = readme_file.read() - -packages = [ - package - for package in setuptools.find_namespace_packages() - if package.startswith("google") -] - -setuptools.setup( - name=name, - version=version, - description=description, - long_description=readme, - author="Google LLC", - author_email="googleapis-packages@google.com", - license="Apache 2.0", - url=url, - classifiers=[ - release_status, - "Intended Audience :: Developers", - "License :: OSI Approved :: Apache Software License", - "Programming Language :: Python", - "Programming Language :: Python :: 3", - "Programming Language :: Python :: 3.7", - "Programming Language :: Python :: 3.8", - "Programming Language :: Python :: 3.9", - "Programming Language :: Python :: 3.10", - "Programming Language :: Python :: 3.11", - "Programming Language :: Python :: 3.12", - "Programming Language :: Python :: 3.13", - "Operating System :: OS Independent", - "Topic :: Internet", - ], - platforms="Posix; MacOS X; Windows", - packages=packages, - python_requires=">=3.7", - install_requires=dependencies, - extras_require=extras, - include_package_data=True, - zip_safe=False, -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.10.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.11.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.12.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt deleted file mode 100644 index 2010e549cceb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.13.txt +++ /dev/null @@ -1,12 +0,0 @@ -# We use the constraints file for the latest Python version -# (currently this file) to check that the latest -# major versions of dependencies are supported in setup.py. -# List all library dependencies and extras in this file. -# Require the latest major version be installed for each dependency. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo>=1 -google-api-core>=2 -google-auth>=2 -proto-plus>=1 -protobuf>=6 -grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt deleted file mode 100644 index 56affbd9bd75..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.7.txt +++ /dev/null @@ -1,11 +0,0 @@ -# This constraints file is used to check that lower bounds -# are correct in setup.py -# List all library dependencies and extras in this file. -# Pin the version to the lower bound. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo==1.14.0 -google-api-core==1.34.1 -google-auth==2.14.1 -proto-plus==1.22.3 -protobuf==3.20.2 -grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.8.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/testing/constraints-3.9.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py deleted file mode 100644 index 38239c9fe7cf..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/tests/unit/gapic/bigquery_datapolicies_v1beta1/test_data_policy_service.py +++ /dev/null @@ -1,4346 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -# try/except added for compatibility with python < 3.8 -try: - from unittest import mock - from unittest.mock import AsyncMock # pragma: NO COVER -except ImportError: # pragma: NO COVER - import mock - -import grpc -from grpc.experimental import aio -import json -import math -import pytest -from google.api_core import api_core_version -from proto.marshal.rules.dates import DurationRule, TimestampRule -from proto.marshal.rules import wrappers - -try: - from google.auth.aio import credentials as ga_credentials_async - HAS_GOOGLE_AUTH_AIO = True -except ImportError: # pragma: NO COVER - HAS_GOOGLE_AUTH_AIO = False - -from google.api_core import client_options -from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers -from google.api_core import grpc_helpers_async -from google.api_core import path_template -from google.api_core import retry as retries -from google.auth import credentials as ga_credentials -from google.auth.exceptions import MutualTLSChannelError -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import DataPolicyServiceAsyncClient -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service import transports -from google.cloud.bigquery_datapolicies_v1beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import options_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.oauth2 import service_account -from google.protobuf import field_mask_pb2 # type: ignore -from google.type import expr_pb2 # type: ignore -import google.auth - - - -CRED_INFO_JSON = { - "credential_source": "/path/to/file", - "credential_type": "service account credentials", - "principal": "service-account@example.com", -} -CRED_INFO_STRING = json.dumps(CRED_INFO_JSON) - - -async def mock_async_gen(data, chunk_size=1): - for i in range(0, len(data)): # pragma: NO COVER - chunk = data[i : i + chunk_size] - yield chunk.encode("utf-8") - -def client_cert_source_callback(): - return b"cert bytes", b"key bytes" - -# TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. -# See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. -def async_anonymous_credentials(): - if HAS_GOOGLE_AUTH_AIO: - return ga_credentials_async.AnonymousCredentials() - return ga_credentials.AnonymousCredentials() - -# If default endpoint is localhost, then default mtls endpoint will be the same. -# This method modifies the default endpoint so the client can produce a different -# mtls endpoint for endpoint testing purposes. -def modify_default_endpoint(client): - return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT - -# If default endpoint template is localhost, then default mtls endpoint will be the same. -# This method modifies the default endpoint template so the client can produce a different -# mtls endpoint for endpoint testing purposes. -def modify_default_endpoint_template(client): - return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE - - -def test__get_default_mtls_endpoint(): - api_endpoint = "example.googleapis.com" - api_mtls_endpoint = "example.mtls.googleapis.com" - sandbox_endpoint = "example.sandbox.googleapis.com" - sandbox_mtls_endpoint = "example.mtls.sandbox.googleapis.com" - non_googleapi = "api.example.com" - - assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi - -def test__read_environment_variables(): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) - - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") - -def test__get_client_cert_source(): - mock_provided_cert_source = mock.Mock() - mock_default_cert_source = mock.Mock() - - assert DataPolicyServiceClient._get_client_cert_source(None, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source - - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): - assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source - -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test__get_api_endpoint(): - api_override = "foo.com" - mock_client_cert_source = mock.Mock() - default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) - mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) - - assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint - - with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") - assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." - - -def test__get_universe_domain(): - client_universe_domain = "foo.com" - universe_domain_env = "bar.com" - - assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain - assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env - assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE - - with pytest.raises(ValueError) as excinfo: - DataPolicyServiceClient._get_universe_domain("", None) - assert str(excinfo.value) == "Universe Domain cannot be an empty string." - -@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ - (401, CRED_INFO_JSON, True), - (403, CRED_INFO_JSON, True), - (404, CRED_INFO_JSON, True), - (500, CRED_INFO_JSON, False), - (401, None, False), - (403, None, False), - (404, None, False), - (500, None, False) -]) -def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): - cred = mock.Mock(["get_cred_info"]) - cred.get_cred_info = mock.Mock(return_value=cred_info_json) - client = DataPolicyServiceClient(credentials=cred) - client._transport._credentials = cred - - error = core_exceptions.GoogleAPICallError("message", details=["foo"]) - error.code = error_code - - client._add_cred_info_for_auth_errors(error) - if show_cred_info: - assert error.details == ["foo", CRED_INFO_STRING] - else: - assert error.details == ["foo"] - -@pytest.mark.parametrize("error_code", [401,403,404,500]) -def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): - cred = mock.Mock([]) - assert not hasattr(cred, "get_cred_info") - client = DataPolicyServiceClient(credentials=cred) - client._transport._credentials = cred - - error = core_exceptions.GoogleAPICallError("message", details=[]) - error.code = error_code - - client._add_cred_info_for_auth_errors(error) - assert error.details == [] - -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), -]) -def test_data_policy_service_client_from_service_account_info(client_class, transport_name): - creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: - factory.return_value = creds - info = {"valid": True} - client = client_class.from_service_account_info(info, transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - ) - - -@pytest.mark.parametrize("transport_class,transport_name", [ - (transports.DataPolicyServiceGrpcTransport, "grpc"), - (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), -]) -def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: - creds = service_account.Credentials(None, None, None) - transport = transport_class(credentials=creds, always_use_jwt_access=True) - use_jwt.assert_called_once_with(True) - - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: - creds = service_account.Credentials(None, None, None) - transport = transport_class(credentials=creds, always_use_jwt_access=False) - use_jwt.assert_not_called() - - -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), -]) -def test_data_policy_service_client_from_service_account_file(client_class, transport_name): - creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: - factory.return_value = creds - client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) - assert client.transport._credentials == creds - assert isinstance(client, client_class) - - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - ) - - -def test_data_policy_service_client_get_transport_class(): - transport = DataPolicyServiceClient.get_transport_class() - available_transports = [ - transports.DataPolicyServiceGrpcTransport, - ] - assert transport in available_transports - - transport = DataPolicyServiceClient.get_transport_class("grpc") - assert transport == transports.DataPolicyServiceGrpcTransport - - -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): - # Check that if channel is provided we won't create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials() - ) - client = client_class(transport=transport) - gtc.assert_not_called() - - # Check that if channel is provided via str we will create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - client = client_class(transport=transport_name) - gtc.assert_called() - - # Check the case api_endpoint is provided. - options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name, client_options=options) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host="squid.clam.whelk", - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is - # "never". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is - # "always". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client.DEFAULT_MTLS_ENDPOINT, - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has - # unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - - # Check the case quota_project_id is provided - options = client_options.ClientOptions(quota_project_id="octopus") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id="octopus", - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - # Check the case api_endpoint is provided - options = client_options.ClientOptions(api_audience="https://language.googleapis.com") - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience="https://language.googleapis.com" - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -@mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) -def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): - # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default - # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. - - # Check the case client_cert_source is provided. Whether client cert is used depends on - # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - - if use_client_cert_env == "false": - expected_client_cert_source = None - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) - else: - expected_client_cert_source = client_cert_source_callback - expected_host = client.DEFAULT_MTLS_ENDPOINT - - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=expected_host, - scopes=None, - client_cert_source_for_mtls=expected_client_cert_source, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case ADC client cert is provided. Whether client cert is used depends on - # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): - if use_client_cert_env == "false": - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) - expected_client_cert_source = None - else: - expected_host = client.DEFAULT_MTLS_ENDPOINT - expected_client_cert_source = client_cert_source_callback - - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=expected_host, - scopes=None, - client_cert_source_for_mtls=expected_client_cert_source, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # Check the case client_cert_source and ADC client cert are not provided. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): - patched.return_value = None - client = client_class(transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): - mock_client_cert_source = mock.Mock() - - # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) - assert api_endpoint == mock_api_endpoint - assert cert_source == mock_client_cert_source - - # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - mock_client_cert_source = mock.Mock() - mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) - assert api_endpoint == mock_api_endpoint - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_ENDPOINT - assert cert_source is None - - # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() - assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - assert cert_source == mock_client_cert_source - - # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT has - # unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): - with pytest.raises(MutualTLSChannelError) as excinfo: - client_class.get_mtls_endpoint_and_cert_source() - - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" - - # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): - with pytest.raises(ValueError) as excinfo: - client_class.get_mtls_endpoint_and_cert_source() - - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_api_endpoint(client_class): - mock_client_cert_source = client_cert_source_callback - api_override = "foo.com" - default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) - mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) - - # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", - # use ClientOptions.api_endpoint as the api endpoint regardless. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == api_override - - # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == default_endpoint - - # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="always", - # use the DEFAULT_MTLS_ENDPOINT as the api endpoint. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - client = client_class(credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT - - # If ClientOptions.api_endpoint is not set, GOOGLE_API_USE_MTLS_ENDPOINT="auto" (default), - # GOOGLE_API_USE_CLIENT_CERTIFICATE="false" (default), default cert source doesn't exist, - # and ClientOptions.universe_domain="bar.com", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with universe domain as the api endpoint. - options = client_options.ClientOptions() - universe_exists = hasattr(options, "universe_domain") - if universe_exists: - options = client_options.ClientOptions(universe_domain=mock_universe) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - else: - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) - assert client.universe_domain == (mock_universe if universe_exists else default_universe) - - # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", - # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. - options = client_options.ClientOptions() - if hasattr(options, "universe_domain"): - delattr(options, "universe_domain") - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == default_endpoint - - -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), -]) -def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): - # Check the case scopes are provided. - options = client_options.ClientOptions( - scopes=["1", "2"], - ) - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=["1", "2"], - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), -]) -def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): - # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) - - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - -def test_data_policy_service_client_client_options_from_dict(): - with mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: - grpc_transport.return_value = None - client = DataPolicyServiceClient( - client_options={'api_endpoint': 'squid.clam.whelk'} - ) - grpc_transport.assert_called_once_with( - credentials=None, - credentials_file=None, - host="squid.clam.whelk", - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), -]) -def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): - # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) - - with mock.patch.object(transport_class, '__init__') as patched: - patched.return_value = None - client = client_class(client_options=options, transport=transport_name) - patched.assert_called_once_with( - credentials=None, - credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) - - # test that the credentials from file are saved and used as the credentials. - with mock.patch.object( - google.auth, "load_credentials_from_file", autospec=True - ) as load_creds, mock.patch.object( - google.auth, "default", autospec=True - ) as adc, mock.patch.object( - grpc_helpers, "create_channel" - ) as create_channel: - creds = ga_credentials.AnonymousCredentials() - file_creds = ga_credentials.AnonymousCredentials() - load_creds.return_value = (file_creds, None) - adc.return_value = (creds, None) - client = client_class(client_options=options, transport=transport_name) - create_channel.assert_called_with( - "bigquerydatapolicy.googleapis.com:443", - credentials=file_creds, - credentials_file=None, - quota_project_id=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - scopes=None, - default_host="bigquerydatapolicy.googleapis.com", - ssl_credentials=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) -def test_create_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.CreateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_create_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.CreateDataPolicyRequest( - parent='parent_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.create_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.CreateDataPolicyRequest( - parent='parent_value', - ) - -def test_create_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc - request = {} - client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.create_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc - - request = {} - await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.create_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.CreateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_create_data_policy_async_from_dict(): - await test_create_data_policy_async(request_type=dict) - -def test_create_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.CreateDataPolicyRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_create_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.CreateDataPolicyRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.create_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -def test_create_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - - -def test_create_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.create_data_policy( - datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - -@pytest.mark.asyncio -async def test_create_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - -@pytest.mark.asyncio -async def test_create_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.create_data_policy( - datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) -def test_update_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.UpdateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_update_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.UpdateDataPolicyRequest( - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.update_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.UpdateDataPolicyRequest( - ) - -def test_update_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc - request = {} - client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.update_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc - - request = {} - await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.update_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.UpdateDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_update_data_policy_async_from_dict(): - await test_update_data_policy_async(request_type=dict) - -def test_update_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.UpdateDataPolicyRequest() - - request.data_policy.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_update_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.UpdateDataPolicyRequest() - - request.data_policy.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.update_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] - - -def test_update_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.update_data_policy( - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) - assert arg == mock_val - - -def test_update_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.update_data_policy( - datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - -@pytest.mark.asyncio -async def test_update_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.update_data_policy( - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(policy_tag='policy_tag_value') - assert arg == mock_val - arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) - assert arg == mock_val - -@pytest.mark.asyncio -async def test_update_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.update_data_policy( - datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(policy_tag='policy_tag_value'), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) -def test_delete_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - response = client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.DeleteDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert response is None - - -def test_delete_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.DeleteDataPolicyRequest( - name='name_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.delete_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.DeleteDataPolicyRequest( - name='name_value', - ) - -def test_delete_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc - request = {} - client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.delete_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc - - request = {} - await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.delete_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - response = await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.DeleteDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert response is None - - -@pytest.mark.asyncio -async def test_delete_data_policy_async_from_dict(): - await test_delete_data_policy_async(request_type=dict) - -def test_delete_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.DeleteDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = None - client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_delete_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.DeleteDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - await client.delete_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -def test_delete_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.delete_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - - -def test_delete_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.delete_data_policy( - datapolicy.DeleteDataPolicyRequest(), - name='name_value', - ) - -@pytest.mark.asyncio -async def test_delete_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = None - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.delete_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_delete_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.delete_data_policy( - datapolicy.DeleteDataPolicyRequest(), - name='name_value', - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) -def test_get_data_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - policy_tag='policy_tag_value', - ) - response = client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.GetDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -def test_get_data_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.GetDataPolicyRequest( - name='name_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.get_data_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.GetDataPolicyRequest( - name='name_value', - ) - -def test_get_data_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_data_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc - request = {} - client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc - - request = {} - await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.get_data_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - response = await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.GetDataPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY - assert response.data_policy_id == 'data_policy_id_value' - - -@pytest.mark.asyncio -async def test_get_data_policy_async_from_dict(): - await test_get_data_policy_async(request_type=dict) - -def test_get_data_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.GetDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_get_data_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.GetDataPolicyRequest() - - request.name = 'name_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - await client.get_data_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] - - -def test_get_data_policy_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.get_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - - -def test_get_data_policy_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.get_data_policy( - datapolicy.GetDataPolicyRequest(), - name='name_value', - ) - -@pytest.mark.asyncio -async def test_get_data_policy_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.DataPolicy() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.get_data_policy( - name='name_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].name - mock_val = 'name_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_get_data_policy_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.get_data_policy( - datapolicy.GetDataPolicyRequest(), - name='name_value', - ) - - -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) -def test_list_data_policies(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - ) - response = client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = datapolicy.ListDataPoliciesRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' - - -def test_list_data_policies_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.list_data_policies(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - ) - -def test_list_data_policies_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc - request = {} - client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.list_data_policies(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc - - request = {} - await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.list_data_policies(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) - response = await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = datapolicy.ListDataPoliciesRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, pagers.ListDataPoliciesAsyncPager) - assert response.next_page_token == 'next_page_token_value' - - -@pytest.mark.asyncio -async def test_list_data_policies_async_from_dict(): - await test_list_data_policies_async(request_type=dict) - -def test_list_data_policies_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.ListDataPoliciesRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = datapolicy.ListDataPoliciesResponse() - client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_list_data_policies_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = datapolicy.ListDataPoliciesRequest() - - request.parent = 'parent_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) - await client.list_data_policies(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] - - -def test_list_data_policies_flattened(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse() - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - client.list_data_policies( - parent='parent_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - - -def test_list_data_policies_flattened_error(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - client.list_data_policies( - datapolicy.ListDataPoliciesRequest(), - parent='parent_value', - ) - -@pytest.mark.asyncio -async def test_list_data_policies_flattened_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = datapolicy.ListDataPoliciesResponse() - - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) - # Call the method with a truthy value for each flattened field, - # using the keyword arguments to the method. - response = await client.list_data_policies( - parent='parent_value', - ) - - # Establish that the underlying call was made with the expected - # request object values. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - arg = args[0].parent - mock_val = 'parent_value' - assert arg == mock_val - -@pytest.mark.asyncio -async def test_list_data_policies_flattened_error_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Attempting to call a method with both a request object and flattened - # fields is an error. - with pytest.raises(ValueError): - await client.list_data_policies( - datapolicy.ListDataPoliciesRequest(), - parent='parent_value', - ) - - -def test_list_data_policies_pager(transport_name: str = "grpc"): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport_name, - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - - expected_metadata = () - retry = retries.Retry() - timeout = 5 - expected_metadata = tuple(expected_metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ('parent', ''), - )), - ) - pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) - - assert pager._metadata == expected_metadata - assert pager._retry == retry - assert pager._timeout == timeout - - results = list(pager) - assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) -def test_list_data_policies_pages(transport_name: str = "grpc"): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport_name, - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - pages = list(client.list_data_policies(request={}).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): - assert page_.raw_page.next_page_token == token - -@pytest.mark.asyncio -async def test_list_data_policies_async_pager(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - async_pager = await client.list_data_policies(request={},) - assert async_pager.next_page_token == 'abc' - responses = [] - async for response in async_pager: # pragma: no branch - responses.append(response) - - assert len(responses) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in responses) - - -@pytest.mark.asyncio -async def test_list_data_policies_async_pages(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: - # Set the response to a series of pages. - call.side_effect = ( - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - next_page_token='abc', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[], - next_page_token='def', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - ], - next_page_token='ghi', - ), - datapolicy.ListDataPoliciesResponse( - data_policies=[ - datapolicy.DataPolicy(), - datapolicy.DataPolicy(), - ], - ), - RuntimeError, - ) - pages = [] - # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` - # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 - async for page_ in ( # pragma: no branch - await client.list_data_policies(request={}) - ).pages: - pages.append(page_) - for page_, token in zip(pages, ['abc','def','ghi', '']): - assert page_.raw_page.next_page_token == token - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) -def test_get_iam_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - response = client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.GetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -def test_get_iam_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.get_iam_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', - ) - -def test_get_iam_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.get_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc - request = {} - client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.get_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc - - request = {} - await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.get_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - response = await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.GetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.asyncio -async def test_get_iam_policy_async_from_dict(): - await test_get_iam_policy_async(request_type=dict) - -def test_get_iam_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.GetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_get_iam_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.GetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) - await client.get_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_get_iam_policy_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy() - response = client.get_iam_policy(request={ - 'resource': 'resource_value', - 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), - } - ) - call.assert_called() - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) -def test_set_iam_policy(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', - ) - response = client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.SetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -def test_set_iam_policy_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.set_iam_policy(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', - ) - -def test_set_iam_policy_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.set_iam_policy in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc - request = {} - client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.set_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc - - request = {} - await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.set_iam_policy(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - response = await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.SetIamPolicyRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, policy_pb2.Policy) - assert response.version == 774 - assert response.etag == b'etag_blob' - - -@pytest.mark.asyncio -async def test_set_iam_policy_async_from_dict(): - await test_set_iam_policy_async(request_type=dict) - -def test_set_iam_policy_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.SetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_set_iam_policy_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.SetIamPolicyRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) - await client.set_iam_policy(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_set_iam_policy_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = policy_pb2.Policy() - response = client.set_iam_policy(request={ - 'resource': 'resource_value', - 'policy': policy_pb2.Policy(version=774), - 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), - } - ) - call.assert_called() - - -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) -def test_test_iam_permissions(request_type, transport: str = 'grpc'): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - ) - response = client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.TestIamPermissionsRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] - - -def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): - # This test is a coverage failsafe to make sure that UUID4 fields are - # automatically populated, according to AIP-4235, with non-empty requests. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', - ) - - # Populate all string fields in the request which are not UUID4 - # since we want to check that UUID4 are populated automatically - # if they meet the requirements of AIP 4235. - request = iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', - ) - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client.test_iam_permissions(request=request) - call.assert_called() - _, args, _ = call.mock_calls[0] - assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', - ) - -def test_test_iam_permissions_use_cached_wrapped_rpc(): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method.wrap_method") as wrapper_fn: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc - request = {} - client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - client.test_iam_permissions(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): - # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, - # instead of constructing them on each call - with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Should wrap all calls on client creation - assert wrapper_fn.call_count > 0 - wrapper_fn.reset_mock() - - # Ensure method has been cached - assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods - - # Replace cached wrapped function with mock - mock_rpc = mock.AsyncMock() - mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc - - request = {} - await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert mock_rpc.call_count == 1 - - await client.test_iam_permissions(request) - - # Establish that a new wrapper was not created for this call - assert wrapper_fn.call_count == 0 - assert mock_rpc.call_count == 2 - -@pytest.mark.asyncio -async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport=transport, - ) - - # Everything is optional in proto3 as far as the runtime is concerned, - # and we are mocking out the actual API, so just send an empty request. - request = request_type() - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) - response = await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - request = iam_policy_pb2.TestIamPermissionsRequest() - assert args[0] == request - - # Establish that the response is the type that we expect. - assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] - - -@pytest.mark.asyncio -async def test_test_iam_permissions_async_from_dict(): - await test_test_iam_permissions_async(request_type=dict) - -def test_test_iam_permissions_field_headers(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.TestIamPermissionsRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) == 1 - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - - -@pytest.mark.asyncio -async def test_test_iam_permissions_field_headers_async(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - ) - - # Any value that is part of the HTTP/1.1 URI should be sent as - # a field header. Set these to a non-empty value. - request = iam_policy_pb2.TestIamPermissionsRequest() - - request.resource = 'resource_value' - - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) - await client.test_iam_permissions(request) - - # Establish that the underlying gRPC stub method was called. - assert len(call.mock_calls) - _, args, _ = call.mock_calls[0] - assert args[0] == request - - # Establish that the field header was sent. - _, _, kw = call.mock_calls[0] - assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] - -def test_test_iam_permissions_from_dict_foreign(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - response = client.test_iam_permissions(request={ - 'resource': 'resource_value', - 'permissions': ['permissions_value'], - } - ) - call.assert_called() - - -def test_credentials_transport_error(): - # It is an error to provide credentials and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - - # It is an error to provide a credentials file and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options={"credentials_file": "credentials.json"}, - transport=transport, - ) - - # It is an error to provide an api_key and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options=options, - transport=transport, - ) - - # It is an error to provide an api_key and a credential. - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options=options, - credentials=ga_credentials.AnonymousCredentials() - ) - - # It is an error to provide scopes and a transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = DataPolicyServiceClient( - client_options={"scopes": ["1", "2"]}, - transport=transport, - ) - - -def test_transport_instance(): - # A client may be instantiated with a custom transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - client = DataPolicyServiceClient(transport=transport) - assert client.transport is transport - -def test_transport_get_channel(): - # A client may be instantiated with a custom transport instance. - transport = transports.DataPolicyServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel - - transport = transports.DataPolicyServiceGrpcAsyncIOTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel - -@pytest.mark.parametrize("transport_class", [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, -]) -def test_transport_adc(transport_class): - # Test default credentials are used if not provided. - with mock.patch.object(google.auth, 'default') as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class() - adc.assert_called_once() - -def test_transport_kind_grpc(): - transport = DataPolicyServiceClient.get_transport_class("grpc")( - credentials=ga_credentials.AnonymousCredentials() - ) - assert transport.kind == "grpc" - - -def test_initialize_client_w_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" - ) - assert client is not None - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_create_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.create_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.CreateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_update_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.update_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.UpdateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_delete_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value = None - client.delete_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.DeleteDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_data_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = datapolicy.DataPolicy() - client.get_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.GetDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_list_data_policies_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = datapolicy.ListDataPoliciesResponse() - client.list_data_policies(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.ListDataPoliciesRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_get_iam_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.get_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.GetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_set_iam_policy_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value = policy_pb2.Policy() - client.set_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.SetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -def test_test_iam_permissions_empty_call_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - client.test_iam_permissions(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.TestIamPermissionsRequest() - - assert args[0] == request_msg - - -def test_transport_kind_grpc_asyncio(): - transport = DataPolicyServiceAsyncClient.get_transport_class("grpc_asyncio")( - credentials=async_anonymous_credentials() - ) - assert transport.kind == "grpc_asyncio" - - -def test_initialize_client_w_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" - ) - assert client is not None - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_create_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.create_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.CreateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_update_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.update_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.UpdateDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_delete_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) - await client.delete_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.DeleteDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_get_data_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.COLUMN_LEVEL_SECURITY_POLICY, - data_policy_id='data_policy_id_value', - )) - await client.get_data_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.GetDataPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_list_data_policies_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) - await client.list_data_policies(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = datapolicy.ListDataPoliciesRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_get_iam_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - await client.get_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.GetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_set_iam_policy_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) - await client.set_iam_policy(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.SetIamPolicyRequest() - - assert args[0] == request_msg - - -# This test is a coverage failsafe to make sure that totally empty calls, -# i.e. request == None and no flattened fields passed, work. -@pytest.mark.asyncio -async def test_test_iam_permissions_empty_call_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio", - ) - - # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) - await client.test_iam_permissions(request=None) - - # Establish that the underlying stub method was called. - call.assert_called() - _, args, _ = call.mock_calls[0] - request_msg = iam_policy_pb2.TestIamPermissionsRequest() - - assert args[0] == request_msg - - -def test_transport_grpc_default(): - # A client should use the gRPC transport by default. - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - ) - assert isinstance( - client.transport, - transports.DataPolicyServiceGrpcTransport, - ) - -def test_data_policy_service_base_transport_error(): - # Passing both a credentials object and credentials_file should raise an error - with pytest.raises(core_exceptions.DuplicateCredentialArgs): - transport = transports.DataPolicyServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json" - ) - - -def test_data_policy_service_base_transport(): - # Instantiate the base transport. - with mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: - Transport.return_value = None - transport = transports.DataPolicyServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - - # Every method on the transport should just blindly - # raise NotImplementedError. - methods = ( - 'create_data_policy', - 'update_data_policy', - 'delete_data_policy', - 'get_data_policy', - 'list_data_policies', - 'get_iam_policy', - 'set_iam_policy', - 'test_iam_permissions', - ) - for method in methods: - with pytest.raises(NotImplementedError): - getattr(transport, method)(request=object()) - - with pytest.raises(NotImplementedError): - transport.close() - - # Catch all for all remaining methods and properties - remainder = [ - 'kind', - ] - for r in remainder: - with pytest.raises(NotImplementedError): - getattr(transport, r)() - - -def test_data_policy_service_base_transport_with_credentials_file(): - # Instantiate the base transport with a credentials file - with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: - Transport.return_value = None - load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.DataPolicyServiceTransport( - credentials_file="credentials.json", - quota_project_id="octopus", - ) - load_creds.assert_called_once_with("credentials.json", - scopes=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - quota_project_id="octopus", - ) - - -def test_data_policy_service_base_transport_with_adc(): - # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v1beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: - Transport.return_value = None - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.DataPolicyServiceTransport() - adc.assert_called_once() - - -def test_data_policy_service_auth_adc(): - # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - DataPolicyServiceClient() - adc.assert_called_once_with( - scopes=None, - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - quota_project_id=None, - ) - - -@pytest.mark.parametrize( - "transport_class", - [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - ], -) -def test_data_policy_service_transport_auth_adc(transport_class): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class(quota_project_id="octopus", scopes=["1", "2"]) - adc.assert_called_once_with( - scopes=["1", "2"], - default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), - quota_project_id="octopus", - ) - - -@pytest.mark.parametrize( - "transport_class", - [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - ], -) -def test_data_policy_service_transport_auth_gdch_credentials(transport_class): - host = 'https://language.com' - api_audience_tests = [None, 'https://language2.com'] - api_audience_expect = [host, 'https://language2.com'] - for t, e in zip(api_audience_tests, api_audience_expect): - with mock.patch.object(google.auth, 'default', autospec=True) as adc: - gdch_mock = mock.MagicMock() - type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) - adc.return_value = (gdch_mock, None) - transport_class(host=host, api_audience=t) - gdch_mock.with_gdch_audience.assert_called_once_with( - e - ) - - -@pytest.mark.parametrize( - "transport_class,grpc_helpers", - [ - (transports.DataPolicyServiceGrpcTransport, grpc_helpers), - (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) - ], -) -def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( - grpc_helpers, "create_channel", autospec=True - ) as create_channel: - creds = ga_credentials.AnonymousCredentials() - adc.return_value = (creds, None) - transport_class( - quota_project_id="octopus", - scopes=["1", "2"] - ) - - create_channel.assert_called_with( - "bigquerydatapolicy.googleapis.com:443", - credentials=creds, - credentials_file=None, - quota_project_id="octopus", - default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), - scopes=["1", "2"], - default_host="bigquerydatapolicy.googleapis.com", - ssl_credentials=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( - transport_class -): - cred = ga_credentials.AnonymousCredentials() - - # Check ssl_channel_credentials is used if provided. - with mock.patch.object(transport_class, "create_channel") as mock_create_channel: - mock_ssl_channel_creds = mock.Mock() - transport_class( - host="squid.clam.whelk", - credentials=cred, - ssl_channel_credentials=mock_ssl_channel_creds - ) - mock_create_channel.assert_called_once_with( - "squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_channel_creds, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - - # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls - # is used. - with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): - with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: - transport_class( - credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback - ) - expected_cert, expected_key = client_cert_source_callback() - mock_ssl_cred.assert_called_once_with( - certificate_chain=expected_cert, - private_key=expected_key - ) - - -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", -]) -def test_data_policy_service_host_no_port(transport_name): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), - transport=transport_name, - ) - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - ) - -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", -]) -def test_data_policy_service_host_with_port(transport_name): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), - transport=transport_name, - ) - assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:8000' - ) - -def test_data_policy_service_grpc_transport_channel(): - channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) - - # Check that channel is used if provided. - transport = transports.DataPolicyServiceGrpcTransport( - host="squid.clam.whelk", - channel=channel, - ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None - - -def test_data_policy_service_grpc_asyncio_transport_channel(): - channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) - - # Check that channel is used if provided. - transport = transports.DataPolicyServiceGrpcAsyncIOTransport( - host="squid.clam.whelk", - channel=channel, - ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None - - -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_client_cert_source( - transport_class -): - with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: - mock_ssl_cred = mock.Mock() - grpc_ssl_channel_cred.return_value = mock_ssl_cred - - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel - - cred = ga_credentials.AnonymousCredentials() - with pytest.warns(DeprecationWarning): - with mock.patch.object(google.auth, 'default') as adc: - adc.return_value = (cred, None) - transport = transport_class( - host="squid.clam.whelk", - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=client_cert_source_callback, - ) - adc.assert_called_once() - - grpc_ssl_channel_cred.assert_called_once_with( - certificate_chain=b"cert bytes", private_key=b"key bytes" - ) - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel - assert transport._ssl_channel_credentials == mock_ssl_cred - - -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_adc( - transport_class -): - mock_ssl_cred = mock.Mock() - with mock.patch.multiple( - "google.auth.transport.grpc.SslCredentials", - __init__=mock.Mock(return_value=None), - ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), - ): - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel - mock_cred = mock.Mock() - - with pytest.warns(DeprecationWarning): - transport = transport_class( - host="squid.clam.whelk", - credentials=mock_cred, - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=None, - ) - - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=mock_cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel - - -def test_data_policy_path(): - project = "squid" - location = "clam" - data_policy = "whelk" - expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) - actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) - assert expected == actual - - -def test_parse_data_policy_path(): - expected = { - "project": "octopus", - "location": "oyster", - "data_policy": "nudibranch", - } - path = DataPolicyServiceClient.data_policy_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_data_policy_path(path) - assert expected == actual - -def test_common_billing_account_path(): - billing_account = "cuttlefish" - expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) - actual = DataPolicyServiceClient.common_billing_account_path(billing_account) - assert expected == actual - - -def test_parse_common_billing_account_path(): - expected = { - "billing_account": "mussel", - } - path = DataPolicyServiceClient.common_billing_account_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_billing_account_path(path) - assert expected == actual - -def test_common_folder_path(): - folder = "winkle" - expected = "folders/{folder}".format(folder=folder, ) - actual = DataPolicyServiceClient.common_folder_path(folder) - assert expected == actual - - -def test_parse_common_folder_path(): - expected = { - "folder": "nautilus", - } - path = DataPolicyServiceClient.common_folder_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_folder_path(path) - assert expected == actual - -def test_common_organization_path(): - organization = "scallop" - expected = "organizations/{organization}".format(organization=organization, ) - actual = DataPolicyServiceClient.common_organization_path(organization) - assert expected == actual - - -def test_parse_common_organization_path(): - expected = { - "organization": "abalone", - } - path = DataPolicyServiceClient.common_organization_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_organization_path(path) - assert expected == actual - -def test_common_project_path(): - project = "squid" - expected = "projects/{project}".format(project=project, ) - actual = DataPolicyServiceClient.common_project_path(project) - assert expected == actual - - -def test_parse_common_project_path(): - expected = { - "project": "clam", - } - path = DataPolicyServiceClient.common_project_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_project_path(path) - assert expected == actual - -def test_common_location_path(): - project = "whelk" - location = "octopus" - expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) - actual = DataPolicyServiceClient.common_location_path(project, location) - assert expected == actual - - -def test_parse_common_location_path(): - expected = { - "project": "oyster", - "location": "nudibranch", - } - path = DataPolicyServiceClient.common_location_path(**expected) - - # Check that the path construction is reversible. - actual = DataPolicyServiceClient.parse_common_location_path(path) - assert expected == actual - - -def test_client_with_default_client_info(): - client_info = gapic_v1.client_info.ClientInfo() - - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) - - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: - transport_class = DataPolicyServiceClient.get_transport_class() - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) - - -def test_transport_close_grpc(): - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" - ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: - with client: - close.assert_not_called() - close.assert_called_once() - - -@pytest.mark.asyncio -async def test_transport_close_grpc_asyncio(): - client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" - ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: - async with client: - close.assert_not_called() - close.assert_called_once() - - -def test_client_ctx(): - transports = [ - 'grpc', - ] - for transport in transports: - client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport - ) - # Test client calls underlying transport. - with mock.patch.object(type(client.transport), "close") as close: - close.assert_not_called() - with client: - pass - close.assert_called() - -@pytest.mark.parametrize("client_class,transport_class", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), -]) -def test_api_key_credentials(client_class, transport_class): - with mock.patch.object( - google.auth._default, "get_api_key_credentials", create=True - ) as get_api_key_credentials: - mock_cred = mock.Mock() - get_api_key_credentials.return_value = mock_cred - options = client_options.ClientOptions() - options.api_key = "api_key" - with mock.patch.object(transport_class, "__init__") as patched: - patched.return_value = None - client = client_class(client_options=options) - patched.assert_called_once_with( - credentials=mock_cred, - credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), - scopes=None, - client_cert_source_for_mtls=None, - quota_project_id=None, - client_info=transports.base.DEFAULT_CLIENT_INFO, - always_use_jwt_access=True, - api_audience=None, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc deleted file mode 100644 index 0c3effcc3668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.coveragerc +++ /dev/null @@ -1,13 +0,0 @@ -[run] -branch = True - -[report] -show_missing = True -omit = - google/cloud/bigquery_datapolicies/__init__.py - google/cloud/bigquery_datapolicies/gapic_version.py -exclude_lines = - # Re-enable the standard pragma - pragma: NO COVER - # Ignore debug-only repr - def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 deleted file mode 100644 index 90316de21489..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/.flake8 +++ /dev/null @@ -1,34 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -[flake8] -# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): -# Resolve flake8 lint issues -ignore = E203, E231, E266, E501, W503 -exclude = - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): - # Ensure that generated code passes flake8 lint - **/gapic/** - **/services/** - **/types/** - # Exclude Protobuf gencode - *_pb2.py - - # Standard linting exemptions. - **/.nox/** - __pycache__, - .git, - *.pyc, - conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE deleted file mode 100644 index d64569567334..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/LICENSE +++ /dev/null @@ -1,202 +0,0 @@ - - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in deleted file mode 100644 index dae249ec8976..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/MANIFEST.in +++ /dev/null @@ -1,20 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -include README.rst LICENSE -recursive-include google *.py *.pyi *.json *.proto py.typed -recursive-include tests * -global-exclude *.py[co] -global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst deleted file mode 100644 index 074e1245b6d1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/README.rst +++ /dev/null @@ -1,143 +0,0 @@ -Python Client for Google Cloud Bigquery Datapolicies API -================================================= - -Quick Start ------------ - -In order to use this library, you first need to go through the following steps: - -1. `Select or create a Cloud Platform project.`_ -2. `Enable billing for your project.`_ -3. Enable the Google Cloud Bigquery Datapolicies API. -4. `Setup Authentication.`_ - -.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project -.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project -.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html - -Installation -~~~~~~~~~~~~ - -Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to -create isolated Python environments. The basic problem it addresses is one of -dependencies and versions, and indirectly permissions. - -With `virtualenv`_, it's possible to install this library without needing system -install permissions, and without clashing with the installed system -dependencies. - -.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ - - -Mac/Linux -^^^^^^^^^ - -.. code-block:: console - - python3 -m venv - source /bin/activate - /bin/pip install /path/to/library - - -Windows -^^^^^^^ - -.. code-block:: console - - python3 -m venv - \Scripts\activate - \Scripts\pip.exe install \path\to\library - - -Logging -------- - -This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. -Note the following: - -#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. -#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. -#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. - - -Simple, environment-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google -logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged -messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging -event. - -A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. - -- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. -- Invalid logging scopes: :code:`foo`, :code:`123`, etc. - -**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. - - -Examples -^^^^^^^^ - -- Enabling the default handler for all Google-based loggers - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google - -- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 - - -Advanced, code-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -You can also configure a valid logging scope using Python's standard `logging` mechanism. - - -Examples -^^^^^^^^ - -- Configuring a handler for all Google-based loggers - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - -- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google.cloud.library_v1") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - - -Logging details -~~~~~~~~~~~~~~~ - -#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root - logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set - :code:`logging.getLogger("google").propagate = True` in your code. -#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for - one library, but decide you need to also set up environment-based logging configuration for another library. - - #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual - if the code -based configuration gets applied first. - -#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get - executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. - (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css deleted file mode 100644 index b0a295464b23..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_static/custom.css +++ /dev/null @@ -1,20 +0,0 @@ -div#python2-eol { - border-color: red; - border-width: medium; -} - -/* Ensure minimum width for 'Parameters' / 'Returns' column */ -dl.field-list > dt { - min-width: 100px -} - -/* Insert space between methods for readability */ -dl.method { - padding-top: 10px; - padding-bottom: 10px -} - -/* Insert empty space between classes */ -dl.class { - padding-bottom: 50px -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html deleted file mode 100644 index 95e9c77fcfe1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/_templates/layout.html +++ /dev/null @@ -1,50 +0,0 @@ - -{% extends "!layout.html" %} -{%- block content %} -{%- if theme_fixed_sidebar|lower == 'true' %} -
- {{ sidebar() }} - {%- block document %} -
- {%- if render_sidebar %} -
- {%- endif %} - - {%- block relbar_top %} - {%- if theme_show_relbar_top|tobool %} - - {%- endif %} - {% endblock %} - -
-
- As of January 1, 2020 this library no longer supports Python 2 on the latest released version. - Library versions released prior to that date will continue to be available. For more information please - visit Python 2 support on Google Cloud. -
- {% block body %} {% endblock %} -
- - {%- block relbar_bottom %} - {%- if theme_show_relbar_bottom|tobool %} - - {%- endif %} - {% endblock %} - - {%- if render_sidebar %} -
- {%- endif %} -
- {%- endblock %} -
-
-{%- else %} -{{ super() }} -{%- endif %} -{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py deleted file mode 100644 index babd226a574e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/conf.py +++ /dev/null @@ -1,385 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# -# google-cloud-bigquery-datapolicies documentation build configuration file -# -# This file is execfile()d with the current directory set to its -# containing dir. -# -# Note that not all possible configuration values are present in this -# autogenerated file. -# -# All configuration values have a default; values that are commented out -# serve to show the default. - -import sys -import os -import shlex - -# If extensions (or modules to document with autodoc) are in another directory, -# add these directories to sys.path here. If the directory is relative to the -# documentation root, use os.path.abspath to make it absolute, like shown here. -sys.path.insert(0, os.path.abspath("..")) - -# For plugins that can not read conf.py. -# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 -sys.path.insert(0, os.path.abspath(".")) - -__version__ = "" - -# -- General configuration ------------------------------------------------ - -# If your documentation needs a minimal Sphinx version, state it here. -needs_sphinx = "4.5.0" - -# Add any Sphinx extension module names here, as strings. They can be -# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom -# ones. -extensions = [ - "sphinx.ext.autodoc", - "sphinx.ext.autosummary", - "sphinx.ext.intersphinx", - "sphinx.ext.coverage", - "sphinx.ext.doctest", - "sphinx.ext.napoleon", - "sphinx.ext.todo", - "sphinx.ext.viewcode", - "recommonmark", -] - -# autodoc/autosummary flags -autoclass_content = "both" -autodoc_default_options = {"members": True} -autosummary_generate = True - - -# Add any paths that contain templates here, relative to this directory. -templates_path = ["_templates"] - -# The suffix(es) of source filenames. -# You can specify multiple suffix as a list of string: -# source_suffix = ['.rst', '.md'] -source_suffix = [".rst", ".md"] - -# The encoding of source files. -# source_encoding = 'utf-8-sig' - -# The root toctree document. -root_doc = "index" - -# General information about the project. -project = u"google-cloud-bigquery-datapolicies" -copyright = u"2025, Google, LLC" -author = u"Google APIs" - -# The version info for the project you're documenting, acts as replacement for -# |version| and |release|, also used in various other places throughout the -# built documents. -# -# The full version, including alpha/beta/rc tags. -release = __version__ -# The short X.Y version. -version = ".".join(release.split(".")[0:2]) - -# The language for content autogenerated by Sphinx. Refer to documentation -# for a list of supported languages. -# -# This is also used if you do content translation via gettext catalogs. -# Usually you set "language" from the command line for these cases. -language = None - -# There are two options for replacing |today|: either, you set today to some -# non-false value, then it is used: -# today = '' -# Else, today_fmt is used as the format for a strftime call. -# today_fmt = '%B %d, %Y' - -# List of patterns, relative to source directory, that match files and -# directories to ignore when looking for source files. -exclude_patterns = [ - "_build", - "**/.nox/**/*", - "samples/AUTHORING_GUIDE.md", - "samples/CONTRIBUTING.md", - "samples/snippets/README.rst", -] - -# The reST default role (used for this markup: `text`) to use for all -# documents. -# default_role = None - -# If true, '()' will be appended to :func: etc. cross-reference text. -# add_function_parentheses = True - -# If true, the current module name will be prepended to all description -# unit titles (such as .. function::). -# add_module_names = True - -# If true, sectionauthor and moduleauthor directives will be shown in the -# output. They are ignored by default. -# show_authors = False - -# The name of the Pygments (syntax highlighting) style to use. -pygments_style = "sphinx" - -# A list of ignored prefixes for module index sorting. -# modindex_common_prefix = [] - -# If true, keep warnings as "system message" paragraphs in the built documents. -# keep_warnings = False - -# If true, `todo` and `todoList` produce output, else they produce nothing. -todo_include_todos = True - - -# -- Options for HTML output ---------------------------------------------- - -# The theme to use for HTML and HTML Help pages. See the documentation for -# a list of builtin themes. -html_theme = "alabaster" - -# Theme options are theme-specific and customize the look and feel of a theme -# further. For a list of options available for each theme, see the -# documentation. -html_theme_options = { - "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", - "github_user": "googleapis", - "github_repo": "google-cloud-python", - "github_banner": True, - "font_family": "'Roboto', Georgia, sans", - "head_font_family": "'Roboto', Georgia, serif", - "code_font_family": "'Roboto Mono', 'Consolas', monospace", -} - -# Add any paths that contain custom themes here, relative to this directory. -# html_theme_path = [] - -# The name for this set of Sphinx documents. If None, it defaults to -# " v documentation". -# html_title = None - -# A shorter title for the navigation bar. Default is the same as html_title. -# html_short_title = None - -# The name of an image file (relative to this directory) to place at the top -# of the sidebar. -# html_logo = None - -# The name of an image file (within the static path) to use as favicon of the -# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 -# pixels large. -# html_favicon = None - -# Add any paths that contain custom static files (such as style sheets) here, -# relative to this directory. They are copied after the builtin static files, -# so a file named "default.css" will overwrite the builtin "default.css". -html_static_path = ["_static"] - -# Add any extra paths that contain custom files (such as robots.txt or -# .htaccess) here, relative to this directory. These files are copied -# directly to the root of the documentation. -# html_extra_path = [] - -# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, -# using the given strftime format. -# html_last_updated_fmt = '%b %d, %Y' - -# If true, SmartyPants will be used to convert quotes and dashes to -# typographically correct entities. -# html_use_smartypants = True - -# Custom sidebar templates, maps document names to template names. -# html_sidebars = {} - -# Additional templates that should be rendered to pages, maps page names to -# template names. -# html_additional_pages = {} - -# If false, no module index is generated. -# html_domain_indices = True - -# If false, no index is generated. -# html_use_index = True - -# If true, the index is split into individual pages for each letter. -# html_split_index = False - -# If true, links to the reST sources are added to the pages. -# html_show_sourcelink = True - -# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. -# html_show_sphinx = True - -# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. -# html_show_copyright = True - -# If true, an OpenSearch description file will be output, and all pages will -# contain a tag referring to it. The value of this option must be the -# base URL from which the finished HTML is served. -# html_use_opensearch = '' - -# This is the file name suffix for HTML files (e.g. ".xhtml"). -# html_file_suffix = None - -# Language to be used for generating the HTML full-text search index. -# Sphinx supports the following languages: -# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' -# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' -# html_search_language = 'en' - -# A dictionary with options for the search language support, empty by default. -# Now only 'ja' uses this config value -# html_search_options = {'type': 'default'} - -# The name of a javascript file (relative to the configuration directory) that -# implements a search results scorer. If empty, the default will be used. -# html_search_scorer = 'scorer.js' - -# Output file base name for HTML help builder. -htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" - -# -- Options for warnings ------------------------------------------------------ - - -suppress_warnings = [ - # Temporarily suppress this to avoid "more than one target found for - # cross-reference" warning, which are intractable for us to avoid while in - # a mono-repo. - # See https://github.com/sphinx-doc/sphinx/blob - # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 - "ref.python" -] - -# -- Options for LaTeX output --------------------------------------------- - -latex_elements = { - # The paper size ('letterpaper' or 'a4paper'). - # 'papersize': 'letterpaper', - # The font size ('10pt', '11pt' or '12pt'). - # 'pointsize': '10pt', - # Additional stuff for the LaTeX preamble. - # 'preamble': '', - # Latex figure (float) alignment - # 'figure_align': 'htbp', -} - -# Grouping the document tree into LaTeX files. List of tuples -# (source start file, target name, title, -# author, documentclass [howto, manual, or own class]). -latex_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies.tex", - u"google-cloud-bigquery-datapolicies Documentation", - author, - "manual", - ) -] - -# The name of an image file (relative to this directory) to place at the top of -# the title page. -# latex_logo = None - -# For "manual" documents, if this is true, then toplevel headings are parts, -# not chapters. -# latex_use_parts = False - -# If true, show page references after internal links. -# latex_show_pagerefs = False - -# If true, show URL addresses after external links. -# latex_show_urls = False - -# Documents to append as an appendix to all manuals. -# latex_appendices = [] - -# If false, no module index is generated. -# latex_domain_indices = True - - -# -- Options for manual page output --------------------------------------- - -# One entry per manual page. List of tuples -# (source start file, name, description, authors, manual section). -man_pages = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - [author], - 1, - ) -] - -# If true, show URL addresses after external links. -# man_show_urls = False - - -# -- Options for Texinfo output ------------------------------------------- - -# Grouping the document tree into Texinfo files. List of tuples -# (source start file, target name, title, author, -# dir menu entry, description, category) -texinfo_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - author, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Library", - "APIs", - ) -] - -# Documents to append as an appendix to all manuals. -# texinfo_appendices = [] - -# If false, no module index is generated. -# texinfo_domain_indices = True - -# How to display URL addresses: 'footnote', 'no', or 'inline'. -# texinfo_show_urls = 'footnote' - -# If true, do not generate a @detailmenu in the "Top" node's menu. -# texinfo_no_detailmenu = False - - -# Example configuration for intersphinx: refer to the Python standard library. -intersphinx_mapping = { - "python": ("https://python.readthedocs.org/en/latest/", None), - "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), - "google.api_core": ( - "https://googleapis.dev/python/google-api-core/latest/", - None, - ), - "grpc": ("https://grpc.github.io/grpc/python/", None), - "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), - "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), -} - - -# Napoleon settings -napoleon_google_docstring = True -napoleon_numpy_docstring = True -napoleon_include_private_with_doc = False -napoleon_include_special_with_doc = True -napoleon_use_admonition_for_examples = False -napoleon_use_admonition_for_notes = False -napoleon_use_admonition_for_references = False -napoleon_use_ivar = False -napoleon_use_param = True -napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst deleted file mode 100644 index 1cd22cd2a589..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/index.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. include:: multiprocessing.rst - - -API Reference -------------- -.. toctree:: - :maxdepth: 2 - - bigquery_datapolicies_v2/services_ - bigquery_datapolicies_v2/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst deleted file mode 100644 index 536d17b2ea65..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/multiprocessing.rst +++ /dev/null @@ -1,7 +0,0 @@ -.. note:: - - Because this client uses :mod:`grpc` library, it is safe to - share instances across threads. In multiprocessing scenarios, the best - practice is to create client instances *after* the invocation of - :func:`os.fork` by :class:`multiprocessing.pool.Pool` or - :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py deleted file mode 100644 index 9fc7c3b9b74f..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/__init__.py +++ /dev/null @@ -1,47 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies import gapic_version as package_version - -__version__ = package_version.__version__ - - -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service.client import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service.async_client import DataPolicyServiceAsyncClient - -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import AddGranteesRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import CreateDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DataMaskingPolicy -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DataPolicy -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import DeleteDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import GetDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import ListDataPoliciesRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import ListDataPoliciesResponse -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import RemoveGranteesRequest -from google.cloud.bigquery_datapolicies_v2.types.datapolicy import UpdateDataPolicyRequest - -__all__ = ('DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', - 'AddGranteesRequest', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RemoveGranteesRequest', - 'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py deleted file mode 100644 index 003a99b34841..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/__init__.py +++ /dev/null @@ -1,48 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version - -__version__ = package_version.__version__ - - -from .services.data_policy_service import DataPolicyServiceClient -from .services.data_policy_service import DataPolicyServiceAsyncClient - -from .types.datapolicy import AddGranteesRequest -from .types.datapolicy import CreateDataPolicyRequest -from .types.datapolicy import DataMaskingPolicy -from .types.datapolicy import DataPolicy -from .types.datapolicy import DeleteDataPolicyRequest -from .types.datapolicy import GetDataPolicyRequest -from .types.datapolicy import ListDataPoliciesRequest -from .types.datapolicy import ListDataPoliciesResponse -from .types.datapolicy import RemoveGranteesRequest -from .types.datapolicy import UpdateDataPolicyRequest - -__all__ = ( - 'DataPolicyServiceAsyncClient', -'AddGranteesRequest', -'CreateDataPolicyRequest', -'DataMaskingPolicy', -'DataPolicy', -'DataPolicyServiceClient', -'DeleteDataPolicyRequest', -'GetDataPolicyRequest', -'ListDataPoliciesRequest', -'ListDataPoliciesResponse', -'RemoveGranteesRequest', -'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst deleted file mode 100644 index b83d156af245..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst +++ /dev/null @@ -1,9 +0,0 @@ - -transport inheritance structure -_______________________________ - -`DataPolicyServiceTransport` is the ABC for all transports. -- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). -- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). -- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). -- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py deleted file mode 100644 index 2c95ef809668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py +++ /dev/null @@ -1,38 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from collections import OrderedDict -from typing import Dict, Type - -from .base import DataPolicyServiceTransport -from .grpc import DataPolicyServiceGrpcTransport -from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .rest import DataPolicyServiceRestTransport -from .rest import DataPolicyServiceRestInterceptor - - -# Compile a registry of transports. -_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] -_transport_registry['grpc'] = DataPolicyServiceGrpcTransport -_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport -_transport_registry['rest'] = DataPolicyServiceRestTransport - -__all__ = ( - 'DataPolicyServiceTransport', - 'DataPolicyServiceGrpcTransport', - 'DataPolicyServiceGrpcAsyncIOTransport', - 'DataPolicyServiceRestTransport', - 'DataPolicyServiceRestInterceptor', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini deleted file mode 100644 index 574c5aed394b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/mypy.ini +++ /dev/null @@ -1,3 +0,0 @@ -[mypy] -python_version = 3.7 -namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py deleted file mode 100644 index 25d78ab7c0ff..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/noxfile.py +++ /dev/null @@ -1,591 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -import pathlib -import re -import shutil - -from typing import Dict, List -import warnings - -import nox - -BLACK_VERSION = "black[jupyter]==23.7.0" -ISORT_VERSION = "isort==5.11.0" - -LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] - -ALL_PYTHON = [ - "3.7", - "3.8", - "3.9", - "3.10", - "3.11", - "3.12", - "3.13", -] - -DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] - -CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() - -LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" -PACKAGE_NAME = "google-cloud-bigquery-datapolicies" - -UNIT_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "asyncmock", - "pytest", - "pytest-cov", - "pytest-asyncio", -] -UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_DEPENDENCIES: List[str] = [] -UNIT_TEST_EXTRAS: List[str] = [] -UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] -SYSTEM_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "pytest", - "google-cloud-testutils", -] -SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_EXTRAS: List[str] = [] -SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -nox.options.sessions = [ - "unit", - "system", - "cover", - "lint", - "lint_setup_py", - "blacken", - "docs", -] - -# Error if a python version is missing -nox.options.error_on_missing_interpreters = True - - -@nox.session(python=ALL_PYTHON) -def mypy(session): - """Run the type checker.""" - session.install( - "mypy", - "types-requests", - "types-protobuf", - ) - session.install(".") - session.run( - "mypy", - "-p", - "google", - ) - - -@nox.session -def update_lower_bounds(session): - """Update lower bounds in constraints.txt to match setup.py""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "update", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session -def check_lower_bounds(session): - """Check lower bounds in setup.py are reflected in constraints file""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "check", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint(session): - """Run linters. - - Returns a failure if the linters find linting errors or sufficiently - serious code quality issues. - """ - session.install("flake8", BLACK_VERSION) - session.run( - "black", - "--check", - *LINT_PATHS, - ) - - session.run("flake8", "google", "tests") - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def blacken(session): - """Run black. Format code to uniform standard.""" - session.install(BLACK_VERSION) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def format(session): - """ - Run isort to sort imports. Then run black - to format code to uniform standard. - """ - session.install(BLACK_VERSION, ISORT_VERSION) - # Use the --fss option to sort imports using strict alphabetical order. - # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections - session.run( - "isort", - "--fss", - *LINT_PATHS, - ) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint_setup_py(session): - """Verify that setup.py is valid (including RST check).""" - session.install("setuptools", "docutils", "pygments") - session.run("python", "setup.py", "check", "--restructuredtext", "--strict") - - -def install_unittest_dependencies(session, *constraints): - standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES - session.install(*standard_deps, *constraints) - - if UNIT_TEST_EXTERNAL_DEPENDENCIES: - warnings.warn( - "'unit_test_external_dependencies' is deprecated. Instead, please " - "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", - DeprecationWarning, - ) - session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_LOCAL_DEPENDENCIES: - session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_EXTRAS_BY_PYTHON: - extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif UNIT_TEST_EXTRAS: - extras = UNIT_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=ALL_PYTHON) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def unit(session, protobuf_implementation): - # Install all test dependencies, then install this package in-place. - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - install_unittest_dependencies(session, "-c", constraints_path) - - # TODO(https://github.com/googleapis/synthtool/issues/1976): - # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. - # The 'cpp' implementation requires Protobuf<4. - if protobuf_implementation == "cpp": - session.install("protobuf<4") - - # Run py.test against the unit tests. - session.run( - "py.test", - "--quiet", - f"--junitxml=unit_{session.python}_sponge_log.xml", - "--cov=google", - "--cov=tests/unit", - "--cov-append", - "--cov-config=.coveragerc", - "--cov-report=", - "--cov-fail-under=0", - os.path.join("tests", "unit"), - *session.posargs, - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -def install_systemtest_dependencies(session, *constraints): - session.install("--pre", "grpcio") - - session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: - session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_LOCAL_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTRAS_BY_PYTHON: - extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif SYSTEM_TEST_EXTRAS: - extras = SYSTEM_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) -def system(session): - """Run the system test suite.""" - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - system_test_path = os.path.join("tests", "system.py") - system_test_folder_path = os.path.join("tests", "system") - - # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. - if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": - session.skip("RUN_SYSTEM_TESTS is set to false, skipping") - # Install pyopenssl for mTLS testing. - if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": - session.install("pyopenssl") - - system_test_exists = os.path.exists(system_test_path) - system_test_folder_exists = os.path.exists(system_test_folder_path) - # Sanity check: only run tests if found. - if not system_test_exists and not system_test_folder_exists: - session.skip("System tests were not found") - - install_systemtest_dependencies(session, "-c", constraints_path) - - # Run py.test against the system tests. - if system_test_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_path, - *session.posargs, - ) - if system_test_folder_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_folder_path, - *session.posargs, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def cover(session): - """Run the final coverage report. - - This outputs the coverage report aggregating coverage from the unit - test runs (not system test runs), and then erases coverage data. - """ - session.install("coverage", "pytest-cov") - session.run("coverage", "report", "--show-missing", "--fail-under=100") - - session.run("coverage", "erase") - - -@nox.session(python="3.10") -def docs(session): - """Build the docs for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "sphinx==4.5.0", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-W", # warnings as errors - "-T", # show full traceback on exception - "-N", # no colors - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python="3.10") -def docfx(session): - """Build the docfx yaml files for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "gcp-sphinx-docfx-yaml", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-T", # show full traceback on exception - "-N", # no colors - "-D", - ( - "extensions=sphinx.ext.autodoc," - "sphinx.ext.autosummary," - "docfx_yaml.extension," - "sphinx.ext.intersphinx," - "sphinx.ext.coverage," - "sphinx.ext.napoleon," - "sphinx.ext.todo," - "sphinx.ext.viewcode," - "recommonmark" - ), - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def prerelease_deps(session, protobuf_implementation): - """ - Run all tests with pre-release versions of dependencies installed - rather than the standard non pre-release versions. - Pre-release versions can be installed using - `pip install --pre `. - """ - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # Note: If a dependency is added to the `prerel_deps` list, - # the `core_dependencies_from_source` list in the `core_deps_from_source` - # nox session should also be updated. - prerel_deps = [ - "googleapis-common-protos", - "google-api-core", - "google-auth", - "grpc-google-iam-v1", - "grpcio", - "grpcio-status", - "protobuf", - "proto-plus", - ] - - for dep in prerel_deps: - session.install("--pre", "--no-deps", "--ignore-installed", dep) - # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` - # to the dictionary below once this bug is fixed. - # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add - # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below - # once this bug is fixed. - package_namespaces = { - "google-api-core": "google.api_core", - "google-auth": "google.auth", - "grpcio": "grpc", - "protobuf": "google.protobuf", - "proto-plus": "proto", - } - - version_namespace = package_namespaces.get(dep) - - print(f"Installed {dep}") - if version_namespace: - session.run( - "python", - "-c", - f"import {version_namespace}; print({version_namespace}.__version__)", - ) - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb"], -) -def core_deps_from_source(session, protobuf_implementation): - """Run all tests with core dependencies installed from source - rather than pulling the dependencies from PyPI. - """ - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and - # `grpcio-status` should be added to the list below so that they are installed from source, - # rather than PyPI. - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be - # added to the list below so that it is installed from source, rather than PyPI - # Note: If a dependency is added to the `core_dependencies_from_source` list, - # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. - core_dependencies_from_source = [ - "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", - "google-api-core @ git+https://github.com/googleapis/python-api-core.git", - "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", - "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", - "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", - ] - - for dep in core_dependencies_from_source: - session.install(dep, "--no-deps", "--ignore-installed") - print(f"Installed {dep}") - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py deleted file mode 100644 index 40366686e783..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/setup.py +++ /dev/null @@ -1,99 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import io -import os -import re - -import setuptools # type: ignore - -package_root = os.path.abspath(os.path.dirname(__file__)) - -name = 'google-cloud-bigquery-datapolicies' - - -description = "Google Cloud Bigquery Datapolicies API client library" - -version = None - -with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: - version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) - assert (len(version_candidates) == 1) - version = version_candidates[0] - -if version[0] == "0": - release_status = "Development Status :: 4 - Beta" -else: - release_status = "Development Status :: 5 - Production/Stable" - -dependencies = [ - "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", - # Exclude incompatible versions of `google-auth` - # See https://github.com/googleapis/google-cloud-python/issues/12364 - "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", - "proto-plus >= 1.22.3, <2.0.0", - "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", - "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", - "grpc-google-iam-v1 >= 0.14.0, <1.0.0", -] -extras = { -} -url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" - -package_root = os.path.abspath(os.path.dirname(__file__)) - -readme_filename = os.path.join(package_root, "README.rst") -with io.open(readme_filename, encoding="utf-8") as readme_file: - readme = readme_file.read() - -packages = [ - package - for package in setuptools.find_namespace_packages() - if package.startswith("google") -] - -setuptools.setup( - name=name, - version=version, - description=description, - long_description=readme, - author="Google LLC", - author_email="googleapis-packages@google.com", - license="Apache 2.0", - url=url, - classifiers=[ - release_status, - "Intended Audience :: Developers", - "License :: OSI Approved :: Apache Software License", - "Programming Language :: Python", - "Programming Language :: Python :: 3", - "Programming Language :: Python :: 3.7", - "Programming Language :: Python :: 3.8", - "Programming Language :: Python :: 3.9", - "Programming Language :: Python :: 3.10", - "Programming Language :: Python :: 3.11", - "Programming Language :: Python :: 3.12", - "Programming Language :: Python :: 3.13", - "Operating System :: OS Independent", - "Topic :: Internet", - ], - platforms="Posix; MacOS X; Windows", - packages=packages, - python_requires=">=3.7", - install_requires=dependencies, - extras_require=extras, - include_package_data=True, - zip_safe=False, -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.10.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.11.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.12.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt deleted file mode 100644 index 2010e549cceb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.13.txt +++ /dev/null @@ -1,12 +0,0 @@ -# We use the constraints file for the latest Python version -# (currently this file) to check that the latest -# major versions of dependencies are supported in setup.py. -# List all library dependencies and extras in this file. -# Require the latest major version be installed for each dependency. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo>=1 -google-api-core>=2 -google-auth>=2 -proto-plus>=1 -protobuf>=6 -grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt deleted file mode 100644 index 56affbd9bd75..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.7.txt +++ /dev/null @@ -1,11 +0,0 @@ -# This constraints file is used to check that lower bounds -# are correct in setup.py -# List all library dependencies and extras in this file. -# Pin the version to the lower bound. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo==1.14.0 -google-api-core==1.34.1 -google-auth==2.14.1 -proto-plus==1.22.3 -protobuf==3.20.2 -grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.8.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/testing/constraints-3.9.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc deleted file mode 100644 index 0c3effcc3668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.coveragerc +++ /dev/null @@ -1,13 +0,0 @@ -[run] -branch = True - -[report] -show_missing = True -omit = - google/cloud/bigquery_datapolicies/__init__.py - google/cloud/bigquery_datapolicies/gapic_version.py -exclude_lines = - # Re-enable the standard pragma - pragma: NO COVER - # Ignore debug-only repr - def __repr__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 deleted file mode 100644 index 90316de21489..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/.flake8 +++ /dev/null @@ -1,34 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -[flake8] -# TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): -# Resolve flake8 lint issues -ignore = E203, E231, E266, E501, W503 -exclude = - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2333): - # Ensure that generated code passes flake8 lint - **/gapic/** - **/services/** - **/types/** - # Exclude Protobuf gencode - *_pb2.py - - # Standard linting exemptions. - **/.nox/** - __pycache__, - .git, - *.pyc, - conf.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE deleted file mode 100644 index d64569567334..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/LICENSE +++ /dev/null @@ -1,202 +0,0 @@ - - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in deleted file mode 100644 index dae249ec8976..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/MANIFEST.in +++ /dev/null @@ -1,20 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -include README.rst LICENSE -recursive-include google *.py *.pyi *.json *.proto py.typed -recursive-include tests * -global-exclude *.py[co] -global-exclude __pycache__ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst deleted file mode 100644 index 074e1245b6d1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/README.rst +++ /dev/null @@ -1,143 +0,0 @@ -Python Client for Google Cloud Bigquery Datapolicies API -================================================= - -Quick Start ------------ - -In order to use this library, you first need to go through the following steps: - -1. `Select or create a Cloud Platform project.`_ -2. `Enable billing for your project.`_ -3. Enable the Google Cloud Bigquery Datapolicies API. -4. `Setup Authentication.`_ - -.. _Select or create a Cloud Platform project.: https://console.cloud.google.com/project -.. _Enable billing for your project.: https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project -.. _Setup Authentication.: https://googleapis.dev/python/google-api-core/latest/auth.html - -Installation -~~~~~~~~~~~~ - -Install this library in a `virtualenv`_ using pip. `virtualenv`_ is a tool to -create isolated Python environments. The basic problem it addresses is one of -dependencies and versions, and indirectly permissions. - -With `virtualenv`_, it's possible to install this library without needing system -install permissions, and without clashing with the installed system -dependencies. - -.. _`virtualenv`: https://virtualenv.pypa.io/en/latest/ - - -Mac/Linux -^^^^^^^^^ - -.. code-block:: console - - python3 -m venv - source /bin/activate - /bin/pip install /path/to/library - - -Windows -^^^^^^^ - -.. code-block:: console - - python3 -m venv - \Scripts\activate - \Scripts\pip.exe install \path\to\library - - -Logging -------- - -This library uses the standard Python :code:`logging` functionality to log some RPC events that could be of interest for debugging and monitoring purposes. -Note the following: - -#. Logs may contain sensitive information. Take care to **restrict access to the logs** if they are saved, whether it be on local storage or on Google Cloud Logging. -#. Google may refine the occurrence, level, and content of various log messages in this library without flagging such changes as breaking. **Do not depend on immutability of the logging events**. -#. By default, the logging events from this library are not handled. You must **explicitly configure log handling** using one of the mechanisms below. - - -Simple, environment-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -To enable logging for this library without any changes in your code, set the :code:`GOOGLE_SDK_PYTHON_LOGGING_SCOPE` environment variable to a valid Google -logging scope. This configures handling of logging events (at level :code:`logging.DEBUG` or higher) from this library in a default manner, emitting the logged -messages in a structured format. It does not currently allow customizing the logging levels captured nor the handlers, formatters, etc. used for any logging -event. - -A logging scope is a period-separated namespace that begins with :code:`google`, identifying the Python module or package to log. - -- Valid logging scopes: :code:`google`, :code:`google.cloud.asset.v1`, :code:`google.api`, :code:`google.auth`, etc. -- Invalid logging scopes: :code:`foo`, :code:`123`, etc. - -**NOTE**: If the logging scope is invalid, the library does not set up any logging handlers. - - -Examples -^^^^^^^^ - -- Enabling the default handler for all Google-based loggers - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google - -- Enabling the default handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: console - - export GOOGLE_SDK_PYTHON_LOGGING_SCOPE=google.cloud.library_v1 - - -Advanced, code-based configuration -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -You can also configure a valid logging scope using Python's standard `logging` mechanism. - - -Examples -^^^^^^^^ - -- Configuring a handler for all Google-based loggers - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - -- Configuring a handler for a specific Google module (for a client library called :code:`library_v1`): - -.. code-block:: python - - import logging - - from google.cloud.translate_v3 import translate - - base_logger = logging.getLogger("google.cloud.library_v1") - base_logger.addHandler(logging.StreamHandler()) - base_logger.setLevel(logging.DEBUG) - - -Logging details -~~~~~~~~~~~~~~~ - -#. Regardless of which of the mechanisms above you use to configure logging for this library, by default logging events are not propagated up to the root - logger from the `google`-level logger. If you need the events to be propagated to the root logger, you must explicitly set - :code:`logging.getLogger("google").propagate = True` in your code. -#. You can mix the different logging configurations above for different Google modules. For example, you may want use a code-based logging configuration for - one library, but decide you need to also set up environment-based logging configuration for another library. - - #. If you attempt to use both code-based and environment-based configuration for the same module, the environment-based configuration will be ineffectual - if the code -based configuration gets applied first. - -#. The Google-specific logging configurations (default handlers for environment-based configuration; not propagating logging events to the root logger) get - executed the first time *any* client library is instantiated in your application, and only if the affected loggers have not been previously configured. - (This is the reason for 2.i. above.) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css deleted file mode 100644 index b0a295464b23..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_static/custom.css +++ /dev/null @@ -1,20 +0,0 @@ -div#python2-eol { - border-color: red; - border-width: medium; -} - -/* Ensure minimum width for 'Parameters' / 'Returns' column */ -dl.field-list > dt { - min-width: 100px -} - -/* Insert space between methods for readability */ -dl.method { - padding-top: 10px; - padding-bottom: 10px -} - -/* Insert empty space between classes */ -dl.class { - padding-bottom: 50px -} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html deleted file mode 100644 index 95e9c77fcfe1..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/_templates/layout.html +++ /dev/null @@ -1,50 +0,0 @@ - -{% extends "!layout.html" %} -{%- block content %} -{%- if theme_fixed_sidebar|lower == 'true' %} -
- {{ sidebar() }} - {%- block document %} -
- {%- if render_sidebar %} -
- {%- endif %} - - {%- block relbar_top %} - {%- if theme_show_relbar_top|tobool %} - - {%- endif %} - {% endblock %} - -
-
- As of January 1, 2020 this library no longer supports Python 2 on the latest released version. - Library versions released prior to that date will continue to be available. For more information please - visit Python 2 support on Google Cloud. -
- {% block body %} {% endblock %} -
- - {%- block relbar_bottom %} - {%- if theme_show_relbar_bottom|tobool %} - - {%- endif %} - {% endblock %} - - {%- if render_sidebar %} -
- {%- endif %} -
- {%- endblock %} -
-
-{%- else %} -{{ super() }} -{%- endif %} -{%- endblock %} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py deleted file mode 100644 index babd226a574e..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/conf.py +++ /dev/null @@ -1,385 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# -# google-cloud-bigquery-datapolicies documentation build configuration file -# -# This file is execfile()d with the current directory set to its -# containing dir. -# -# Note that not all possible configuration values are present in this -# autogenerated file. -# -# All configuration values have a default; values that are commented out -# serve to show the default. - -import sys -import os -import shlex - -# If extensions (or modules to document with autodoc) are in another directory, -# add these directories to sys.path here. If the directory is relative to the -# documentation root, use os.path.abspath to make it absolute, like shown here. -sys.path.insert(0, os.path.abspath("..")) - -# For plugins that can not read conf.py. -# See also: https://github.com/docascode/sphinx-docfx-yaml/issues/85 -sys.path.insert(0, os.path.abspath(".")) - -__version__ = "" - -# -- General configuration ------------------------------------------------ - -# If your documentation needs a minimal Sphinx version, state it here. -needs_sphinx = "4.5.0" - -# Add any Sphinx extension module names here, as strings. They can be -# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom -# ones. -extensions = [ - "sphinx.ext.autodoc", - "sphinx.ext.autosummary", - "sphinx.ext.intersphinx", - "sphinx.ext.coverage", - "sphinx.ext.doctest", - "sphinx.ext.napoleon", - "sphinx.ext.todo", - "sphinx.ext.viewcode", - "recommonmark", -] - -# autodoc/autosummary flags -autoclass_content = "both" -autodoc_default_options = {"members": True} -autosummary_generate = True - - -# Add any paths that contain templates here, relative to this directory. -templates_path = ["_templates"] - -# The suffix(es) of source filenames. -# You can specify multiple suffix as a list of string: -# source_suffix = ['.rst', '.md'] -source_suffix = [".rst", ".md"] - -# The encoding of source files. -# source_encoding = 'utf-8-sig' - -# The root toctree document. -root_doc = "index" - -# General information about the project. -project = u"google-cloud-bigquery-datapolicies" -copyright = u"2025, Google, LLC" -author = u"Google APIs" - -# The version info for the project you're documenting, acts as replacement for -# |version| and |release|, also used in various other places throughout the -# built documents. -# -# The full version, including alpha/beta/rc tags. -release = __version__ -# The short X.Y version. -version = ".".join(release.split(".")[0:2]) - -# The language for content autogenerated by Sphinx. Refer to documentation -# for a list of supported languages. -# -# This is also used if you do content translation via gettext catalogs. -# Usually you set "language" from the command line for these cases. -language = None - -# There are two options for replacing |today|: either, you set today to some -# non-false value, then it is used: -# today = '' -# Else, today_fmt is used as the format for a strftime call. -# today_fmt = '%B %d, %Y' - -# List of patterns, relative to source directory, that match files and -# directories to ignore when looking for source files. -exclude_patterns = [ - "_build", - "**/.nox/**/*", - "samples/AUTHORING_GUIDE.md", - "samples/CONTRIBUTING.md", - "samples/snippets/README.rst", -] - -# The reST default role (used for this markup: `text`) to use for all -# documents. -# default_role = None - -# If true, '()' will be appended to :func: etc. cross-reference text. -# add_function_parentheses = True - -# If true, the current module name will be prepended to all description -# unit titles (such as .. function::). -# add_module_names = True - -# If true, sectionauthor and moduleauthor directives will be shown in the -# output. They are ignored by default. -# show_authors = False - -# The name of the Pygments (syntax highlighting) style to use. -pygments_style = "sphinx" - -# A list of ignored prefixes for module index sorting. -# modindex_common_prefix = [] - -# If true, keep warnings as "system message" paragraphs in the built documents. -# keep_warnings = False - -# If true, `todo` and `todoList` produce output, else they produce nothing. -todo_include_todos = True - - -# -- Options for HTML output ---------------------------------------------- - -# The theme to use for HTML and HTML Help pages. See the documentation for -# a list of builtin themes. -html_theme = "alabaster" - -# Theme options are theme-specific and customize the look and feel of a theme -# further. For a list of options available for each theme, see the -# documentation. -html_theme_options = { - "description": "Google Cloud Client Libraries for google-cloud-bigquery-datapolicies", - "github_user": "googleapis", - "github_repo": "google-cloud-python", - "github_banner": True, - "font_family": "'Roboto', Georgia, sans", - "head_font_family": "'Roboto', Georgia, serif", - "code_font_family": "'Roboto Mono', 'Consolas', monospace", -} - -# Add any paths that contain custom themes here, relative to this directory. -# html_theme_path = [] - -# The name for this set of Sphinx documents. If None, it defaults to -# " v documentation". -# html_title = None - -# A shorter title for the navigation bar. Default is the same as html_title. -# html_short_title = None - -# The name of an image file (relative to this directory) to place at the top -# of the sidebar. -# html_logo = None - -# The name of an image file (within the static path) to use as favicon of the -# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 -# pixels large. -# html_favicon = None - -# Add any paths that contain custom static files (such as style sheets) here, -# relative to this directory. They are copied after the builtin static files, -# so a file named "default.css" will overwrite the builtin "default.css". -html_static_path = ["_static"] - -# Add any extra paths that contain custom files (such as robots.txt or -# .htaccess) here, relative to this directory. These files are copied -# directly to the root of the documentation. -# html_extra_path = [] - -# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, -# using the given strftime format. -# html_last_updated_fmt = '%b %d, %Y' - -# If true, SmartyPants will be used to convert quotes and dashes to -# typographically correct entities. -# html_use_smartypants = True - -# Custom sidebar templates, maps document names to template names. -# html_sidebars = {} - -# Additional templates that should be rendered to pages, maps page names to -# template names. -# html_additional_pages = {} - -# If false, no module index is generated. -# html_domain_indices = True - -# If false, no index is generated. -# html_use_index = True - -# If true, the index is split into individual pages for each letter. -# html_split_index = False - -# If true, links to the reST sources are added to the pages. -# html_show_sourcelink = True - -# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. -# html_show_sphinx = True - -# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. -# html_show_copyright = True - -# If true, an OpenSearch description file will be output, and all pages will -# contain a tag referring to it. The value of this option must be the -# base URL from which the finished HTML is served. -# html_use_opensearch = '' - -# This is the file name suffix for HTML files (e.g. ".xhtml"). -# html_file_suffix = None - -# Language to be used for generating the HTML full-text search index. -# Sphinx supports the following languages: -# 'da', 'de', 'en', 'es', 'fi', 'fr', 'hu', 'it', 'ja' -# 'nl', 'no', 'pt', 'ro', 'ru', 'sv', 'tr' -# html_search_language = 'en' - -# A dictionary with options for the search language support, empty by default. -# Now only 'ja' uses this config value -# html_search_options = {'type': 'default'} - -# The name of a javascript file (relative to the configuration directory) that -# implements a search results scorer. If empty, the default will be used. -# html_search_scorer = 'scorer.js' - -# Output file base name for HTML help builder. -htmlhelp_basename = "google-cloud-bigquery-datapolicies-doc" - -# -- Options for warnings ------------------------------------------------------ - - -suppress_warnings = [ - # Temporarily suppress this to avoid "more than one target found for - # cross-reference" warning, which are intractable for us to avoid while in - # a mono-repo. - # See https://github.com/sphinx-doc/sphinx/blob - # /2a65ffeef5c107c19084fabdd706cdff3f52d93c/sphinx/domains/python.py#L843 - "ref.python" -] - -# -- Options for LaTeX output --------------------------------------------- - -latex_elements = { - # The paper size ('letterpaper' or 'a4paper'). - # 'papersize': 'letterpaper', - # The font size ('10pt', '11pt' or '12pt'). - # 'pointsize': '10pt', - # Additional stuff for the LaTeX preamble. - # 'preamble': '', - # Latex figure (float) alignment - # 'figure_align': 'htbp', -} - -# Grouping the document tree into LaTeX files. List of tuples -# (source start file, target name, title, -# author, documentclass [howto, manual, or own class]). -latex_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies.tex", - u"google-cloud-bigquery-datapolicies Documentation", - author, - "manual", - ) -] - -# The name of an image file (relative to this directory) to place at the top of -# the title page. -# latex_logo = None - -# For "manual" documents, if this is true, then toplevel headings are parts, -# not chapters. -# latex_use_parts = False - -# If true, show page references after internal links. -# latex_show_pagerefs = False - -# If true, show URL addresses after external links. -# latex_show_urls = False - -# Documents to append as an appendix to all manuals. -# latex_appendices = [] - -# If false, no module index is generated. -# latex_domain_indices = True - - -# -- Options for manual page output --------------------------------------- - -# One entry per manual page. List of tuples -# (source start file, name, description, authors, manual section). -man_pages = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - [author], - 1, - ) -] - -# If true, show URL addresses after external links. -# man_show_urls = False - - -# -- Options for Texinfo output ------------------------------------------- - -# Grouping the document tree into Texinfo files. List of tuples -# (source start file, target name, title, author, -# dir menu entry, description, category) -texinfo_documents = [ - ( - root_doc, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Documentation", - author, - "google-cloud-bigquery-datapolicies", - "google-cloud-bigquery-datapolicies Library", - "APIs", - ) -] - -# Documents to append as an appendix to all manuals. -# texinfo_appendices = [] - -# If false, no module index is generated. -# texinfo_domain_indices = True - -# How to display URL addresses: 'footnote', 'no', or 'inline'. -# texinfo_show_urls = 'footnote' - -# If true, do not generate a @detailmenu in the "Top" node's menu. -# texinfo_no_detailmenu = False - - -# Example configuration for intersphinx: refer to the Python standard library. -intersphinx_mapping = { - "python": ("https://python.readthedocs.org/en/latest/", None), - "google-auth": ("https://googleapis.dev/python/google-auth/latest/", None), - "google.api_core": ( - "https://googleapis.dev/python/google-api-core/latest/", - None, - ), - "grpc": ("https://grpc.github.io/grpc/python/", None), - "proto-plus": ("https://proto-plus-python.readthedocs.io/en/latest/", None), - "protobuf": ("https://googleapis.dev/python/protobuf/latest/", None), -} - - -# Napoleon settings -napoleon_google_docstring = True -napoleon_numpy_docstring = True -napoleon_include_private_with_doc = False -napoleon_include_special_with_doc = True -napoleon_use_admonition_for_examples = False -napoleon_use_admonition_for_notes = False -napoleon_use_admonition_for_references = False -napoleon_use_ivar = False -napoleon_use_param = True -napoleon_use_rtype = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst deleted file mode 100644 index 43d478357e99..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/index.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. include:: multiprocessing.rst - - -API Reference -------------- -.. toctree:: - :maxdepth: 2 - - bigquery_datapolicies_v2beta1/services_ - bigquery_datapolicies_v2beta1/types_ diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst deleted file mode 100644 index 536d17b2ea65..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/multiprocessing.rst +++ /dev/null @@ -1,7 +0,0 @@ -.. note:: - - Because this client uses :mod:`grpc` library, it is safe to - share instances across threads. In multiprocessing scenarios, the best - practice is to create client instances *after* the invocation of - :func:`os.fork` by :class:`multiprocessing.pool.Pool` or - :class:`multiprocessing.Process`. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py deleted file mode 100644 index 566b0336c528..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/__init__.py +++ /dev/null @@ -1,47 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies import gapic_version as package_version - -__version__ = package_version.__version__ - - -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.client import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.async_client import DataPolicyServiceAsyncClient - -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import AddGranteesRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import CreateDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DataMaskingPolicy -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DataPolicy -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import DeleteDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import GetDataPolicyRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import ListDataPoliciesRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import ListDataPoliciesResponse -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import RemoveGranteesRequest -from google.cloud.bigquery_datapolicies_v2beta1.types.datapolicy import UpdateDataPolicyRequest - -__all__ = ('DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', - 'AddGranteesRequest', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RemoveGranteesRequest', - 'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py deleted file mode 100644 index 7f1e264b4154..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/__init__.py +++ /dev/null @@ -1,48 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version - -__version__ = package_version.__version__ - - -from .services.data_policy_service import DataPolicyServiceClient -from .services.data_policy_service import DataPolicyServiceAsyncClient - -from .types.datapolicy import AddGranteesRequest -from .types.datapolicy import CreateDataPolicyRequest -from .types.datapolicy import DataMaskingPolicy -from .types.datapolicy import DataPolicy -from .types.datapolicy import DeleteDataPolicyRequest -from .types.datapolicy import GetDataPolicyRequest -from .types.datapolicy import ListDataPoliciesRequest -from .types.datapolicy import ListDataPoliciesResponse -from .types.datapolicy import RemoveGranteesRequest -from .types.datapolicy import UpdateDataPolicyRequest - -__all__ = ( - 'DataPolicyServiceAsyncClient', -'AddGranteesRequest', -'CreateDataPolicyRequest', -'DataMaskingPolicy', -'DataPolicy', -'DataPolicyServiceClient', -'DeleteDataPolicyRequest', -'GetDataPolicyRequest', -'ListDataPoliciesRequest', -'ListDataPoliciesResponse', -'RemoveGranteesRequest', -'UpdateDataPolicyRequest', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py deleted file mode 100644 index 20a9cd975b02..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py +++ /dev/null @@ -1,16 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed deleted file mode 100644 index ff02bfbdb46b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Marker file for PEP 561. -# The google-cloud-bigquery-datapolicies package uses inline types. diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py deleted file mode 100644 index deca793e77bb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py +++ /dev/null @@ -1,22 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from .client import DataPolicyServiceClient -from .async_client import DataPolicyServiceAsyncClient - -__all__ = ( - 'DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst deleted file mode 100644 index b83d156af245..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst +++ /dev/null @@ -1,9 +0,0 @@ - -transport inheritance structure -_______________________________ - -`DataPolicyServiceTransport` is the ABC for all transports. -- public child `DataPolicyServiceGrpcTransport` for sync gRPC transport (defined in `grpc.py`). -- public child `DataPolicyServiceGrpcAsyncIOTransport` for async gRPC transport (defined in `grpc_asyncio.py`). -- private child `_BaseDataPolicyServiceRestTransport` for base REST transport with inner classes `_BaseMETHOD` (defined in `rest_base.py`). -- public child `DataPolicyServiceRestTransport` for sync REST transport with inner classes `METHOD` derived from the parent's corresponding `_BaseMETHOD` classes (defined in `rest.py`). diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py deleted file mode 100644 index 2c95ef809668..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py +++ /dev/null @@ -1,38 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -from collections import OrderedDict -from typing import Dict, Type - -from .base import DataPolicyServiceTransport -from .grpc import DataPolicyServiceGrpcTransport -from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .rest import DataPolicyServiceRestTransport -from .rest import DataPolicyServiceRestInterceptor - - -# Compile a registry of transports. -_transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] -_transport_registry['grpc'] = DataPolicyServiceGrpcTransport -_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport -_transport_registry['rest'] = DataPolicyServiceRestTransport - -__all__ = ( - 'DataPolicyServiceTransport', - 'DataPolicyServiceGrpcTransport', - 'DataPolicyServiceGrpcAsyncIOTransport', - 'DataPolicyServiceRestTransport', - 'DataPolicyServiceRestInterceptor', -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini deleted file mode 100644 index 574c5aed394b..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/mypy.ini +++ /dev/null @@ -1,3 +0,0 @@ -[mypy] -python_version = 3.7 -namespace_packages = True diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py deleted file mode 100644 index 25d78ab7c0ff..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/noxfile.py +++ /dev/null @@ -1,591 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import os -import pathlib -import re -import shutil - -from typing import Dict, List -import warnings - -import nox - -BLACK_VERSION = "black[jupyter]==23.7.0" -ISORT_VERSION = "isort==5.11.0" - -LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] - -ALL_PYTHON = [ - "3.7", - "3.8", - "3.9", - "3.10", - "3.11", - "3.12", - "3.13", -] - -DEFAULT_PYTHON_VERSION = ALL_PYTHON[-1] - -CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() - -LOWER_BOUND_CONSTRAINTS_FILE = CURRENT_DIRECTORY / "constraints.txt" -PACKAGE_NAME = "google-cloud-bigquery-datapolicies" - -UNIT_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "asyncmock", - "pytest", - "pytest-cov", - "pytest-asyncio", -] -UNIT_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_LOCAL_DEPENDENCIES: List[str] = [] -UNIT_TEST_DEPENDENCIES: List[str] = [] -UNIT_TEST_EXTRAS: List[str] = [] -UNIT_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -SYSTEM_TEST_PYTHON_VERSIONS: List[str] = ["3.8", "3.9", "3.10", "3.11", "3.12", "3.13"] -SYSTEM_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "pytest", - "google-cloud-testutils", -] -SYSTEM_TEST_EXTERNAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_LOCAL_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_DEPENDENCIES: List[str] = [] -SYSTEM_TEST_EXTRAS: List[str] = [] -SYSTEM_TEST_EXTRAS_BY_PYTHON: Dict[str, List[str]] = {} - -nox.options.sessions = [ - "unit", - "system", - "cover", - "lint", - "lint_setup_py", - "blacken", - "docs", -] - -# Error if a python version is missing -nox.options.error_on_missing_interpreters = True - - -@nox.session(python=ALL_PYTHON) -def mypy(session): - """Run the type checker.""" - session.install( - "mypy", - "types-requests", - "types-protobuf", - ) - session.install(".") - session.run( - "mypy", - "-p", - "google", - ) - - -@nox.session -def update_lower_bounds(session): - """Update lower bounds in constraints.txt to match setup.py""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "update", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session -def check_lower_bounds(session): - """Check lower bounds in setup.py are reflected in constraints file""" - session.install("google-cloud-testutils") - session.install(".") - - session.run( - "lower-bound-checker", - "check", - "--package-name", - PACKAGE_NAME, - "--constraints-file", - str(LOWER_BOUND_CONSTRAINTS_FILE), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint(session): - """Run linters. - - Returns a failure if the linters find linting errors or sufficiently - serious code quality issues. - """ - session.install("flake8", BLACK_VERSION) - session.run( - "black", - "--check", - *LINT_PATHS, - ) - - session.run("flake8", "google", "tests") - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def blacken(session): - """Run black. Format code to uniform standard.""" - session.install(BLACK_VERSION) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def format(session): - """ - Run isort to sort imports. Then run black - to format code to uniform standard. - """ - session.install(BLACK_VERSION, ISORT_VERSION) - # Use the --fss option to sort imports using strict alphabetical order. - # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections - session.run( - "isort", - "--fss", - *LINT_PATHS, - ) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint_setup_py(session): - """Verify that setup.py is valid (including RST check).""" - session.install("setuptools", "docutils", "pygments") - session.run("python", "setup.py", "check", "--restructuredtext", "--strict") - - -def install_unittest_dependencies(session, *constraints): - standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES - session.install(*standard_deps, *constraints) - - if UNIT_TEST_EXTERNAL_DEPENDENCIES: - warnings.warn( - "'unit_test_external_dependencies' is deprecated. Instead, please " - "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", - DeprecationWarning, - ) - session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_LOCAL_DEPENDENCIES: - session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) - - if UNIT_TEST_EXTRAS_BY_PYTHON: - extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif UNIT_TEST_EXTRAS: - extras = UNIT_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=ALL_PYTHON) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def unit(session, protobuf_implementation): - # Install all test dependencies, then install this package in-place. - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - install_unittest_dependencies(session, "-c", constraints_path) - - # TODO(https://github.com/googleapis/synthtool/issues/1976): - # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. - # The 'cpp' implementation requires Protobuf<4. - if protobuf_implementation == "cpp": - session.install("protobuf<4") - - # Run py.test against the unit tests. - session.run( - "py.test", - "--quiet", - f"--junitxml=unit_{session.python}_sponge_log.xml", - "--cov=google", - "--cov=tests/unit", - "--cov-append", - "--cov-config=.coveragerc", - "--cov-report=", - "--cov-fail-under=0", - os.path.join("tests", "unit"), - *session.posargs, - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -def install_systemtest_dependencies(session, *constraints): - session.install("--pre", "grpcio") - - session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: - session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_LOCAL_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTRAS_BY_PYTHON: - extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif SYSTEM_TEST_EXTRAS: - extras = SYSTEM_TEST_EXTRAS - else: - extras = [] - - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) - - -@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) -def system(session): - """Run the system test suite.""" - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - system_test_path = os.path.join("tests", "system.py") - system_test_folder_path = os.path.join("tests", "system") - - # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. - if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": - session.skip("RUN_SYSTEM_TESTS is set to false, skipping") - # Install pyopenssl for mTLS testing. - if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": - session.install("pyopenssl") - - system_test_exists = os.path.exists(system_test_path) - system_test_folder_exists = os.path.exists(system_test_folder_path) - # Sanity check: only run tests if found. - if not system_test_exists and not system_test_folder_exists: - session.skip("System tests were not found") - - install_systemtest_dependencies(session, "-c", constraints_path) - - # Run py.test against the system tests. - if system_test_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_path, - *session.posargs, - ) - if system_test_folder_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_folder_path, - *session.posargs, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def cover(session): - """Run the final coverage report. - - This outputs the coverage report aggregating coverage from the unit - test runs (not system test runs), and then erases coverage data. - """ - session.install("coverage", "pytest-cov") - session.run("coverage", "report", "--show-missing", "--fail-under=100") - - session.run("coverage", "erase") - - -@nox.session(python="3.10") -def docs(session): - """Build the docs for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "sphinx==4.5.0", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-W", # warnings as errors - "-T", # show full traceback on exception - "-N", # no colors - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python="3.10") -def docfx(session): - """Build the docfx yaml files for this library.""" - - session.install("-e", ".") - session.install( - # We need to pin to specific versions of the `sphinxcontrib-*` packages - # which still support sphinx 4.x. - # See https://github.com/googleapis/sphinx-docfx-yaml/issues/344 - # and https://github.com/googleapis/sphinx-docfx-yaml/issues/345. - "sphinxcontrib-applehelp==1.0.4", - "sphinxcontrib-devhelp==1.0.2", - "sphinxcontrib-htmlhelp==2.0.1", - "sphinxcontrib-qthelp==1.0.3", - "sphinxcontrib-serializinghtml==1.1.5", - "gcp-sphinx-docfx-yaml", - "alabaster", - "recommonmark", - ) - - shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) - session.run( - "sphinx-build", - "-T", # show full traceback on exception - "-N", # no colors - "-D", - ( - "extensions=sphinx.ext.autodoc," - "sphinx.ext.autosummary," - "docfx_yaml.extension," - "sphinx.ext.intersphinx," - "sphinx.ext.coverage," - "sphinx.ext.napoleon," - "sphinx.ext.todo," - "sphinx.ext.viewcode," - "recommonmark" - ), - "-b", - "html", - "-d", - os.path.join("docs", "_build", "doctrees", ""), - os.path.join("docs", ""), - os.path.join("docs", "_build", "html", ""), - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb", "cpp"], -) -def prerelease_deps(session, protobuf_implementation): - """ - Run all tests with pre-release versions of dependencies installed - rather than the standard non pre-release versions. - Pre-release versions can be installed using - `pip install --pre `. - """ - - if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12", "3.13"): - session.skip("cpp implementation is not supported in python 3.11+") - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # Note: If a dependency is added to the `prerel_deps` list, - # the `core_dependencies_from_source` list in the `core_deps_from_source` - # nox session should also be updated. - prerel_deps = [ - "googleapis-common-protos", - "google-api-core", - "google-auth", - "grpc-google-iam-v1", - "grpcio", - "grpcio-status", - "protobuf", - "proto-plus", - ] - - for dep in prerel_deps: - session.install("--pre", "--no-deps", "--ignore-installed", dep) - # TODO(https://github.com/grpc/grpc/issues/38965): Add `grpcio-status`` - # to the dictionary below once this bug is fixed. - # TODO(https://github.com/googleapis/google-cloud-python/issues/13643): Add - # `googleapis-common-protos` and `grpc-google-iam-v1` to the dictionary below - # once this bug is fixed. - package_namespaces = { - "google-api-core": "google.api_core", - "google-auth": "google.auth", - "grpcio": "grpc", - "protobuf": "google.protobuf", - "proto-plus": "proto", - } - - version_namespace = package_namespaces.get(dep) - - print(f"Installed {dep}") - if version_namespace: - session.run( - "python", - "-c", - f"import {version_namespace}; print({version_namespace}.__version__)", - ) - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -@nox.parametrize( - "protobuf_implementation", - ["python", "upb"], -) -def core_deps_from_source(session, protobuf_implementation): - """Run all tests with core dependencies installed from source - rather than pulling the dependencies from PyPI. - """ - - # Install all dependencies - session.install("-e", ".") - - # Install dependencies for the unit test environment - unit_deps_all = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_EXTERNAL_DEPENDENCIES - session.install(*unit_deps_all) - - # Install dependencies for the system test environment - system_deps_all = ( - SYSTEM_TEST_STANDARD_DEPENDENCIES - + SYSTEM_TEST_EXTERNAL_DEPENDENCIES - + SYSTEM_TEST_EXTRAS - ) - session.install(*system_deps_all) - - # Because we test minimum dependency versions on the minimum Python - # version, the first version we test with in the unit tests sessions has a - # constraints file containing all dependencies and extras. - with open( - CURRENT_DIRECTORY / "testing" / f"constraints-{ALL_PYTHON[0]}.txt", - encoding="utf-8", - ) as constraints_file: - constraints_text = constraints_file.read() - - # Ignore leading whitespace and comment lines. - constraints_deps = [ - match.group(1) - for match in re.finditer( - r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE - ) - ] - - # Install dependencies specified in `testing/constraints-X.txt`. - session.install(*constraints_deps) - - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2358): `grpcio` and - # `grpcio-status` should be added to the list below so that they are installed from source, - # rather than PyPI. - # TODO(https://github.com/googleapis/gapic-generator-python/issues/2357): `protobuf` should be - # added to the list below so that it is installed from source, rather than PyPI - # Note: If a dependency is added to the `core_dependencies_from_source` list, - # the `prerel_deps` list in the `prerelease_deps` nox session should also be updated. - core_dependencies_from_source = [ - "googleapis-common-protos @ git+https://github.com/googleapis/google-cloud-python#egg=googleapis-common-protos&subdirectory=packages/googleapis-common-protos", - "google-api-core @ git+https://github.com/googleapis/python-api-core.git", - "google-auth @ git+https://github.com/googleapis/google-auth-library-python.git", - "grpc-google-iam-v1 @ git+https://github.com/googleapis/google-cloud-python#egg=grpc-google-iam-v1&subdirectory=packages/grpc-google-iam-v1", - "proto-plus @ git+https://github.com/googleapis/proto-plus-python.git", - ] - - for dep in core_dependencies_from_source: - session.install(dep, "--no-deps", "--ignore-installed") - print(f"Installed {dep}") - - session.run( - "py.test", - "tests/unit", - env={ - "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, - }, - ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py deleted file mode 100644 index 40366686e783..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/setup.py +++ /dev/null @@ -1,99 +0,0 @@ -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -import io -import os -import re - -import setuptools # type: ignore - -package_root = os.path.abspath(os.path.dirname(__file__)) - -name = 'google-cloud-bigquery-datapolicies' - - -description = "Google Cloud Bigquery Datapolicies API client library" - -version = None - -with open(os.path.join(package_root, 'google/cloud/bigquery_datapolicies/gapic_version.py')) as fp: - version_candidates = re.findall(r"(?<=\")\d+.\d+.\d+(?=\")", fp.read()) - assert (len(version_candidates) == 1) - version = version_candidates[0] - -if version[0] == "0": - release_status = "Development Status :: 4 - Beta" -else: - release_status = "Development Status :: 5 - Production/Stable" - -dependencies = [ - "google-api-core[grpc] >= 1.34.1, <3.0.0,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", - # Exclude incompatible versions of `google-auth` - # See https://github.com/googleapis/google-cloud-python/issues/12364 - "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0", - "proto-plus >= 1.22.3, <2.0.0", - "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'", - "protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", - "grpc-google-iam-v1 >= 0.14.0, <1.0.0", -] -extras = { -} -url = "https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-bigquery-datapolicies" - -package_root = os.path.abspath(os.path.dirname(__file__)) - -readme_filename = os.path.join(package_root, "README.rst") -with io.open(readme_filename, encoding="utf-8") as readme_file: - readme = readme_file.read() - -packages = [ - package - for package in setuptools.find_namespace_packages() - if package.startswith("google") -] - -setuptools.setup( - name=name, - version=version, - description=description, - long_description=readme, - author="Google LLC", - author_email="googleapis-packages@google.com", - license="Apache 2.0", - url=url, - classifiers=[ - release_status, - "Intended Audience :: Developers", - "License :: OSI Approved :: Apache Software License", - "Programming Language :: Python", - "Programming Language :: Python :: 3", - "Programming Language :: Python :: 3.7", - "Programming Language :: Python :: 3.8", - "Programming Language :: Python :: 3.9", - "Programming Language :: Python :: 3.10", - "Programming Language :: Python :: 3.11", - "Programming Language :: Python :: 3.12", - "Programming Language :: Python :: 3.13", - "Operating System :: OS Independent", - "Topic :: Internet", - ], - platforms="Posix; MacOS X; Windows", - packages=packages, - python_requires=">=3.7", - install_requires=dependencies, - extras_require=extras, - include_package_data=True, - zip_safe=False, -) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.10.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.11.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.12.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt deleted file mode 100644 index 2010e549cceb..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.13.txt +++ /dev/null @@ -1,12 +0,0 @@ -# We use the constraints file for the latest Python version -# (currently this file) to check that the latest -# major versions of dependencies are supported in setup.py. -# List all library dependencies and extras in this file. -# Require the latest major version be installed for each dependency. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo>=1 -google-api-core>=2 -google-auth>=2 -proto-plus>=1 -protobuf>=6 -grpc-google-iam-v1>=0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt deleted file mode 100644 index 56affbd9bd75..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.7.txt +++ /dev/null @@ -1,11 +0,0 @@ -# This constraints file is used to check that lower bounds -# are correct in setup.py -# List all library dependencies and extras in this file. -# Pin the version to the lower bound. -# e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0", -# Then this file should have google-cloud-foo==1.14.0 -google-api-core==1.34.1 -google-auth==2.14.1 -proto-plus==1.22.3 -protobuf==3.20.2 -grpc-google-iam-v1==0.14.0 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.8.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt deleted file mode 100644 index ad3f0fa58e2d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/testing/constraints-3.9.txt +++ /dev/null @@ -1,7 +0,0 @@ -# -*- coding: utf-8 -*- -# This constraints file is required for unit tests. -# List all library dependencies and extras in this file. -google-api-core -proto-plus -protobuf -grpc-google-iam-v1 diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py b/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py deleted file mode 100644 index 191773d5572d..000000000000 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ - -# -*- coding: utf-8 -*- -# Copyright 2025 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/data_policy_service.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/data_policy_service.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/data_policy_service.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/services_.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/services_.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/services_.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/types_.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/docs/bigquery_datapolicies_v2/types_.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2/types_.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/data_policy_service.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/services_.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/services_.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/services_.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst b/packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/types_.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/docs/bigquery_datapolicies_v2beta1/types_.rst rename to packages/google-cloud-bigquery-datapolicies/docs/bigquery_datapolicies_v2beta1/types_.rst diff --git a/packages/google-cloud-bigquery-datapolicies/docs/index.rst b/packages/google-cloud-bigquery-datapolicies/docs/index.rst index 3426a2c22545..752ac56e4ac4 100644 --- a/packages/google-cloud-bigquery-datapolicies/docs/index.rst +++ b/packages/google-cloud-bigquery-datapolicies/docs/index.rst @@ -22,6 +22,22 @@ API Reference bigquery_datapolicies_v1beta1/services_ bigquery_datapolicies_v1beta1/types_ +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v2/services_ + bigquery_datapolicies_v2/types_ + +API Reference +------------- +.. toctree:: + :maxdepth: 2 + + bigquery_datapolicies_v2beta1/services_ + bigquery_datapolicies_v2beta1/types_ + Changelog --------- diff --git a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies/gapic_version.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies/gapic_version.py index 139e2857ccd9..20a9cd975b02 100644 --- a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies/gapic_version.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies/gapic_version.py @@ -13,4 +13,4 @@ # See the License for the specific language governing permissions and # limitations under the License. # -__version__ = "0.6.15" # {x-release-please-version} +__version__ = "0.0.0" # {x-release-please-version} diff --git a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1/gapic_version.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1/gapic_version.py index 139e2857ccd9..20a9cd975b02 100644 --- a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1/gapic_version.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1/gapic_version.py @@ -13,4 +13,4 @@ # See the License for the specific language governing permissions and # limitations under the License. # -__version__ = "0.6.15" # {x-release-please-version} +__version__ = "0.0.0" # {x-release-please-version} diff --git a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py index 139e2857ccd9..20a9cd975b02 100644 --- a/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v1beta1/gapic_version.py @@ -13,4 +13,4 @@ # See the License for the specific language governing permissions and # limitations under the License. # -__version__ = "0.6.15" # {x-release-please-version} +__version__ = "0.0.0" # {x-release-please-version} diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/__init__.py similarity index 55% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/__init__.py index 995ed7f38c5f..c3e80e810065 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/types/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/__init__.py @@ -13,7 +13,17 @@ # See the License for the specific language governing permissions and # limitations under the License. # -from .datapolicy import ( +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import ( + DataPolicyServiceAsyncClient, + DataPolicyServiceClient, +) +from .types.datapolicy import ( + AddGranteesRequest, CreateDataPolicyRequest, DataMaskingPolicy, DataPolicy, @@ -21,18 +31,21 @@ GetDataPolicyRequest, ListDataPoliciesRequest, ListDataPoliciesResponse, - RenameDataPolicyRequest, + RemoveGranteesRequest, UpdateDataPolicyRequest, ) __all__ = ( - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RenameDataPolicyRequest', - 'UpdateDataPolicyRequest', + "DataPolicyServiceAsyncClient", + "AddGranteesRequest", + "CreateDataPolicyRequest", + "DataMaskingPolicy", + "DataPolicy", + "DataPolicyServiceClient", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "RemoveGranteesRequest", + "UpdateDataPolicyRequest", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/gapic_metadata.json diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/gapic_version.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/gapic_version.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/gapic_version.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/py.typed similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies/py.typed rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/py.typed diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/__init__.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/__init__.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py similarity index 91% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py index deca793e77bb..f5b6b6e6da50 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py @@ -13,10 +13,10 @@ # See the License for the specific language governing permissions and # limitations under the License. # -from .client import DataPolicyServiceClient from .async_client import DataPolicyServiceAsyncClient +from .client import DataPolicyServiceClient __all__ = ( - 'DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', + "DataPolicyServiceClient", + "DataPolicyServiceAsyncClient", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py similarity index 83% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py index b742313a8cd7..17c9ad9d0512 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/async_client.py @@ -13,44 +13,58 @@ # See the License for the specific language governing permissions and # limitations under the License. # -import logging as std_logging from collections import OrderedDict +import logging as std_logging import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union - -from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version +from typing import ( + Callable, + Dict, + Mapping, + MutableMapping, + MutableSequence, + Optional, + Sequence, + Tuple, + Type, + Union, +) -from google.api_core.client_options import ClientOptions from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore +from google.api_core.client_options import ClientOptions +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore import google.protobuf +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version try: OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] except AttributeError: # pragma: NO COVER OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport + +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2.types import datapolicy + from .client import DataPolicyServiceClient +from .transports.base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False _LOGGER = std_logging.getLogger(__name__) + class DataPolicyServiceAsyncClient: """Data Policy Service provides APIs for managing the BigQuery Data Policy. @@ -66,21 +80,37 @@ class DataPolicyServiceAsyncClient: _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) - parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + parse_data_policy_path = staticmethod( + DataPolicyServiceClient.parse_data_policy_path + ) policy_tag_path = staticmethod(DataPolicyServiceClient.policy_tag_path) parse_policy_tag_path = staticmethod(DataPolicyServiceClient.parse_policy_tag_path) routine_path = staticmethod(DataPolicyServiceClient.routine_path) parse_routine_path = staticmethod(DataPolicyServiceClient.parse_routine_path) - common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) - parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_billing_account_path = staticmethod( + DataPolicyServiceClient.common_billing_account_path + ) + parse_common_billing_account_path = staticmethod( + DataPolicyServiceClient.parse_common_billing_account_path + ) common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) - parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) - common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) - parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + parse_common_folder_path = staticmethod( + DataPolicyServiceClient.parse_common_folder_path + ) + common_organization_path = staticmethod( + DataPolicyServiceClient.common_organization_path + ) + parse_common_organization_path = staticmethod( + DataPolicyServiceClient.parse_common_organization_path + ) common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) - parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + parse_common_project_path = staticmethod( + DataPolicyServiceClient.parse_common_project_path + ) common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) - parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + parse_common_location_path = staticmethod( + DataPolicyServiceClient.parse_common_location_path + ) @classmethod def from_service_account_info(cls, info: dict, *args, **kwargs): @@ -116,7 +146,9 @@ def from_service_account_file(cls, filename: str, *args, **kwargs): from_service_account_json = from_service_account_file @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[ClientOptions] = None + ): """Return the API endpoint and client cert source for mutual TLS. The client cert source is determined in the following order: @@ -179,12 +211,20 @@ def universe_domain(self) -> str: get_transport_class = DataPolicyServiceClient.get_transport_class - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", - client_options: Optional[ClientOptions] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: + def __init__( + self, + *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[ + Union[ + str, + DataPolicyServiceTransport, + Callable[..., DataPolicyServiceTransport], + ] + ] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: """Instantiates the data policy service async client. Args: @@ -239,33 +279,41 @@ def __init__(self, *, transport=transport, client_options=client_options, client_info=client_info, - ) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ): # pragma: NO COVER _LOGGER.debug( "Created client `google.cloud.bigquery.datapolicies_v2.DataPolicyServiceAsyncClient`.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", - "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "universeDomain": getattr( + self._client._transport._credentials, "universe_domain", "" + ), "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._client._transport, "_credentials") else { + "credentialsInfo": getattr( + self.transport._credentials, "get_cred_info", lambda: None + )(), + } + if hasattr(self._client._transport, "_credentials") + else { "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "credentialsType": None, - } + }, ) - async def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def create_data_policy( + self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Creates a new data policy under a project with the given ``data_policy_id`` (used as the display name), and data policy type. @@ -346,10 +394,14 @@ async def sample_create_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent, data_policy, data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -367,14 +419,14 @@ async def sample_create_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.create_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -391,15 +443,16 @@ async def sample_create_data_policy(): # Done; return the response. return response - async def add_grantees(self, - request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def add_grantees( + self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Adds new grantees to a data policy. The new grantees will be added to the existing grantees. If the request contains a duplicate grantee, the grantee @@ -478,10 +531,14 @@ async def sample_add_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -497,14 +554,16 @@ async def sample_add_grantees(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.add_grantees] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.add_grantees + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -521,15 +580,16 @@ async def sample_add_grantees(): # Done; return the response. return response - async def remove_grantees(self, - request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def remove_grantees( + self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Removes grantees from a data policy. The grantees will be removed from the existing grantees. If the request contains a grantee that does not exist, @@ -607,10 +667,14 @@ async def sample_remove_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -626,14 +690,16 @@ async def sample_remove_grantees(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.remove_grantees] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.remove_grantees + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -650,15 +716,16 @@ async def sample_remove_grantees(): # Done; return the response. return response - async def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def update_data_policy( + self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Updates the metadata for an existing data policy. The target data policy can be specified by the resource name. @@ -736,10 +803,14 @@ async def sample_update_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -755,14 +826,16 @@ async def sample_update_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.update_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy.name", request.data_policy.name),) + ), ) # Validate the universe domain. @@ -779,14 +852,15 @@ async def sample_update_data_policy(): # Done; return the response. return response - async def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: + async def delete_data_policy( + self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: r"""Deletes the data policy specified by its resource name. @@ -837,10 +911,14 @@ async def sample_delete_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -854,14 +932,14 @@ async def sample_delete_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.delete_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -875,14 +953,15 @@ async def sample_delete_data_policy(): metadata=metadata, ) - async def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def get_data_policy( + self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Gets the data policy specified by its resource name. .. code-block:: python @@ -939,10 +1018,14 @@ async def sample_get_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -956,14 +1039,14 @@ async def sample_get_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.get_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -980,14 +1063,15 @@ async def sample_get_data_policy(): # Done; return the response. return response - async def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesAsyncPager: + async def list_data_policies( + self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: r"""List all of the data policies in the specified parent project. @@ -1051,10 +1135,14 @@ async def sample_list_data_policies(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1068,14 +1156,14 @@ async def sample_list_data_policies(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.list_data_policies + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -1103,13 +1191,14 @@ async def sample_list_data_policies(): # Done; return the response. return response - async def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + async def get_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Gets the IAM policy for the specified data policy. .. code-block:: python @@ -1185,7 +1274,7 @@ async def sample_get_iam_policy(): """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.GetIamPolicyRequest(**request) @@ -1194,14 +1283,14 @@ async def sample_get_iam_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.get_iam_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1218,13 +1307,14 @@ async def sample_get_iam_policy(): # Done; return the response. return response - async def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + async def set_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Sets the IAM policy for the specified data policy. .. code-block:: python @@ -1300,7 +1390,7 @@ async def sample_set_iam_policy(): """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.SetIamPolicyRequest(**request) @@ -1309,14 +1399,14 @@ async def sample_set_iam_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.set_iam_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1333,13 +1423,14 @@ async def sample_set_iam_policy(): # Done; return the response. return response - async def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + async def test_iam_permissions( + self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Returns the caller's permission on the specified data policy resource. @@ -1387,7 +1478,7 @@ async def sample_test_iam_permissions(): Response message for TestIamPermissions method. """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.TestIamPermissionsRequest(**request) @@ -1396,14 +1487,14 @@ async def sample_test_iam_permissions(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.test_iam_permissions + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1426,12 +1517,13 @@ async def __aenter__(self) -> "DataPolicyServiceAsyncClient": async def __aexit__(self, exc_type, exc, tb): await self.transport.close() -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ -__all__ = ( - "DataPolicyServiceAsyncClient", -) +__all__ = ("DataPolicyServiceAsyncClient",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py similarity index 82% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py index 82e9a9ebb9ab..6a4520eba7af 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/client.py @@ -19,22 +19,34 @@ import logging as std_logging import os import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +from typing import ( + Callable, + Dict, + Mapping, + MutableMapping, + MutableSequence, + Optional, + Sequence, + Tuple, + Type, + Union, + cast, +) import warnings -from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version - from google.api_core import client_options as client_options_lib from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport import mtls # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.auth.exceptions import MutualTLSChannelError # type: ignore -from google.oauth2 import service_account # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.oauth2 import service_account # type: ignore import google.protobuf +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version + try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] except AttributeError: # pragma: NO COVER @@ -42,18 +54,21 @@ try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False _LOGGER = std_logging.getLogger(__name__) -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers +from google.cloud.bigquery_datapolicies_v2.types import datapolicy + +from .transports.base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport from .transports.grpc import DataPolicyServiceGrpcTransport from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport from .transports.rest import DataPolicyServiceRestTransport @@ -66,14 +81,18 @@ class DataPolicyServiceClientMeta(type): support objects (e.g. transport) without polluting the client instance objects. """ - _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + + _transport_registry = ( + OrderedDict() + ) # type: Dict[str, Type[DataPolicyServiceTransport]] _transport_registry["grpc"] = DataPolicyServiceGrpcTransport _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport _transport_registry["rest"] = DataPolicyServiceRestTransport - def get_transport_class(cls, - label: Optional[str] = None, - ) -> Type[DataPolicyServiceTransport]: + def get_transport_class( + cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: """Returns an appropriate transport class. Args: @@ -167,8 +186,7 @@ def from_service_account_file(cls, filename: str, *args, **kwargs): Returns: DataPolicyServiceClient: The constructed client. """ - credentials = service_account.Credentials.from_service_account_file( - filename) + credentials = service_account.Credentials.from_service_account_file(filename) kwargs["credentials"] = credentials return cls(*args, **kwargs) @@ -185,95 +203,156 @@ def transport(self) -> DataPolicyServiceTransport: return self._transport @staticmethod - def data_policy_path(project: str,location: str,data_policy: str,) -> str: + def data_policy_path( + project: str, + location: str, + data_policy: str, + ) -> str: """Returns a fully-qualified data_policy string.""" - return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + return ( + "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format( + project=project, + location=location, + data_policy=data_policy, + ) + ) @staticmethod - def parse_data_policy_path(path: str) -> Dict[str,str]: + def parse_data_policy_path(path: str) -> Dict[str, str]: """Parses a data_policy path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + m = re.match( + r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", + path, + ) return m.groupdict() if m else {} @staticmethod - def policy_tag_path(project: str,location: str,taxonomy: str,policy_tag: str,) -> str: + def policy_tag_path( + project: str, + location: str, + taxonomy: str, + policy_tag: str, + ) -> str: """Returns a fully-qualified policy_tag string.""" - return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format( + project=project, + location=location, + taxonomy=taxonomy, + policy_tag=policy_tag, + ) @staticmethod - def parse_policy_tag_path(path: str) -> Dict[str,str]: + def parse_policy_tag_path(path: str) -> Dict[str, str]: """Parses a policy_tag path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", path) + m = re.match( + r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", + path, + ) return m.groupdict() if m else {} @staticmethod - def routine_path(project: str,dataset: str,routine: str,) -> str: + def routine_path( + project: str, + dataset: str, + routine: str, + ) -> str: """Returns a fully-qualified routine string.""" - return "projects/{project}/datasets/{dataset}/routines/{routine}".format(project=project, dataset=dataset, routine=routine, ) + return "projects/{project}/datasets/{dataset}/routines/{routine}".format( + project=project, + dataset=dataset, + routine=routine, + ) @staticmethod - def parse_routine_path(path: str) -> Dict[str,str]: + def parse_routine_path(path: str) -> Dict[str, str]: """Parses a routine path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/datasets/(?P.+?)/routines/(?P.+?)$", path) + m = re.match( + r"^projects/(?P.+?)/datasets/(?P.+?)/routines/(?P.+?)$", + path, + ) return m.groupdict() if m else {} @staticmethod - def common_billing_account_path(billing_account: str, ) -> str: + def common_billing_account_path( + billing_account: str, + ) -> str: """Returns a fully-qualified billing_account string.""" - return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + return "billingAccounts/{billing_account}".format( + billing_account=billing_account, + ) @staticmethod - def parse_common_billing_account_path(path: str) -> Dict[str,str]: + def parse_common_billing_account_path(path: str) -> Dict[str, str]: """Parse a billing_account path into its component segments.""" m = re.match(r"^billingAccounts/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_folder_path(folder: str, ) -> str: + def common_folder_path( + folder: str, + ) -> str: """Returns a fully-qualified folder string.""" - return "folders/{folder}".format(folder=folder, ) + return "folders/{folder}".format( + folder=folder, + ) @staticmethod - def parse_common_folder_path(path: str) -> Dict[str,str]: + def parse_common_folder_path(path: str) -> Dict[str, str]: """Parse a folder path into its component segments.""" m = re.match(r"^folders/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_organization_path(organization: str, ) -> str: + def common_organization_path( + organization: str, + ) -> str: """Returns a fully-qualified organization string.""" - return "organizations/{organization}".format(organization=organization, ) + return "organizations/{organization}".format( + organization=organization, + ) @staticmethod - def parse_common_organization_path(path: str) -> Dict[str,str]: + def parse_common_organization_path(path: str) -> Dict[str, str]: """Parse a organization path into its component segments.""" m = re.match(r"^organizations/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_project_path(project: str, ) -> str: + def common_project_path( + project: str, + ) -> str: """Returns a fully-qualified project string.""" - return "projects/{project}".format(project=project, ) + return "projects/{project}".format( + project=project, + ) @staticmethod - def parse_common_project_path(path: str) -> Dict[str,str]: + def parse_common_project_path(path: str) -> Dict[str, str]: """Parse a project path into its component segments.""" m = re.match(r"^projects/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_location_path(project: str, location: str, ) -> str: + def common_location_path( + project: str, + location: str, + ) -> str: """Returns a fully-qualified location string.""" - return "projects/{project}/locations/{location}".format(project=project, location=location, ) + return "projects/{project}/locations/{location}".format( + project=project, + location=location, + ) @staticmethod - def parse_common_location_path(path: str) -> Dict[str,str]: + def parse_common_location_path(path: str) -> Dict[str, str]: """Parse a location path into its component segments.""" m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) return m.groupdict() if m else {} @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[client_options_lib.ClientOptions] = None + ): """Deprecated. Return the API endpoint and client cert source for mutual TLS. The client cert source is determined in the following order: @@ -305,16 +384,22 @@ def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_optio google.auth.exceptions.MutualTLSChannelError: If any errors happen. """ - warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", - DeprecationWarning) + warnings.warn( + "get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning, + ) if client_options is None: client_options = client_options_lib.ClientOptions() use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + raise MutualTLSChannelError( + "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Figure out the client cert source to use. client_cert_source = None @@ -327,7 +412,9 @@ def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_optio # Figure out which api endpoint to use. if client_options.api_endpoint is not None: api_endpoint = client_options.api_endpoint - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + elif use_mtls_endpoint == "always" or ( + use_mtls_endpoint == "auto" and client_cert_source + ): api_endpoint = cls.DEFAULT_MTLS_ENDPOINT else: api_endpoint = cls.DEFAULT_ENDPOINT @@ -348,13 +435,19 @@ def _read_environment_variables(): google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT is not any of ["auto", "never", "always"]. """ - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_client_cert = os.getenv( + "GOOGLE_API_USE_CLIENT_CERTIFICATE", "false" + ).lower() use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + raise MutualTLSChannelError( + "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) return use_client_cert == "true", use_mtls_endpoint, universe_domain_env @staticmethod @@ -377,7 +470,9 @@ def _get_client_cert_source(provided_cert_source, use_cert_flag): return client_cert_source @staticmethod - def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + def _get_api_endpoint( + api_override, client_cert_source, universe_domain, use_mtls_endpoint + ): """Return the API endpoint used by the client. Args: @@ -393,17 +488,25 @@ def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtl """ if api_override is not None: api_endpoint = api_override - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + elif use_mtls_endpoint == "always" or ( + use_mtls_endpoint == "auto" and client_cert_source + ): _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE if universe_domain != _default_universe: - raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + raise MutualTLSChannelError( + f"mTLS is not supported in any universe other than {_default_universe}." + ) api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT else: - api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=universe_domain + ) return api_endpoint @staticmethod - def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + def _get_universe_domain( + client_universe_domain: Optional[str], universe_domain_env: Optional[str] + ) -> str: """Return the universe domain used by the client. Args: @@ -439,15 +542,18 @@ def _validate_universe_domain(self): return True def _add_cred_info_for_auth_errors( - self, - error: core_exceptions.GoogleAPICallError + self, error: core_exceptions.GoogleAPICallError ) -> None: """Adds credential info string to error details for 401/403/404 errors. Args: error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. """ - if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + if error.code not in [ + HTTPStatus.UNAUTHORIZED, + HTTPStatus.FORBIDDEN, + HTTPStatus.NOT_FOUND, + ]: return cred = self._transport._credentials @@ -480,12 +586,20 @@ def universe_domain(self) -> str: """ return self._universe_domain - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, - client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: + def __init__( + self, + *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[ + Union[ + str, + DataPolicyServiceTransport, + Callable[..., DataPolicyServiceTransport], + ] + ] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: """Instantiates the data policy service client. Args: @@ -540,14 +654,24 @@ def __init__(self, *, self._client_options = client_options_lib.from_dict(self._client_options) if self._client_options is None: self._client_options = client_options_lib.ClientOptions() - self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + self._client_options = cast( + client_options_lib.ClientOptions, self._client_options + ) - universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + universe_domain_opt = getattr(self._client_options, "universe_domain", None) - self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() - self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) - self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) - self._api_endpoint = None # updated below, depending on `transport` + ( + self._use_client_cert, + self._use_mtls_endpoint, + self._universe_domain_env, + ) = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source( + self._client_options.client_cert_source, self._use_client_cert + ) + self._universe_domain = DataPolicyServiceClient._get_universe_domain( + universe_domain_opt, self._universe_domain_env + ) + self._api_endpoint = None # updated below, depending on `transport` # Initialize the universe domain validation. self._is_universe_domain_valid = False @@ -558,7 +682,9 @@ def __init__(self, *, api_key_value = getattr(self._client_options, "api_key", None) if api_key_value and credentials: - raise ValueError("client_options.api_key and credentials are mutually exclusive") + raise ValueError( + "client_options.api_key and credentials are mutually exclusive" + ) # Save or instantiate the transport. # Ordinarily, we provide the transport, but allowing a custom transport @@ -567,8 +693,10 @@ def __init__(self, *, if transport_provided: # transport is a DataPolicyServiceTransport instance. if credentials or self._client_options.credentials_file or api_key_value: - raise ValueError("When providing a transport instance, " - "provide its credentials directly.") + raise ValueError( + "When providing a transport instance, " + "provide its credentials directly." + ) if self._client_options.scopes: raise ValueError( "When providing a transport instance, provide its scopes " @@ -577,20 +705,30 @@ def __init__(self, *, self._transport = cast(DataPolicyServiceTransport, transport) self._api_endpoint = self._transport.host - self._api_endpoint = (self._api_endpoint or - DataPolicyServiceClient._get_api_endpoint( + self._api_endpoint = ( + self._api_endpoint + or DataPolicyServiceClient._get_api_endpoint( self._client_options.api_endpoint, self._client_cert_source, self._universe_domain, - self._use_mtls_endpoint)) + self._use_mtls_endpoint, + ) + ) if not transport_provided: import google.auth._default # type: ignore - if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): - credentials = google.auth._default.get_api_key_credentials(api_key_value) + if api_key_value and hasattr( + google.auth._default, "get_api_key_credentials" + ): + credentials = google.auth._default.get_api_key_credentials( + api_key_value + ) - transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + transport_init: Union[ + Type[DataPolicyServiceTransport], + Callable[..., DataPolicyServiceTransport], + ] = ( DataPolicyServiceClient.get_transport_class(transport) if isinstance(transport, str) or transport is None else cast(Callable[..., DataPolicyServiceTransport], transport) @@ -609,30 +747,39 @@ def __init__(self, *, ) if "async" not in str(self._transport): - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ): # pragma: NO COVER _LOGGER.debug( "Created client `google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient`.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", - "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "universeDomain": getattr( + self._transport._credentials, "universe_domain", "" + ), "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._transport, "_credentials") else { + "credentialsInfo": getattr( + self.transport._credentials, "get_cred_info", lambda: None + )(), + } + if hasattr(self._transport, "_credentials") + else { "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "credentialsType": None, - } + }, ) - def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def create_data_policy( + self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Creates a new data policy under a project with the given ``data_policy_id`` (used as the display name), and data policy type. @@ -713,10 +860,14 @@ def sample_create_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent, data_policy, data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -738,9 +889,7 @@ def sample_create_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -757,15 +906,16 @@ def sample_create_data_policy(): # Done; return the response. return response - def add_grantees(self, - request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def add_grantees( + self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Adds new grantees to a data policy. The new grantees will be added to the existing grantees. If the request contains a duplicate grantee, the grantee @@ -844,10 +994,14 @@ def sample_add_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -867,9 +1021,9 @@ def sample_add_grantees(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -886,15 +1040,16 @@ def sample_add_grantees(): # Done; return the response. return response - def remove_grantees(self, - request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def remove_grantees( + self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Removes grantees from a data policy. The grantees will be removed from the existing grantees. If the request contains a grantee that does not exist, @@ -972,10 +1127,14 @@ def sample_remove_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -995,9 +1154,9 @@ def sample_remove_grantees(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -1014,15 +1173,16 @@ def sample_remove_grantees(): # Done; return the response. return response - def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def update_data_policy( + self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Updates the metadata for an existing data policy. The target data policy can be specified by the resource name. @@ -1100,10 +1260,14 @@ def sample_update_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1123,9 +1287,9 @@ def sample_update_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy.name", request.data_policy.name),) + ), ) # Validate the universe domain. @@ -1142,14 +1306,15 @@ def sample_update_data_policy(): # Done; return the response. return response - def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: + def delete_data_policy( + self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: r"""Deletes the data policy specified by its resource name. @@ -1200,10 +1365,14 @@ def sample_delete_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1221,9 +1390,7 @@ def sample_delete_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -1237,14 +1404,15 @@ def sample_delete_data_policy(): metadata=metadata, ) - def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def get_data_policy( + self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Gets the data policy specified by its resource name. .. code-block:: python @@ -1301,10 +1469,14 @@ def sample_get_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1322,9 +1494,7 @@ def sample_get_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -1341,14 +1511,15 @@ def sample_get_data_policy(): # Done; return the response. return response - def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesPager: + def list_data_policies( + self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: r"""List all of the data policies in the specified parent project. @@ -1412,10 +1583,14 @@ def sample_list_data_policies(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1433,9 +1608,7 @@ def sample_list_data_policies(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -1463,13 +1636,14 @@ def sample_list_data_policies(): # Done; return the response. return response - def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + def get_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Gets the IAM policy for the specified data policy. .. code-block:: python @@ -1560,9 +1734,7 @@ def sample_get_iam_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1579,13 +1751,14 @@ def sample_get_iam_policy(): # Done; return the response. return response - def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + def set_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Sets the IAM policy for the specified data policy. .. code-block:: python @@ -1676,9 +1849,7 @@ def sample_set_iam_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1695,13 +1866,14 @@ def sample_set_iam_policy(): # Done; return the response. return response - def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + def test_iam_permissions( + self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Returns the caller's permission on the specified data policy resource. @@ -1764,9 +1936,7 @@ def sample_test_iam_permissions(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1797,16 +1967,11 @@ def __exit__(self, type, value, traceback): self.transport.close() - - - - - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ -__all__ = ( - "DataPolicyServiceClient", -) +__all__ = ("DataPolicyServiceClient",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py similarity index 79% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py index bb0f8ad8dc28..ecd9be589c42 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/pagers.py @@ -13,13 +13,27 @@ # See the License for the specific language governing permissions and # limitations under the License. # +from typing import ( + Any, + AsyncIterator, + Awaitable, + Callable, + Iterator, + Optional, + Sequence, + Tuple, + Union, +) + from google.api_core import gapic_v1 from google.api_core import retry as retries from google.api_core import retry_async as retries_async -from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union + try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] - OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[ + retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None + ] except AttributeError: # pragma: NO COVER OptionalRetry = Union[retries.Retry, object, None] # type: ignore OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore @@ -44,14 +58,17 @@ class ListDataPoliciesPager: attributes are available on the pager. If multiple requests are made, only the most recent response is retained, and thus used for attribute lookup. """ - def __init__(self, - method: Callable[..., datapolicy.ListDataPoliciesResponse], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + + def __init__( + self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = () + ): """Instantiate the pager. Args: @@ -84,7 +101,12 @@ def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: yield self._response while self._response.next_page_token: self._request.page_token = self._response.next_page_token - self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + self._response = self._method( + self._request, + retry=self._retry, + timeout=self._timeout, + metadata=self._metadata, + ) yield self._response def __iter__(self) -> Iterator[datapolicy.DataPolicy]: @@ -92,7 +114,7 @@ def __iter__(self) -> Iterator[datapolicy.DataPolicy]: yield from page.data_policies def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + return "{0}<{1!r}>".format(self.__class__.__name__, self._response) class ListDataPoliciesAsyncPager: @@ -112,14 +134,17 @@ class ListDataPoliciesAsyncPager: attributes are available on the pager. If multiple requests are made, only the most recent response is retained, and thus used for attribute lookup. """ - def __init__(self, - method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + + def __init__( + self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = () + ): """Instantiates the pager. Args: @@ -152,8 +177,14 @@ async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: yield self._response while self._response.next_page_token: self._request.page_token = self._response.next_page_token - self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + self._response = await self._method( + self._request, + retry=self._retry, + timeout=self._timeout, + metadata=self._metadata, + ) yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: async def async_generator(): async for page in self.pages: @@ -163,4 +194,4 @@ async def async_generator(): return async_generator() def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + return "{0}<{1!r}>".format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/README.rst rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/README.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py similarity index 67% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py index 86209da54f31..5f4519a975c4 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/__init__.py @@ -19,15 +19,18 @@ from .base import DataPolicyServiceTransport from .grpc import DataPolicyServiceGrpcTransport from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport - +from .rest import DataPolicyServiceRestInterceptor, DataPolicyServiceRestTransport # Compile a registry of transports. _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] -_transport_registry['grpc'] = DataPolicyServiceGrpcTransport -_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry["grpc"] = DataPolicyServiceGrpcTransport +_transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry["rest"] = DataPolicyServiceRestTransport __all__ = ( - 'DataPolicyServiceTransport', - 'DataPolicyServiceGrpcTransport', - 'DataPolicyServiceGrpcAsyncIOTransport', + "DataPolicyServiceTransport", + "DataPolicyServiceGrpcTransport", + "DataPolicyServiceGrpcAsyncIOTransport", + "DataPolicyServiceRestTransport", + "DataPolicyServiceRestInterceptor", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py similarity index 74% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py index 173ff4780171..7f9b0ded4f72 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/base.py @@ -16,23 +16,24 @@ import abc from typing import Awaitable, Callable, Dict, Optional, Sequence, Union -from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version - -import google.auth # type: ignore import google.api_core from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry as retries +import google.auth # type: ignore from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -from google.cloud.bigquery_datapolicies_v2.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf from google.protobuf import empty_pb2 # type: ignore -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) +from google.cloud.bigquery_datapolicies_v2 import gapic_version as package_version +from google.cloud.bigquery_datapolicies_v2.types import datapolicy + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ @@ -42,24 +43,25 @@ class DataPolicyServiceTransport(abc.ABC): """Abstract transport class for DataPolicyService.""" AUTH_SCOPES = ( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", ) - DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + DEFAULT_HOST: str = "bigquerydatapolicy.googleapis.com" def __init__( - self, *, - host: str = DEFAULT_HOST, - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - **kwargs, - ) -> None: + self, + *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: """Instantiate the transport. Args: @@ -95,30 +97,38 @@ def __init__( # If no credentials are provided, then determine the appropriate # defaults. if credentials and credentials_file: - raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + raise core_exceptions.DuplicateCredentialArgs( + "'credentials_file' and 'credentials' are mutually exclusive" + ) if credentials_file is not None: credentials, _ = google.auth.load_credentials_from_file( - credentials_file, - **scopes_kwargs, - quota_project_id=quota_project_id - ) + credentials_file, **scopes_kwargs, quota_project_id=quota_project_id + ) elif credentials is None and not self._ignore_credentials: - credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + credentials, _ = google.auth.default( + **scopes_kwargs, quota_project_id=quota_project_id + ) # Don't apply audience if the credentials file passed from user. if hasattr(credentials, "with_gdch_audience"): - credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + credentials = credentials.with_gdch_audience( + api_audience if api_audience else host + ) # If the credentials are service account credentials, then always try to use self signed JWT. - if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + if ( + always_use_jwt_access + and isinstance(credentials, service_account.Credentials) + and hasattr(service_account.Credentials, "with_always_use_jwt_access") + ): credentials = credentials.with_always_use_jwt_access(True) # Save the credentials. self._credentials = credentials # Save the hostname. Default to port 443 (HTTPS) if none is specified. - if ':' not in host: - host += ':443' + if ":" not in host: + host += ":443" self._host = host @property @@ -288,105 +298,111 @@ def _prep_wrapped_messages(self, client_info): default_timeout=64.0, client_info=client_info, ), - } + } def close(self): """Closes resources associated with the transport. - .. warning:: - Only call this method if the transport is NOT shared - with other clients - this may cause errors in other clients! + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! """ raise NotImplementedError() @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def create_data_policy( + self, + ) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def add_grantees( + self, + ) -> Callable[ + [datapolicy.AddGranteesRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def remove_grantees( + self, + ) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def update_data_policy( + self, + ) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Union[ - empty_pb2.Empty, - Awaitable[empty_pb2.Empty] - ]]: + def delete_data_policy( + self, + ) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[empty_pb2.Empty, Awaitable[empty_pb2.Empty]], + ]: raise NotImplementedError() @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def get_data_policy( + self, + ) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Union[ - datapolicy.ListDataPoliciesResponse, - Awaitable[datapolicy.ListDataPoliciesResponse] - ]]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse], + ], + ]: raise NotImplementedError() @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: + def get_iam_policy( + self, + ) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[policy_pb2.Policy, Awaitable[policy_pb2.Policy]], + ]: raise NotImplementedError() @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: + def set_iam_policy( + self, + ) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[policy_pb2.Policy, Awaitable[policy_pb2.Policy]], + ]: raise NotImplementedError() @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Union[ - iam_policy_pb2.TestIamPermissionsResponse, - Awaitable[iam_policy_pb2.TestIamPermissionsResponse] - ]]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse], + ], + ]: raise NotImplementedError() @property @@ -394,6 +410,4 @@ def kind(self) -> str: raise NotImplementedError() -__all__ = ( - 'DataPolicyServiceTransport', -) +__all__ = ("DataPolicyServiceTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py similarity index 78% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py index b25e0df3504e..3766cd181eea 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc.py @@ -16,28 +16,28 @@ import json import logging as std_logging import pickle -import warnings from typing import Callable, Dict, Optional, Sequence, Tuple, Union +import warnings -from google.api_core import grpc_helpers -from google.api_core import gapic_v1 -import google.auth # type: ignore +from google.api_core import gapic_v1, grpc_helpers +import google.auth # type: ignore from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore from google.protobuf.json_format import MessageToJson import google.protobuf.message - import grpc # type: ignore import proto # type: ignore from google.cloud.bigquery_datapolicies_v2.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -47,7 +47,9 @@ class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ) if logging_enabled: # pragma: NO COVER request_metadata = client_call_details.metadata if isinstance(request, proto.Message): @@ -68,7 +70,7 @@ def intercept_unary_unary(self, continuation, client_call_details, request): } _LOGGER.debug( f"Sending request for {client_call_details.method}", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": str(client_call_details.method), "request": grpc_request, @@ -79,7 +81,11 @@ def intercept_unary_unary(self, continuation, client_call_details, request): if logging_enabled: # pragma: NO COVER response_metadata = response.trailing_metadata() # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + metadata = ( + dict([(k, str(v)) for k, v in response_metadata]) + if response_metadata + else None + ) result = response.result() if isinstance(result, proto.Message): response_payload = type(result).to_json(result) @@ -94,7 +100,7 @@ def intercept_unary_unary(self, continuation, client_call_details, request): } _LOGGER.debug( f"Received response for {client_call_details.method}.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": client_call_details.method, "response": grpc_response, @@ -117,23 +123,26 @@ class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): It sends protocol buffers over the wire using gRPC (which is built on top of HTTP/2); the ``grpcio`` package must be installed. """ + _stubs: Dict[str, Callable] - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -255,19 +264,23 @@ def __init__(self, *, ) self._interceptor = _LoggingClientInterceptor() - self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + self._logged_channel = grpc.intercept_channel( + self._grpc_channel, self._interceptor + ) # Wrap messages. This must be done after self._logged_channel exists self._prep_wrapped_messages(client_info) @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> grpc.Channel: + def create_channel( + cls, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs, + ) -> grpc.Channel: """Create and return a gRPC channel object. Args: host (Optional[str]): The host for the channel to use. @@ -302,19 +315,18 @@ def create_channel(cls, default_scopes=cls.AUTH_SCOPES, scopes=scopes, default_host=cls.DEFAULT_HOST, - **kwargs + **kwargs, ) @property def grpc_channel(self) -> grpc.Channel: - """Return the channel designed to connect to this service. - """ + """Return the channel designed to connect to this service.""" return self._grpc_channel @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: + def create_data_policy( + self, + ) -> Callable[[datapolicy.CreateDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the create data policy method over gRPC. Creates a new data policy under a project with the given @@ -331,18 +343,18 @@ def create_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy', + if "create_data_policy" not in self._stubs: + self._stubs["create_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy", request_serializer=datapolicy.CreateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['create_data_policy'] + return self._stubs["create_data_policy"] @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - datapolicy.DataPolicy]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], datapolicy.DataPolicy]: r"""Return a callable for the add grantees method over gRPC. Adds new grantees to a data policy. @@ -361,18 +373,18 @@ def add_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'add_grantees' not in self._stubs: - self._stubs['add_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees', + if "add_grantees" not in self._stubs: + self._stubs["add_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees", request_serializer=datapolicy.AddGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['add_grantees'] + return self._stubs["add_grantees"] @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - datapolicy.DataPolicy]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], datapolicy.DataPolicy]: r"""Return a callable for the remove grantees method over gRPC. Removes grantees from a data policy. @@ -390,18 +402,18 @@ def remove_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'remove_grantees' not in self._stubs: - self._stubs['remove_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees', + if "remove_grantees" not in self._stubs: + self._stubs["remove_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees", request_serializer=datapolicy.RemoveGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['remove_grantees'] + return self._stubs["remove_grantees"] @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: + def update_data_policy( + self, + ) -> Callable[[datapolicy.UpdateDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the update data policy method over gRPC. Updates the metadata for an existing data policy. The @@ -418,18 +430,18 @@ def update_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy', + if "update_data_policy" not in self._stubs: + self._stubs["update_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy", request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['update_data_policy'] + return self._stubs["update_data_policy"] @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], empty_pb2.Empty]: r"""Return a callable for the delete data policy method over gRPC. Deletes the data policy specified by its resource @@ -445,18 +457,18 @@ def delete_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy', + if "delete_data_policy" not in self._stubs: + self._stubs["delete_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy", request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, response_deserializer=empty_pb2.Empty.FromString, ) - return self._stubs['delete_data_policy'] + return self._stubs["delete_data_policy"] @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the get data policy method over gRPC. Gets the data policy specified by its resource name. @@ -471,18 +483,20 @@ def get_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy', + if "get_data_policy" not in self._stubs: + self._stubs["get_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy", request_serializer=datapolicy.GetDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['get_data_policy'] + return self._stubs["get_data_policy"] @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], datapolicy.ListDataPoliciesResponse + ]: r"""Return a callable for the list data policies method over gRPC. List all of the data policies in the specified parent @@ -498,18 +512,18 @@ def list_data_policies(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies', + if "list_data_policies" not in self._stubs: + self._stubs["list_data_policies"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies", request_serializer=datapolicy.ListDataPoliciesRequest.serialize, response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, ) - return self._stubs['list_data_policies'] + return self._stubs["list_data_policies"] @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], policy_pb2.Policy]: r"""Return a callable for the get iam policy method over gRPC. Gets the IAM policy for the specified data policy. @@ -524,18 +538,18 @@ def get_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy', + if "get_iam_policy" not in self._stubs: + self._stubs["get_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy", request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['get_iam_policy'] + return self._stubs["get_iam_policy"] @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], policy_pb2.Policy]: r"""Return a callable for the set iam policy method over gRPC. Sets the IAM policy for the specified data policy. @@ -550,18 +564,21 @@ def set_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy', + if "set_iam_policy" not in self._stubs: + self._stubs["set_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy", request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['set_iam_policy'] + return self._stubs["set_iam_policy"] @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse, + ]: r"""Return a callable for the test iam permissions method over gRPC. Returns the caller's permission on the specified data @@ -577,13 +594,13 @@ def test_iam_permissions(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions', + if "test_iam_permissions" not in self._stubs: + self._stubs["test_iam_permissions"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions", request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, ) - return self._stubs['test_iam_permissions'] + return self._stubs["test_iam_permissions"] def close(self): self._logged_channel.close() @@ -593,6 +610,4 @@ def kind(self) -> str: return "grpc" -__all__ = ( - 'DataPolicyServiceGrpcTransport', -) +__all__ = ("DataPolicyServiceGrpcTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py similarity index 82% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py index e15854aae44c..af7cdbf7073e 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/grpc_asyncio.py @@ -15,33 +15,33 @@ # import inspect import json -import pickle import logging as std_logging -import warnings +import pickle from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union +import warnings -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers_async from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1, grpc_helpers_async from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore +from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore from google.protobuf.json_format import MessageToJson import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore +import grpc # type: ignore from grpc.experimental import aio # type: ignore +import proto # type: ignore from google.cloud.bigquery_datapolicies_v2.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport from .grpc import DataPolicyServiceGrpcTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -49,9 +49,13 @@ _LOGGER = std_logging.getLogger(__name__) -class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER +class _LoggingClientAIOInterceptor( + grpc.aio.UnaryUnaryClientInterceptor +): # pragma: NO COVER async def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ) if logging_enabled: # pragma: NO COVER request_metadata = client_call_details.metadata if isinstance(request, proto.Message): @@ -72,7 +76,7 @@ async def intercept_unary_unary(self, continuation, client_call_details, request } _LOGGER.debug( f"Sending request for {client_call_details.method}", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": str(client_call_details.method), "request": grpc_request, @@ -83,7 +87,11 @@ async def intercept_unary_unary(self, continuation, client_call_details, request if logging_enabled: # pragma: NO COVER response_metadata = await response.trailing_metadata() # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + metadata = ( + dict([(k, str(v)) for k, v in response_metadata]) + if response_metadata + else None + ) result = await response if isinstance(result, proto.Message): response_payload = type(result).to_json(result) @@ -98,7 +106,7 @@ async def intercept_unary_unary(self, continuation, client_call_details, request } _LOGGER.debug( f"Received response to rpc {client_call_details.method}.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": str(client_call_details.method), "response": grpc_response, @@ -126,13 +134,15 @@ class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): _stubs: Dict[str, Callable] = {} @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> aio.Channel: + def create_channel( + cls, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs, + ) -> aio.Channel: """Create and return a gRPC AsyncIO channel object. Args: host (Optional[str]): The host for the channel to use. @@ -162,24 +172,26 @@ def create_channel(cls, default_scopes=cls.AUTH_SCOPES, scopes=scopes, default_host=cls.DEFAULT_HOST, - **kwargs + **kwargs, ) - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -303,7 +315,9 @@ def __init__(self, *, self._interceptor = _LoggingClientAIOInterceptor() self._grpc_channel._unary_unary_interceptors.append(self._interceptor) self._logged_channel = self._grpc_channel - self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + self._wrap_with_kind = ( + "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + ) # Wrap messages. This must be done after self._logged_channel exists self._prep_wrapped_messages(client_info) @@ -318,9 +332,11 @@ def grpc_channel(self) -> aio.Channel: return self._grpc_channel @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def create_data_policy( + self, + ) -> Callable[ + [datapolicy.CreateDataPolicyRequest], Awaitable[datapolicy.DataPolicy] + ]: r"""Return a callable for the create data policy method over gRPC. Creates a new data policy under a project with the given @@ -337,18 +353,18 @@ def create_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy', + if "create_data_policy" not in self._stubs: + self._stubs["create_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/CreateDataPolicy", request_serializer=datapolicy.CreateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['create_data_policy'] + return self._stubs["create_data_policy"] @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - Awaitable[datapolicy.DataPolicy]]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the add grantees method over gRPC. Adds new grantees to a data policy. @@ -367,18 +383,18 @@ def add_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'add_grantees' not in self._stubs: - self._stubs['add_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees', + if "add_grantees" not in self._stubs: + self._stubs["add_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/AddGrantees", request_serializer=datapolicy.AddGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['add_grantees'] + return self._stubs["add_grantees"] @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - Awaitable[datapolicy.DataPolicy]]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the remove grantees method over gRPC. Removes grantees from a data policy. @@ -396,18 +412,20 @@ def remove_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'remove_grantees' not in self._stubs: - self._stubs['remove_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees', + if "remove_grantees" not in self._stubs: + self._stubs["remove_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/RemoveGrantees", request_serializer=datapolicy.RemoveGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['remove_grantees'] + return self._stubs["remove_grantees"] @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def update_data_policy( + self, + ) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], Awaitable[datapolicy.DataPolicy] + ]: r"""Return a callable for the update data policy method over gRPC. Updates the metadata for an existing data policy. The @@ -424,18 +442,18 @@ def update_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy', + if "update_data_policy" not in self._stubs: + self._stubs["update_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/UpdateDataPolicy", request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['update_data_policy'] + return self._stubs["update_data_policy"] @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Awaitable[empty_pb2.Empty]]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], Awaitable[empty_pb2.Empty]]: r"""Return a callable for the delete data policy method over gRPC. Deletes the data policy specified by its resource @@ -451,18 +469,18 @@ def delete_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy', + if "delete_data_policy" not in self._stubs: + self._stubs["delete_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/DeleteDataPolicy", request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, response_deserializer=empty_pb2.Empty.FromString, ) - return self._stubs['delete_data_policy'] + return self._stubs["delete_data_policy"] @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the get data policy method over gRPC. Gets the data policy specified by its resource name. @@ -477,18 +495,21 @@ def get_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy', + if "get_data_policy" not in self._stubs: + self._stubs["get_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetDataPolicy", request_serializer=datapolicy.GetDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['get_data_policy'] + return self._stubs["get_data_policy"] @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Awaitable[datapolicy.ListDataPoliciesResponse]]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse], + ]: r"""Return a callable for the list data policies method over gRPC. List all of the data policies in the specified parent @@ -504,18 +525,18 @@ def list_data_policies(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies', + if "list_data_policies" not in self._stubs: + self._stubs["list_data_policies"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/ListDataPolicies", request_serializer=datapolicy.ListDataPoliciesRequest.serialize, response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, ) - return self._stubs['list_data_policies'] + return self._stubs["list_data_policies"] @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], Awaitable[policy_pb2.Policy]]: r"""Return a callable for the get iam policy method over gRPC. Gets the IAM policy for the specified data policy. @@ -530,18 +551,18 @@ def get_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy', + if "get_iam_policy" not in self._stubs: + self._stubs["get_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/GetIamPolicy", request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['get_iam_policy'] + return self._stubs["get_iam_policy"] @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], Awaitable[policy_pb2.Policy]]: r"""Return a callable for the set iam policy method over gRPC. Sets the IAM policy for the specified data policy. @@ -556,18 +577,21 @@ def set_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy', + if "set_iam_policy" not in self._stubs: + self._stubs["set_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/SetIamPolicy", request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['set_iam_policy'] + return self._stubs["set_iam_policy"] @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse], + ]: r"""Return a callable for the test iam permissions method over gRPC. Returns the caller's permission on the specified data @@ -583,16 +607,16 @@ def test_iam_permissions(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions', + if "test_iam_permissions" not in self._stubs: + self._stubs["test_iam_permissions"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2.DataPolicyService/TestIamPermissions", request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, ) - return self._stubs['test_iam_permissions'] + return self._stubs["test_iam_permissions"] def _prep_wrapped_messages(self, client_info): - """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + """Precompute the wrapped methods, overriding the base class method to use async wrappers.""" self._wrapped_methods = { self.create_data_policy: self._wrap_method( self.create_data_policy, @@ -769,6 +793,4 @@ def kind(self) -> str: return "grpc_asyncio" -__all__ = ( - 'DataPolicyServiceGrpcAsyncIOTransport', -) +__all__ = ("DataPolicyServiceGrpcAsyncIOTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py similarity index 71% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py index 25ff8efd6094..64317903e927 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest.py @@ -13,34 +13,28 @@ # See the License for the specific language governing permissions and # limitations under the License. # -import logging +import dataclasses import json # type: ignore +import logging +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings -from google.auth.transport.requests import AuthorizedSession # type: ignore -from google.auth import credentials as ga_credentials # type: ignore from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1, rest_helpers, rest_streaming from google.api_core import retry as retries -from google.api_core import rest_helpers -from google.api_core import rest_streaming -from google.api_core import gapic_v1 +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore import google.protobuf - +from google.protobuf import empty_pb2 # type: ignore from google.protobuf import json_format - from requests import __version__ as requests_version -import dataclasses -from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union -import warnings - from google.cloud.bigquery_datapolicies_v2.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - -from .rest_base import _BaseDataPolicyServiceRestTransport from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO +from .rest_base import _BaseDataPolicyServiceRestTransport try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] @@ -49,6 +43,7 @@ try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -161,7 +156,12 @@ def post_update_data_policy(self, response): """ - def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + + def pre_add_grantees( + self, + request: datapolicy.AddGranteesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: """Pre-rpc interceptor for add_grantees Override in a subclass to manipulate the request or metadata @@ -169,7 +169,9 @@ def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Seq """ return request, metadata - def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_add_grantees( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for add_grantees DEPRECATED. Please use the `post_add_grantees_with_metadata` @@ -182,7 +184,11 @@ def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataP """ return response - def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_add_grantees_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for add_grantees Override in a subclass to read or manipulate the response or metadata after it @@ -197,7 +203,13 @@ def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metad """ return response, metadata - def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_create_data_policy( + self, + request: datapolicy.CreateDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for create_data_policy Override in a subclass to manipulate the request or metadata @@ -205,7 +217,9 @@ def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, me """ return request, metadata - def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_create_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for create_data_policy DEPRECATED. Please use the `post_create_data_policy_with_metadata` @@ -218,7 +232,11 @@ def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy """ return response - def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_create_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for create_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -233,7 +251,13 @@ def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, """ return response, metadata - def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_delete_data_policy( + self, + request: datapolicy.DeleteDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for delete_data_policy Override in a subclass to manipulate the request or metadata @@ -241,7 +265,13 @@ def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, me """ return request, metadata - def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_get_data_policy( + self, + request: datapolicy.GetDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for get_data_policy Override in a subclass to manipulate the request or metadata @@ -249,7 +279,9 @@ def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata """ return request, metadata - def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_get_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for get_data_policy DEPRECATED. Please use the `post_get_data_policy_with_metadata` @@ -262,7 +294,11 @@ def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.Da """ return response - def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_get_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for get_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -277,7 +313,13 @@ def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, me """ return response, metadata - def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_get_iam_policy( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for get_iam_policy Override in a subclass to manipulate the request or metadata @@ -298,7 +340,11 @@ def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: """ return response - def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_get_iam_policy_with_metadata( + self, + response: policy_pb2.Policy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for get_iam_policy Override in a subclass to read or manipulate the response or metadata after it @@ -313,7 +359,13 @@ def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadat """ return response, metadata - def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_list_data_policies( + self, + request: datapolicy.ListDataPoliciesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for list_data_policies Override in a subclass to manipulate the request or metadata @@ -321,7 +373,9 @@ def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, me """ return request, metadata - def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: + def post_list_data_policies( + self, response: datapolicy.ListDataPoliciesResponse + ) -> datapolicy.ListDataPoliciesResponse: """Post-rpc interceptor for list_data_policies DEPRECATED. Please use the `post_list_data_policies_with_metadata` @@ -334,7 +388,13 @@ def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) """ return response - def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_list_data_policies_with_metadata( + self, + response: datapolicy.ListDataPoliciesResponse, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Post-rpc interceptor for list_data_policies Override in a subclass to read or manipulate the response or metadata after it @@ -349,7 +409,13 @@ def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPol """ return response, metadata - def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_remove_grantees( + self, + request: datapolicy.RemoveGranteesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for remove_grantees Override in a subclass to manipulate the request or metadata @@ -357,7 +423,9 @@ def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadat """ return request, metadata - def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_remove_grantees( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for remove_grantees DEPRECATED. Please use the `post_remove_grantees_with_metadata` @@ -370,7 +438,11 @@ def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.Da """ return response - def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_remove_grantees_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for remove_grantees Override in a subclass to read or manipulate the response or metadata after it @@ -385,7 +457,13 @@ def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, me """ return response, metadata - def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_set_iam_policy( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for set_iam_policy Override in a subclass to manipulate the request or metadata @@ -406,7 +484,11 @@ def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: """ return response - def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_set_iam_policy_with_metadata( + self, + response: policy_pb2.Policy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for set_iam_policy Override in a subclass to read or manipulate the response or metadata after it @@ -421,7 +503,14 @@ def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadat """ return response, metadata - def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_test_iam_permissions( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.TestIamPermissionsRequest, + Sequence[Tuple[str, Union[str, bytes]]], + ]: """Pre-rpc interceptor for test_iam_permissions Override in a subclass to manipulate the request or metadata @@ -429,7 +518,9 @@ def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsReq """ return request, metadata - def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: + def post_test_iam_permissions( + self, response: iam_policy_pb2.TestIamPermissionsResponse + ) -> iam_policy_pb2.TestIamPermissionsResponse: """Post-rpc interceptor for test_iam_permissions DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` @@ -442,7 +533,14 @@ def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsR """ return response - def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_test_iam_permissions_with_metadata( + self, + response: iam_policy_pb2.TestIamPermissionsResponse, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.TestIamPermissionsResponse, + Sequence[Tuple[str, Union[str, bytes]]], + ]: """Post-rpc interceptor for test_iam_permissions Override in a subclass to read or manipulate the response or metadata after it @@ -457,7 +555,13 @@ def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestI """ return response, metadata - def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_update_data_policy( + self, + request: datapolicy.UpdateDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for update_data_policy Override in a subclass to manipulate the request or metadata @@ -465,7 +569,9 @@ def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, me """ return request, metadata - def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_update_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for update_data_policy DEPRECATED. Please use the `post_update_data_policy_with_metadata` @@ -478,7 +584,11 @@ def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy """ return response - def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_update_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for update_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -514,20 +624,21 @@ class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): It sends JSON representations of protocol buffers over HTTP/1.1 """ - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - client_cert_source_for_mtls: Optional[Callable[[ - ], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - interceptor: Optional[DataPolicyServiceRestInterceptor] = None, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[DataPolicyServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -570,16 +681,19 @@ def __init__(self, *, client_info=client_info, always_use_jwt_access=always_use_jwt_access, url_scheme=url_scheme, - api_audience=api_audience + api_audience=api_audience, ) self._session = AuthorizedSession( - self._credentials, default_host=self.DEFAULT_HOST) + self._credentials, default_host=self.DEFAULT_HOST + ) if client_cert_source_for_mtls: self._session.configure_mtls_channel(client_cert_source_for_mtls) self._interceptor = interceptor or DataPolicyServiceRestInterceptor() self._prep_wrapped_messages(client_info) - class _AddGrantees(_BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub): + class _AddGrantees( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.AddGrantees") @@ -591,27 +705,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.AddGranteesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.AddGranteesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the add grantees method over HTTP. Args: @@ -631,32 +747,44 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + ) request, metadata = self._interceptor.pre_add_grantees(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.AddGrantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "AddGrantees", "httpRequest": http_request, @@ -665,7 +793,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._AddGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._AddGrantees._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -680,20 +816,24 @@ def __call__(self, resp = self._interceptor.post_add_grantees(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_add_grantees_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_add_grantees_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.add_grantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "AddGrantees", "metadata": http_response["headers"], @@ -702,7 +842,10 @@ def __call__(self, ) return resp - class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): + class _CreateDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.CreateDataPolicy") @@ -714,27 +857,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.CreateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.CreateDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the create data policy method over HTTP. Args: @@ -754,32 +899,46 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_create_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_create_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.CreateDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "CreateDataPolicy", "httpRequest": http_request, @@ -788,7 +947,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -803,20 +970,24 @@ def __call__(self, resp = self._interceptor.post_create_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_create_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.create_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "CreateDataPolicy", "metadata": http_response["headers"], @@ -825,7 +996,10 @@ def __call__(self, ) return resp - class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): + class _DeleteDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") @@ -837,26 +1011,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.DeleteDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ): + def __call__( + self, + request: datapolicy.DeleteDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ): r"""Call the delete data policy method over HTTP. Args: @@ -872,30 +1048,42 @@ def __call__(self, be of type `bytes`. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_delete_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.DeleteDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "DeleteDataPolicy", "httpRequest": http_request, @@ -904,14 +1092,24 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. if response.status_code >= 400: raise core_exceptions.from_http_response(response) - class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): + class _GetDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.GetDataPolicy") @@ -923,26 +1121,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.GetDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.GetDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the get data policy method over HTTP. Args: @@ -962,30 +1162,40 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_get_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.GetDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "GetDataPolicy", "httpRequest": http_request, @@ -994,7 +1204,14 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._GetDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1009,20 +1226,24 @@ def __call__(self, resp = self._interceptor.post_get_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_get_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.get_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "GetDataPolicy", "metadata": http_response["headers"], @@ -1031,7 +1252,9 @@ def __call__(self, ) return resp - class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): + class _GetIamPolicy( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.GetIamPolicy") @@ -1043,27 +1266,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.GetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: + def __call__( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Call the get iam policy method over HTTP. Args: @@ -1157,32 +1382,44 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.GetIamPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "GetIamPolicy", "httpRequest": http_request, @@ -1191,7 +1428,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._GetIamPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1206,20 +1451,24 @@ def __call__(self, resp = self._interceptor.post_get_iam_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_get_iam_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.get_iam_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "GetIamPolicy", "metadata": http_response["headers"], @@ -1228,7 +1477,10 @@ def __call__(self, ) return resp - class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): + class _ListDataPolicies( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.ListDataPolicies") @@ -1240,26 +1492,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.ListDataPoliciesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.ListDataPoliciesResponse: + def __call__( + self, + request: datapolicy.ListDataPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.ListDataPoliciesResponse: r"""Call the list data policies method over HTTP. Args: @@ -1281,30 +1535,42 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + ) - request, metadata = self._interceptor.pre_list_data_policies(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_list_data_policies( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.ListDataPolicies", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "ListDataPolicies", "httpRequest": http_request, @@ -1313,7 +1579,14 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._ListDataPolicies._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1328,20 +1601,26 @@ def __call__(self, resp = self._interceptor.post_list_data_policies(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_list_data_policies_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: - response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) + response_payload = datapolicy.ListDataPoliciesResponse.to_json( + response + ) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.list_data_policies", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "ListDataPolicies", "metadata": http_response["headers"], @@ -1350,7 +1629,10 @@ def __call__(self, ) return resp - class _RemoveGrantees(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, DataPolicyServiceRestStub): + class _RemoveGrantees( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.RemoveGrantees") @@ -1362,27 +1644,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.RemoveGranteesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.RemoveGranteesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the remove grantees method over HTTP. Args: @@ -1402,32 +1686,44 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + ) request, metadata = self._interceptor.pre_remove_grantees(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.RemoveGrantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "RemoveGrantees", "httpRequest": http_request, @@ -1436,7 +1732,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._RemoveGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._RemoveGrantees._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1451,20 +1755,24 @@ def __call__(self, resp = self._interceptor.post_remove_grantees(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_remove_grantees_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_remove_grantees_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.remove_grantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "RemoveGrantees", "metadata": http_response["headers"], @@ -1473,7 +1781,9 @@ def __call__(self, ) return resp - class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): + class _SetIamPolicy( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.SetIamPolicy") @@ -1485,27 +1795,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.SetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: + def __call__( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Call the set iam policy method over HTTP. Args: @@ -1599,32 +1911,44 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.SetIamPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "SetIamPolicy", "httpRequest": http_request, @@ -1633,7 +1957,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._SetIamPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1648,20 +1980,24 @@ def __call__(self, resp = self._interceptor.post_set_iam_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_set_iam_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.set_iam_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "SetIamPolicy", "metadata": http_response["headers"], @@ -1670,7 +2006,10 @@ def __call__(self, ) return resp - class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): + class _TestIamPermissions( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.TestIamPermissions") @@ -1682,27 +2021,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.TestIamPermissionsRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + def __call__( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Call the test iam permissions method over HTTP. Args: @@ -1721,32 +2062,46 @@ def __call__(self, Response message for ``TestIamPermissions`` method. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + ) - request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_test_iam_permissions( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.TestIamPermissions", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "TestIamPermissions", "httpRequest": http_request, @@ -1755,7 +2110,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._TestIamPermissions._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1770,20 +2133,24 @@ def __call__(self, resp = self._interceptor.post_test_iam_permissions(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_test_iam_permissions_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.test_iam_permissions", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "TestIamPermissions", "metadata": http_response["headers"], @@ -1792,7 +2159,10 @@ def __call__(self, ) return resp - class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): + class _UpdateDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") @@ -1804,27 +2174,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.UpdateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.UpdateDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the update data policy method over HTTP. Args: @@ -1844,32 +2216,46 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_update_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_update_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.UpdateDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "UpdateDataPolicy", "httpRequest": http_request, @@ -1878,7 +2264,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1893,20 +2287,24 @@ def __call__(self, resp = self._interceptor.post_update_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_update_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2.DataPolicyServiceClient.update_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2.DataPolicyService", "rpcName": "UpdateDataPolicy", "metadata": http_response["headers"], @@ -1916,84 +2314,89 @@ def __call__(self, return resp @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - datapolicy.DataPolicy]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore + return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: + def create_data_policy( + self, + ) -> Callable[[datapolicy.CreateDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], empty_pb2.Empty]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], policy_pb2.Policy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], datapolicy.ListDataPoliciesResponse + ]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore + return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - datapolicy.DataPolicy]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore + return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], policy_pb2.Policy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse, + ]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: + def update_data_policy( + self, + ) -> Callable[[datapolicy.UpdateDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property def kind(self) -> str: @@ -2003,6 +2406,4 @@ def close(self): self._session.close() -__all__=( - 'DataPolicyServiceRestTransport', -) +__all__ = ("DataPolicyServiceRestTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py similarity index 54% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py index a0c18a96c174..38b3159658e0 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/transports/rest_base.py @@ -14,20 +14,18 @@ # limitations under the License. # import json # type: ignore -from google.api_core import path_template -from google.api_core import gapic_v1 - -from google.protobuf import json_format -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO - import re from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union - -from google.cloud.bigquery_datapolicies_v2.types import datapolicy +from google.api_core import gapic_v1, path_template from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import empty_pb2 # type: ignore +from google.protobuf import json_format + +from google.cloud.bigquery_datapolicies_v2.types import datapolicy + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): @@ -43,14 +41,16 @@ class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): It sends JSON representations of protocol buffers over HTTP/1.1 """ - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[Any] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[Any] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: host (Optional[str]): @@ -74,7 +74,9 @@ def __init__(self, *, # Run the base constructor maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) if maybe_url_match is None: - raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER url_match_items = maybe_url_match.groupdict() @@ -85,27 +87,31 @@ def __init__(self, *, credentials=credentials, client_info=client_info, always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience + api_audience=api_audience, ) class _BaseAddGrantees: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees", + "body": "*", + }, ] return http_options @@ -120,17 +126,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -139,20 +151,24 @@ class _BaseCreateDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{parent=projects/*/locations/*}/dataPolicies', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{parent=projects/*/locations/*}/dataPolicies", + "body": "*", + }, ] return http_options @@ -167,17 +183,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -186,19 +208,23 @@ class _BaseDeleteDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'delete', - 'uri': '/v2/{name=projects/*/locations/*/dataPolicies/*}', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v2/{name=projects/*/locations/*/dataPolicies/*}", + }, ] return http_options @@ -210,11 +236,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -223,19 +255,23 @@ class _BaseGetDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v2/{name=projects/*/locations/*/dataPolicies/*}', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v2/{name=projects/*/locations/*/dataPolicies/*}", + }, ] return http_options @@ -247,11 +283,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -260,20 +302,24 @@ class _BaseGetIamPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy", + "body": "*", + }, ] return http_options @@ -288,17 +334,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -307,19 +359,23 @@ class _BaseListDataPolicies: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v2/{parent=projects/*/locations/*}/dataPolicies', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v2/{parent=projects/*/locations/*}/dataPolicies", + }, ] return http_options @@ -331,11 +387,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -344,20 +406,24 @@ class _BaseRemoveGrantees: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees", + "body": "*", + }, ] return http_options @@ -372,17 +438,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -391,20 +463,24 @@ class _BaseSetIamPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy", + "body": "*", + }, ] return http_options @@ -419,17 +495,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -438,20 +520,24 @@ class _BaseTestIamPermissions: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions", + "body": "*", + }, ] return http_options @@ -466,17 +552,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -485,20 +577,24 @@ class _BaseUpdateDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'patch', - 'uri': '/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}', - 'body': 'data_policy', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}", + "body": "data_policy", + }, ] return http_options @@ -513,22 +609,26 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params -__all__=( - '_BaseDataPolicyServiceRestTransport', -) +__all__ = ("_BaseDataPolicyServiceRestTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/__init__.py similarity index 76% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/__init__.py index b090af352c68..3ad48e25ef88 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/__init__.py @@ -27,14 +27,14 @@ ) __all__ = ( - 'AddGranteesRequest', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RemoveGranteesRequest', - 'UpdateDataPolicyRequest', + "AddGranteesRequest", + "CreateDataPolicyRequest", + "DataMaskingPolicy", + "DataPolicy", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "RemoveGranteesRequest", + "UpdateDataPolicyRequest", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py similarity index 95% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py index 8c88d06257e2..cb9a84b9c6f6 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2/types/datapolicy.py @@ -17,24 +17,22 @@ from typing import MutableMapping, MutableSequence -import proto # type: ignore - from google.protobuf import field_mask_pb2 # type: ignore - +import proto # type: ignore __protobuf__ = proto.module( - package='google.cloud.bigquery.datapolicies.v2', + package="google.cloud.bigquery.datapolicies.v2", manifest={ - 'CreateDataPolicyRequest', - 'UpdateDataPolicyRequest', - 'AddGranteesRequest', - 'RemoveGranteesRequest', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'DataPolicy', - 'DataMaskingPolicy', + "CreateDataPolicyRequest", + "UpdateDataPolicyRequest", + "AddGranteesRequest", + "RemoveGranteesRequest", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "DataPolicy", + "DataMaskingPolicy", }, ) @@ -64,10 +62,10 @@ class CreateDataPolicyRequest(proto.Message): proto.STRING, number=2, ) - data_policy: 'DataPolicy' = proto.Field( + data_policy: "DataPolicy" = proto.Field( proto.MESSAGE, number=3, - message='DataPolicy', + message="DataPolicy", ) @@ -96,10 +94,10 @@ class UpdateDataPolicyRequest(proto.Message): update_mask is ignored. """ - data_policy: 'DataPolicy' = proto.Field( + data_policy: "DataPolicy" = proto.Field( proto.MESSAGE, number=1, - message='DataPolicy', + message="DataPolicy", ) update_mask: field_mask_pb2.FieldMask = proto.Field( proto.MESSAGE, @@ -271,10 +269,10 @@ class ListDataPoliciesResponse(proto.Message): def raw_page(self): return self - data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + data_policies: MutableSequence["DataPolicy"] = proto.RepeatedField( proto.MESSAGE, number=1, - message='DataPolicy', + message="DataPolicy", ) next_page_token: str = proto.Field( proto.STRING, @@ -332,6 +330,7 @@ class DataPolicy(proto.Message): Output only. The version of the Data Policy resource. """ + class DataPolicyType(proto.Enum): r"""A list of supported data policy types. @@ -375,11 +374,11 @@ class Version(proto.Enum): V1 = 1 V2 = 2 - data_masking_policy: 'DataMaskingPolicy' = proto.Field( + data_masking_policy: "DataMaskingPolicy" = proto.Field( proto.MESSAGE, number=7, - oneof='policy', - message='DataMaskingPolicy', + oneof="policy", + message="DataMaskingPolicy", ) name: str = proto.Field( proto.STRING, @@ -436,6 +435,7 @@ class DataMaskingPolicy(proto.Message): This field is a member of `oneof`_ ``masking_expression``. """ + class PredefinedExpression(proto.Enum): r"""The available masking rules. Learn more here: https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. @@ -530,13 +530,13 @@ class PredefinedExpression(proto.Enum): predefined_expression: PredefinedExpression = proto.Field( proto.ENUM, number=1, - oneof='masking_expression', + oneof="masking_expression", enum=PredefinedExpression, ) routine: str = proto.Field( proto.STRING, number=2, - oneof='masking_expression', + oneof="masking_expression", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/__init__.py similarity index 55% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/__init__.py index cc6bda214e86..ac6d72158541 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/types/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/__init__.py @@ -13,7 +13,17 @@ # See the License for the specific language governing permissions and # limitations under the License. # -from .datapolicy import ( +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + +__version__ = package_version.__version__ + + +from .services.data_policy_service import ( + DataPolicyServiceAsyncClient, + DataPolicyServiceClient, +) +from .types.datapolicy import ( + AddGranteesRequest, CreateDataPolicyRequest, DataMaskingPolicy, DataPolicy, @@ -21,16 +31,21 @@ GetDataPolicyRequest, ListDataPoliciesRequest, ListDataPoliciesResponse, + RemoveGranteesRequest, UpdateDataPolicyRequest, ) __all__ = ( - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'UpdateDataPolicyRequest', + "DataPolicyServiceAsyncClient", + "AddGranteesRequest", + "CreateDataPolicyRequest", + "DataMaskingPolicy", + "DataPolicy", + "DataPolicyServiceClient", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "RemoveGranteesRequest", + "UpdateDataPolicyRequest", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/gapic_metadata.json diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/gapic_version.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/gapic_version.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/py.typed similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/py.typed rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/py.typed diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py similarity index 91% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py index deca793e77bb..f5b6b6e6da50 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/data_policy_service/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/__init__.py @@ -13,10 +13,10 @@ # See the License for the specific language governing permissions and # limitations under the License. # -from .client import DataPolicyServiceClient from .async_client import DataPolicyServiceAsyncClient +from .client import DataPolicyServiceClient __all__ = ( - 'DataPolicyServiceClient', - 'DataPolicyServiceAsyncClient', + "DataPolicyServiceClient", + "DataPolicyServiceAsyncClient", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py similarity index 83% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py index adb45a8f8b3f..ebf19e4f4619 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/async_client.py @@ -13,44 +13,60 @@ # See the License for the specific language governing permissions and # limitations under the License. # -import logging as std_logging from collections import OrderedDict +import logging as std_logging import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union - -from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version +from typing import ( + Callable, + Dict, + Mapping, + MutableMapping, + MutableSequence, + Optional, + Sequence, + Tuple, + Type, + Union, +) -from google.api_core.client_options import ClientOptions from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore +from google.api_core.client_options import ClientOptions +from google.auth import credentials as ga_credentials # type: ignore +from google.oauth2 import service_account # type: ignore import google.protobuf +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version try: OptionalRetry = Union[retries.AsyncRetry, gapic_v1.method._MethodDefault, None] except AttributeError: # pragma: NO COVER OptionalRetry = Union[retries.AsyncRetry, object, None] # type: ignore -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO -from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport + +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import ( + pagers, +) +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy + from .client import DataPolicyServiceClient +from .transports.base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport +from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False _LOGGER = std_logging.getLogger(__name__) + class DataPolicyServiceAsyncClient: """Data Policy Service provides APIs for managing the BigQuery Data Policy. @@ -66,19 +82,35 @@ class DataPolicyServiceAsyncClient: _DEFAULT_UNIVERSE = DataPolicyServiceClient._DEFAULT_UNIVERSE data_policy_path = staticmethod(DataPolicyServiceClient.data_policy_path) - parse_data_policy_path = staticmethod(DataPolicyServiceClient.parse_data_policy_path) + parse_data_policy_path = staticmethod( + DataPolicyServiceClient.parse_data_policy_path + ) policy_tag_path = staticmethod(DataPolicyServiceClient.policy_tag_path) parse_policy_tag_path = staticmethod(DataPolicyServiceClient.parse_policy_tag_path) - common_billing_account_path = staticmethod(DataPolicyServiceClient.common_billing_account_path) - parse_common_billing_account_path = staticmethod(DataPolicyServiceClient.parse_common_billing_account_path) + common_billing_account_path = staticmethod( + DataPolicyServiceClient.common_billing_account_path + ) + parse_common_billing_account_path = staticmethod( + DataPolicyServiceClient.parse_common_billing_account_path + ) common_folder_path = staticmethod(DataPolicyServiceClient.common_folder_path) - parse_common_folder_path = staticmethod(DataPolicyServiceClient.parse_common_folder_path) - common_organization_path = staticmethod(DataPolicyServiceClient.common_organization_path) - parse_common_organization_path = staticmethod(DataPolicyServiceClient.parse_common_organization_path) + parse_common_folder_path = staticmethod( + DataPolicyServiceClient.parse_common_folder_path + ) + common_organization_path = staticmethod( + DataPolicyServiceClient.common_organization_path + ) + parse_common_organization_path = staticmethod( + DataPolicyServiceClient.parse_common_organization_path + ) common_project_path = staticmethod(DataPolicyServiceClient.common_project_path) - parse_common_project_path = staticmethod(DataPolicyServiceClient.parse_common_project_path) + parse_common_project_path = staticmethod( + DataPolicyServiceClient.parse_common_project_path + ) common_location_path = staticmethod(DataPolicyServiceClient.common_location_path) - parse_common_location_path = staticmethod(DataPolicyServiceClient.parse_common_location_path) + parse_common_location_path = staticmethod( + DataPolicyServiceClient.parse_common_location_path + ) @classmethod def from_service_account_info(cls, info: dict, *args, **kwargs): @@ -114,7 +146,9 @@ def from_service_account_file(cls, filename: str, *args, **kwargs): from_service_account_json = from_service_account_file @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[ClientOptions] = None): + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[ClientOptions] = None + ): """Return the API endpoint and client cert source for mutual TLS. The client cert source is determined in the following order: @@ -177,12 +211,20 @@ def universe_domain(self) -> str: get_transport_class = DataPolicyServiceClient.get_transport_class - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = "grpc_asyncio", - client_options: Optional[ClientOptions] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: + def __init__( + self, + *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[ + Union[ + str, + DataPolicyServiceTransport, + Callable[..., DataPolicyServiceTransport], + ] + ] = "grpc_asyncio", + client_options: Optional[ClientOptions] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: """Instantiates the data policy service async client. Args: @@ -237,33 +279,41 @@ def __init__(self, *, transport=transport, client_options=client_options, client_info=client_info, - ) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ): # pragma: NO COVER _LOGGER.debug( "Created client `google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceAsyncClient`.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", - "universeDomain": getattr(self._client._transport._credentials, "universe_domain", ""), + "universeDomain": getattr( + self._client._transport._credentials, "universe_domain", "" + ), "credentialsType": f"{type(self._client._transport._credentials).__module__}.{type(self._client._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._client._transport, "_credentials") else { + "credentialsInfo": getattr( + self.transport._credentials, "get_cred_info", lambda: None + )(), + } + if hasattr(self._client._transport, "_credentials") + else { "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "credentialsType": None, - } + }, ) - async def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def create_data_policy( + self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Creates a new data policy under a project with the given ``data_policy_id`` (used as the display name), and data policy type. @@ -344,10 +394,14 @@ async def sample_create_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent, data_policy, data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -365,14 +419,14 @@ async def sample_create_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.create_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.create_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -389,15 +443,16 @@ async def sample_create_data_policy(): # Done; return the response. return response - async def add_grantees(self, - request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def add_grantees( + self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Adds new grantees to a data policy. The new grantees will be added to the existing grantees. If the request contains a duplicate grantee, the grantee @@ -476,10 +531,14 @@ async def sample_add_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -495,14 +554,16 @@ async def sample_add_grantees(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.add_grantees] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.add_grantees + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -519,15 +580,16 @@ async def sample_add_grantees(): # Done; return the response. return response - async def remove_grantees(self, - request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def remove_grantees( + self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Removes grantees from a data policy. The grantees will be removed from the existing grantees. If the request contains a grantee that does not exist, @@ -605,10 +667,14 @@ async def sample_remove_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -624,14 +690,16 @@ async def sample_remove_grantees(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.remove_grantees] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.remove_grantees + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -648,15 +716,16 @@ async def sample_remove_grantees(): # Done; return the response. return response - async def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def update_data_policy( + self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Updates the metadata for an existing data policy. The target data policy can be specified by the resource name. @@ -734,10 +803,14 @@ async def sample_update_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -753,14 +826,16 @@ async def sample_update_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.update_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.update_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy.name", request.data_policy.name),) + ), ) # Validate the universe domain. @@ -777,14 +852,15 @@ async def sample_update_data_policy(): # Done; return the response. return response - async def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: + async def delete_data_policy( + self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: r"""Deletes the data policy specified by its resource name. @@ -835,10 +911,14 @@ async def sample_delete_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -852,14 +932,14 @@ async def sample_delete_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.delete_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.delete_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -873,14 +953,15 @@ async def sample_delete_data_policy(): metadata=metadata, ) - async def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + async def get_data_policy( + self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Gets the data policy specified by its resource name. .. code-block:: python @@ -937,10 +1018,14 @@ async def sample_get_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -954,14 +1039,14 @@ async def sample_get_data_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_data_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.get_data_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -978,14 +1063,15 @@ async def sample_get_data_policy(): # Done; return the response. return response - async def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesAsyncPager: + async def list_data_policies( + self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesAsyncPager: r"""List all of the data policies in the specified parent project. @@ -1049,10 +1135,14 @@ async def sample_list_data_policies(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError("If the `request` argument is set, then none of " - "the individual field arguments should be set.") + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1066,14 +1156,14 @@ async def sample_list_data_policies(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.list_data_policies] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.list_data_policies + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -1101,13 +1191,14 @@ async def sample_list_data_policies(): # Done; return the response. return response - async def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + async def get_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Gets the IAM policy for the specified data policy. .. code-block:: python @@ -1183,7 +1274,7 @@ async def sample_get_iam_policy(): """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.GetIamPolicyRequest(**request) @@ -1192,14 +1283,14 @@ async def sample_get_iam_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.get_iam_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.get_iam_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1216,13 +1307,14 @@ async def sample_get_iam_policy(): # Done; return the response. return response - async def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + async def set_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Sets the IAM policy for the specified data policy. .. code-block:: python @@ -1298,7 +1390,7 @@ async def sample_set_iam_policy(): """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.SetIamPolicyRequest(**request) @@ -1307,14 +1399,14 @@ async def sample_set_iam_policy(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.set_iam_policy] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.set_iam_policy + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1331,13 +1423,14 @@ async def sample_set_iam_policy(): # Done; return the response. return response - async def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + async def test_iam_permissions( + self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Returns the caller's permission on the specified data policy resource. @@ -1385,7 +1478,7 @@ async def sample_test_iam_permissions(): Response message for TestIamPermissions method. """ # Create or coerce a protobuf request object. - # - The request isn't a proto-plus wrapped type, + # - The request isn't a proto-plus wrapped type, # so it must be constructed via keyword expansion. if isinstance(request, dict): request = iam_policy_pb2.TestIamPermissionsRequest(**request) @@ -1394,14 +1487,14 @@ async def sample_test_iam_permissions(): # Wrap the RPC method; this adds retry and timeout information, # and friendly error handling. - rpc = self._client._transport._wrapped_methods[self._client._transport.test_iam_permissions] + rpc = self._client._transport._wrapped_methods[ + self._client._transport.test_iam_permissions + ] # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1424,12 +1517,13 @@ async def __aenter__(self) -> "DataPolicyServiceAsyncClient": async def __aexit__(self, exc_type, exc, tb): await self.transport.close() -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) -if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) + +if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ -__all__ = ( - "DataPolicyServiceAsyncClient", -) +__all__ = ("DataPolicyServiceAsyncClient",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py similarity index 82% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py index ba6b7f24524a..74b54699ec24 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/client.py @@ -19,22 +19,34 @@ import logging as std_logging import os import re -from typing import Dict, Callable, Mapping, MutableMapping, MutableSequence, Optional, Sequence, Tuple, Type, Union, cast +from typing import ( + Callable, + Dict, + Mapping, + MutableMapping, + MutableSequence, + Optional, + Sequence, + Tuple, + Type, + Union, + cast, +) import warnings -from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version - from google.api_core import client_options as client_options_lib from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry as retries -from google.auth import credentials as ga_credentials # type: ignore -from google.auth.transport import mtls # type: ignore -from google.auth.transport.grpc import SslCredentials # type: ignore -from google.auth.exceptions import MutualTLSChannelError # type: ignore -from google.oauth2 import service_account # type: ignore +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.exceptions import MutualTLSChannelError # type: ignore +from google.auth.transport import mtls # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.oauth2 import service_account # type: ignore import google.protobuf +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version + try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] except AttributeError: # pragma: NO COVER @@ -42,18 +54,23 @@ try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False _LOGGER = std_logging.getLogger(__name__) -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore -from .transports.base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import ( + pagers, +) +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy + +from .transports.base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport from .transports.grpc import DataPolicyServiceGrpcTransport from .transports.grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport from .transports.rest import DataPolicyServiceRestTransport @@ -66,14 +83,18 @@ class DataPolicyServiceClientMeta(type): support objects (e.g. transport) without polluting the client instance objects. """ - _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] + + _transport_registry = ( + OrderedDict() + ) # type: Dict[str, Type[DataPolicyServiceTransport]] _transport_registry["grpc"] = DataPolicyServiceGrpcTransport _transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport _transport_registry["rest"] = DataPolicyServiceRestTransport - def get_transport_class(cls, - label: Optional[str] = None, - ) -> Type[DataPolicyServiceTransport]: + def get_transport_class( + cls, + label: Optional[str] = None, + ) -> Type[DataPolicyServiceTransport]: """Returns an appropriate transport class. Args: @@ -167,8 +188,7 @@ def from_service_account_file(cls, filename: str, *args, **kwargs): Returns: DataPolicyServiceClient: The constructed client. """ - credentials = service_account.Credentials.from_service_account_file( - filename) + credentials = service_account.Credentials.from_service_account_file(filename) kwargs["credentials"] = credentials return cls(*args, **kwargs) @@ -185,84 +205,134 @@ def transport(self) -> DataPolicyServiceTransport: return self._transport @staticmethod - def data_policy_path(project: str,location: str,data_policy: str,) -> str: + def data_policy_path( + project: str, + location: str, + data_policy: str, + ) -> str: """Returns a fully-qualified data_policy string.""" - return "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + return ( + "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format( + project=project, + location=location, + data_policy=data_policy, + ) + ) @staticmethod - def parse_data_policy_path(path: str) -> Dict[str,str]: + def parse_data_policy_path(path: str) -> Dict[str, str]: """Parses a data_policy path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", path) + m = re.match( + r"^projects/(?P.+?)/locations/(?P.+?)/dataPolicies/(?P.+?)$", + path, + ) return m.groupdict() if m else {} @staticmethod - def policy_tag_path(project: str,location: str,taxonomy: str,policy_tag: str,) -> str: + def policy_tag_path( + project: str, + location: str, + taxonomy: str, + policy_tag: str, + ) -> str: """Returns a fully-qualified policy_tag string.""" - return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) + return "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format( + project=project, + location=location, + taxonomy=taxonomy, + policy_tag=policy_tag, + ) @staticmethod - def parse_policy_tag_path(path: str) -> Dict[str,str]: + def parse_policy_tag_path(path: str) -> Dict[str, str]: """Parses a policy_tag path into its component segments.""" - m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", path) + m = re.match( + r"^projects/(?P.+?)/locations/(?P.+?)/taxonomies/(?P.+?)/policyTags/(?P.+?)$", + path, + ) return m.groupdict() if m else {} @staticmethod - def common_billing_account_path(billing_account: str, ) -> str: + def common_billing_account_path( + billing_account: str, + ) -> str: """Returns a fully-qualified billing_account string.""" - return "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + return "billingAccounts/{billing_account}".format( + billing_account=billing_account, + ) @staticmethod - def parse_common_billing_account_path(path: str) -> Dict[str,str]: + def parse_common_billing_account_path(path: str) -> Dict[str, str]: """Parse a billing_account path into its component segments.""" m = re.match(r"^billingAccounts/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_folder_path(folder: str, ) -> str: + def common_folder_path( + folder: str, + ) -> str: """Returns a fully-qualified folder string.""" - return "folders/{folder}".format(folder=folder, ) + return "folders/{folder}".format( + folder=folder, + ) @staticmethod - def parse_common_folder_path(path: str) -> Dict[str,str]: + def parse_common_folder_path(path: str) -> Dict[str, str]: """Parse a folder path into its component segments.""" m = re.match(r"^folders/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_organization_path(organization: str, ) -> str: + def common_organization_path( + organization: str, + ) -> str: """Returns a fully-qualified organization string.""" - return "organizations/{organization}".format(organization=organization, ) + return "organizations/{organization}".format( + organization=organization, + ) @staticmethod - def parse_common_organization_path(path: str) -> Dict[str,str]: + def parse_common_organization_path(path: str) -> Dict[str, str]: """Parse a organization path into its component segments.""" m = re.match(r"^organizations/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_project_path(project: str, ) -> str: + def common_project_path( + project: str, + ) -> str: """Returns a fully-qualified project string.""" - return "projects/{project}".format(project=project, ) + return "projects/{project}".format( + project=project, + ) @staticmethod - def parse_common_project_path(path: str) -> Dict[str,str]: + def parse_common_project_path(path: str) -> Dict[str, str]: """Parse a project path into its component segments.""" m = re.match(r"^projects/(?P.+?)$", path) return m.groupdict() if m else {} @staticmethod - def common_location_path(project: str, location: str, ) -> str: + def common_location_path( + project: str, + location: str, + ) -> str: """Returns a fully-qualified location string.""" - return "projects/{project}/locations/{location}".format(project=project, location=location, ) + return "projects/{project}/locations/{location}".format( + project=project, + location=location, + ) @staticmethod - def parse_common_location_path(path: str) -> Dict[str,str]: + def parse_common_location_path(path: str) -> Dict[str, str]: """Parse a location path into its component segments.""" m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) return m.groupdict() if m else {} @classmethod - def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_options_lib.ClientOptions] = None): + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[client_options_lib.ClientOptions] = None + ): """Deprecated. Return the API endpoint and client cert source for mutual TLS. The client cert source is determined in the following order: @@ -294,16 +364,22 @@ def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_optio google.auth.exceptions.MutualTLSChannelError: If any errors happen. """ - warnings.warn("get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", - DeprecationWarning) + warnings.warn( + "get_mtls_endpoint_and_cert_source is deprecated. Use the api_endpoint property instead.", + DeprecationWarning, + ) if client_options is None: client_options = client_options_lib.ClientOptions() use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + raise MutualTLSChannelError( + "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Figure out the client cert source to use. client_cert_source = None @@ -316,7 +392,9 @@ def get_mtls_endpoint_and_cert_source(cls, client_options: Optional[client_optio # Figure out which api endpoint to use. if client_options.api_endpoint is not None: api_endpoint = client_options.api_endpoint - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + elif use_mtls_endpoint == "always" or ( + use_mtls_endpoint == "auto" and client_cert_source + ): api_endpoint = cls.DEFAULT_MTLS_ENDPOINT else: api_endpoint = cls.DEFAULT_ENDPOINT @@ -337,13 +415,19 @@ def _read_environment_variables(): google.auth.exceptions.MutualTLSChannelError: If GOOGLE_API_USE_MTLS_ENDPOINT is not any of ["auto", "never", "always"]. """ - use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false").lower() + use_client_cert = os.getenv( + "GOOGLE_API_USE_CLIENT_CERTIFICATE", "false" + ).lower() use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto").lower() universe_domain_env = os.getenv("GOOGLE_CLOUD_UNIVERSE_DOMAIN") if use_client_cert not in ("true", "false"): - raise ValueError("Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`") + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) if use_mtls_endpoint not in ("auto", "never", "always"): - raise MutualTLSChannelError("Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`") + raise MutualTLSChannelError( + "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) return use_client_cert == "true", use_mtls_endpoint, universe_domain_env @staticmethod @@ -366,7 +450,9 @@ def _get_client_cert_source(provided_cert_source, use_cert_flag): return client_cert_source @staticmethod - def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtls_endpoint): + def _get_api_endpoint( + api_override, client_cert_source, universe_domain, use_mtls_endpoint + ): """Return the API endpoint used by the client. Args: @@ -382,17 +468,25 @@ def _get_api_endpoint(api_override, client_cert_source, universe_domain, use_mtl """ if api_override is not None: api_endpoint = api_override - elif use_mtls_endpoint == "always" or (use_mtls_endpoint == "auto" and client_cert_source): + elif use_mtls_endpoint == "always" or ( + use_mtls_endpoint == "auto" and client_cert_source + ): _default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE if universe_domain != _default_universe: - raise MutualTLSChannelError(f"mTLS is not supported in any universe other than {_default_universe}.") + raise MutualTLSChannelError( + f"mTLS is not supported in any universe other than {_default_universe}." + ) api_endpoint = DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT else: - api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=universe_domain) + api_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=universe_domain + ) return api_endpoint @staticmethod - def _get_universe_domain(client_universe_domain: Optional[str], universe_domain_env: Optional[str]) -> str: + def _get_universe_domain( + client_universe_domain: Optional[str], universe_domain_env: Optional[str] + ) -> str: """Return the universe domain used by the client. Args: @@ -428,15 +522,18 @@ def _validate_universe_domain(self): return True def _add_cred_info_for_auth_errors( - self, - error: core_exceptions.GoogleAPICallError + self, error: core_exceptions.GoogleAPICallError ) -> None: """Adds credential info string to error details for 401/403/404 errors. Args: error (google.api_core.exceptions.GoogleAPICallError): The error to add the cred info. """ - if error.code not in [HTTPStatus.UNAUTHORIZED, HTTPStatus.FORBIDDEN, HTTPStatus.NOT_FOUND]: + if error.code not in [ + HTTPStatus.UNAUTHORIZED, + HTTPStatus.FORBIDDEN, + HTTPStatus.NOT_FOUND, + ]: return cred = self._transport._credentials @@ -469,12 +566,20 @@ def universe_domain(self) -> str: """ return self._universe_domain - def __init__(self, *, - credentials: Optional[ga_credentials.Credentials] = None, - transport: Optional[Union[str, DataPolicyServiceTransport, Callable[..., DataPolicyServiceTransport]]] = None, - client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - ) -> None: + def __init__( + self, + *, + credentials: Optional[ga_credentials.Credentials] = None, + transport: Optional[ + Union[ + str, + DataPolicyServiceTransport, + Callable[..., DataPolicyServiceTransport], + ] + ] = None, + client_options: Optional[Union[client_options_lib.ClientOptions, dict]] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + ) -> None: """Instantiates the data policy service client. Args: @@ -529,14 +634,24 @@ def __init__(self, *, self._client_options = client_options_lib.from_dict(self._client_options) if self._client_options is None: self._client_options = client_options_lib.ClientOptions() - self._client_options = cast(client_options_lib.ClientOptions, self._client_options) + self._client_options = cast( + client_options_lib.ClientOptions, self._client_options + ) - universe_domain_opt = getattr(self._client_options, 'universe_domain', None) + universe_domain_opt = getattr(self._client_options, "universe_domain", None) - self._use_client_cert, self._use_mtls_endpoint, self._universe_domain_env = DataPolicyServiceClient._read_environment_variables() - self._client_cert_source = DataPolicyServiceClient._get_client_cert_source(self._client_options.client_cert_source, self._use_client_cert) - self._universe_domain = DataPolicyServiceClient._get_universe_domain(universe_domain_opt, self._universe_domain_env) - self._api_endpoint = None # updated below, depending on `transport` + ( + self._use_client_cert, + self._use_mtls_endpoint, + self._universe_domain_env, + ) = DataPolicyServiceClient._read_environment_variables() + self._client_cert_source = DataPolicyServiceClient._get_client_cert_source( + self._client_options.client_cert_source, self._use_client_cert + ) + self._universe_domain = DataPolicyServiceClient._get_universe_domain( + universe_domain_opt, self._universe_domain_env + ) + self._api_endpoint = None # updated below, depending on `transport` # Initialize the universe domain validation. self._is_universe_domain_valid = False @@ -547,7 +662,9 @@ def __init__(self, *, api_key_value = getattr(self._client_options, "api_key", None) if api_key_value and credentials: - raise ValueError("client_options.api_key and credentials are mutually exclusive") + raise ValueError( + "client_options.api_key and credentials are mutually exclusive" + ) # Save or instantiate the transport. # Ordinarily, we provide the transport, but allowing a custom transport @@ -556,8 +673,10 @@ def __init__(self, *, if transport_provided: # transport is a DataPolicyServiceTransport instance. if credentials or self._client_options.credentials_file or api_key_value: - raise ValueError("When providing a transport instance, " - "provide its credentials directly.") + raise ValueError( + "When providing a transport instance, " + "provide its credentials directly." + ) if self._client_options.scopes: raise ValueError( "When providing a transport instance, provide its scopes " @@ -566,20 +685,30 @@ def __init__(self, *, self._transport = cast(DataPolicyServiceTransport, transport) self._api_endpoint = self._transport.host - self._api_endpoint = (self._api_endpoint or - DataPolicyServiceClient._get_api_endpoint( + self._api_endpoint = ( + self._api_endpoint + or DataPolicyServiceClient._get_api_endpoint( self._client_options.api_endpoint, self._client_cert_source, self._universe_domain, - self._use_mtls_endpoint)) + self._use_mtls_endpoint, + ) + ) if not transport_provided: import google.auth._default # type: ignore - if api_key_value and hasattr(google.auth._default, "get_api_key_credentials"): - credentials = google.auth._default.get_api_key_credentials(api_key_value) + if api_key_value and hasattr( + google.auth._default, "get_api_key_credentials" + ): + credentials = google.auth._default.get_api_key_credentials( + api_key_value + ) - transport_init: Union[Type[DataPolicyServiceTransport], Callable[..., DataPolicyServiceTransport]] = ( + transport_init: Union[ + Type[DataPolicyServiceTransport], + Callable[..., DataPolicyServiceTransport], + ] = ( DataPolicyServiceClient.get_transport_class(transport) if isinstance(transport, str) or transport is None else cast(Callable[..., DataPolicyServiceTransport], transport) @@ -598,30 +727,39 @@ def __init__(self, *, ) if "async" not in str(self._transport): - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG): # pragma: NO COVER + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ): # pragma: NO COVER _LOGGER.debug( "Created client `google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient`.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", - "universeDomain": getattr(self._transport._credentials, "universe_domain", ""), + "universeDomain": getattr( + self._transport._credentials, "universe_domain", "" + ), "credentialsType": f"{type(self._transport._credentials).__module__}.{type(self._transport._credentials).__qualname__}", - "credentialsInfo": getattr(self.transport._credentials, "get_cred_info", lambda: None)(), - } if hasattr(self._transport, "_credentials") else { + "credentialsInfo": getattr( + self.transport._credentials, "get_cred_info", lambda: None + )(), + } + if hasattr(self._transport, "_credentials") + else { "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "credentialsType": None, - } + }, ) - def create_data_policy(self, - request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, - *, - parent: Optional[str] = None, - data_policy: Optional[datapolicy.DataPolicy] = None, - data_policy_id: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def create_data_policy( + self, + request: Optional[Union[datapolicy.CreateDataPolicyRequest, dict]] = None, + *, + parent: Optional[str] = None, + data_policy: Optional[datapolicy.DataPolicy] = None, + data_policy_id: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Creates a new data policy under a project with the given ``data_policy_id`` (used as the display name), and data policy type. @@ -702,10 +840,14 @@ def sample_create_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent, data_policy, data_policy_id] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -727,9 +869,7 @@ def sample_create_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -746,15 +886,16 @@ def sample_create_data_policy(): # Done; return the response. return response - def add_grantees(self, - request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def add_grantees( + self, + request: Optional[Union[datapolicy.AddGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Adds new grantees to a data policy. The new grantees will be added to the existing grantees. If the request contains a duplicate grantee, the grantee @@ -833,10 +974,14 @@ def sample_add_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -856,9 +1001,9 @@ def sample_add_grantees(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -875,15 +1020,16 @@ def sample_add_grantees(): # Done; return the response. return response - def remove_grantees(self, - request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, - *, - data_policy: Optional[str] = None, - grantees: Optional[MutableSequence[str]] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def remove_grantees( + self, + request: Optional[Union[datapolicy.RemoveGranteesRequest, dict]] = None, + *, + data_policy: Optional[str] = None, + grantees: Optional[MutableSequence[str]] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Removes grantees from a data policy. The grantees will be removed from the existing grantees. If the request contains a grantee that does not exist, @@ -961,10 +1107,14 @@ def sample_remove_grantees(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, grantees] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -984,9 +1134,9 @@ def sample_remove_grantees(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy", request.data_policy), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy", request.data_policy),) + ), ) # Validate the universe domain. @@ -1003,15 +1153,16 @@ def sample_remove_grantees(): # Done; return the response. return response - def update_data_policy(self, - request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, - *, - data_policy: Optional[datapolicy.DataPolicy] = None, - update_mask: Optional[field_mask_pb2.FieldMask] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def update_data_policy( + self, + request: Optional[Union[datapolicy.UpdateDataPolicyRequest, dict]] = None, + *, + data_policy: Optional[datapolicy.DataPolicy] = None, + update_mask: Optional[field_mask_pb2.FieldMask] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Updates the metadata for an existing data policy. The target data policy can be specified by the resource name. @@ -1089,10 +1240,14 @@ def sample_update_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [data_policy, update_mask] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1112,9 +1267,9 @@ def sample_update_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("data_policy.name", request.data_policy.name), - )), + gapic_v1.routing_header.to_grpc_metadata( + (("data_policy.name", request.data_policy.name),) + ), ) # Validate the universe domain. @@ -1131,14 +1286,15 @@ def sample_update_data_policy(): # Done; return the response. return response - def delete_data_policy(self, - request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> None: + def delete_data_policy( + self, + request: Optional[Union[datapolicy.DeleteDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> None: r"""Deletes the data policy specified by its resource name. @@ -1189,10 +1345,14 @@ def sample_delete_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1210,9 +1370,7 @@ def sample_delete_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -1226,14 +1384,15 @@ def sample_delete_data_policy(): metadata=metadata, ) - def get_data_policy(self, - request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, - *, - name: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> datapolicy.DataPolicy: + def get_data_policy( + self, + request: Optional[Union[datapolicy.GetDataPolicyRequest, dict]] = None, + *, + name: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Gets the data policy specified by its resource name. .. code-block:: python @@ -1290,10 +1449,14 @@ def sample_get_data_policy(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [name] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1311,9 +1474,7 @@ def sample_get_data_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("name", request.name), - )), + gapic_v1.routing_header.to_grpc_metadata((("name", request.name),)), ) # Validate the universe domain. @@ -1330,14 +1491,15 @@ def sample_get_data_policy(): # Done; return the response. return response - def list_data_policies(self, - request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, - *, - parent: Optional[str] = None, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> pagers.ListDataPoliciesPager: + def list_data_policies( + self, + request: Optional[Union[datapolicy.ListDataPoliciesRequest, dict]] = None, + *, + parent: Optional[str] = None, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> pagers.ListDataPoliciesPager: r"""List all of the data policies in the specified parent project. @@ -1401,10 +1563,14 @@ def sample_list_data_policies(): # - Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. flattened_params = [parent] - has_flattened_params = len([param for param in flattened_params if param is not None]) > 0 + has_flattened_params = ( + len([param for param in flattened_params if param is not None]) > 0 + ) if request is not None and has_flattened_params: - raise ValueError('If the `request` argument is set, then none of ' - 'the individual field arguments should be set.') + raise ValueError( + "If the `request` argument is set, then none of " + "the individual field arguments should be set." + ) # - Use the request object if provided (there's no risk of modifying the input as # there are no flattened fields), or create one. @@ -1422,9 +1588,7 @@ def sample_list_data_policies(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("parent", request.parent), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", request.parent),)), ) # Validate the universe domain. @@ -1452,13 +1616,14 @@ def sample_list_data_policies(): # Done; return the response. return response - def get_iam_policy(self, - request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + def get_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.GetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Gets the IAM policy for the specified data policy. .. code-block:: python @@ -1549,9 +1714,7 @@ def sample_get_iam_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1568,13 +1731,14 @@ def sample_get_iam_policy(): # Done; return the response. return response - def set_iam_policy(self, - request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> policy_pb2.Policy: + def set_iam_policy( + self, + request: Optional[Union[iam_policy_pb2.SetIamPolicyRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Sets the IAM policy for the specified data policy. .. code-block:: python @@ -1665,9 +1829,7 @@ def sample_set_iam_policy(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1684,13 +1846,14 @@ def sample_set_iam_policy(): # Done; return the response. return response - def test_iam_permissions(self, - request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + def test_iam_permissions( + self, + request: Optional[Union[iam_policy_pb2.TestIamPermissionsRequest, dict]] = None, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Returns the caller's permission on the specified data policy resource. @@ -1753,9 +1916,7 @@ def sample_test_iam_permissions(): # Certain fields should be provided within the metadata header; # add these here. metadata = tuple(metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ("resource", request.resource), - )), + gapic_v1.routing_header.to_grpc_metadata((("resource", request.resource),)), ) # Validate the universe domain. @@ -1786,16 +1947,11 @@ def __exit__(self, type, value, traceback): self.transport.close() - - - - - -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ -__all__ = ( - "DataPolicyServiceClient", -) +__all__ = ("DataPolicyServiceClient",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py similarity index 79% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py index 37d84c39fda2..a0bbc3ad8aba 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/pagers.py @@ -13,13 +13,27 @@ # See the License for the specific language governing permissions and # limitations under the License. # +from typing import ( + Any, + AsyncIterator, + Awaitable, + Callable, + Iterator, + Optional, + Sequence, + Tuple, + Union, +) + from google.api_core import gapic_v1 from google.api_core import retry as retries from google.api_core import retry_async as retries_async -from typing import Any, AsyncIterator, Awaitable, Callable, Sequence, Tuple, Optional, Iterator, Union + try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] - OptionalAsyncRetry = Union[retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None] + OptionalAsyncRetry = Union[ + retries_async.AsyncRetry, gapic_v1.method._MethodDefault, None + ] except AttributeError: # pragma: NO COVER OptionalRetry = Union[retries.Retry, object, None] # type: ignore OptionalAsyncRetry = Union[retries_async.AsyncRetry, object, None] # type: ignore @@ -44,14 +58,17 @@ class ListDataPoliciesPager: attributes are available on the pager. If multiple requests are made, only the most recent response is retained, and thus used for attribute lookup. """ - def __init__(self, - method: Callable[..., datapolicy.ListDataPoliciesResponse], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + + def __init__( + self, + method: Callable[..., datapolicy.ListDataPoliciesResponse], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = () + ): """Instantiate the pager. Args: @@ -84,7 +101,12 @@ def pages(self) -> Iterator[datapolicy.ListDataPoliciesResponse]: yield self._response while self._response.next_page_token: self._request.page_token = self._response.next_page_token - self._response = self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + self._response = self._method( + self._request, + retry=self._retry, + timeout=self._timeout, + metadata=self._metadata, + ) yield self._response def __iter__(self) -> Iterator[datapolicy.DataPolicy]: @@ -92,7 +114,7 @@ def __iter__(self) -> Iterator[datapolicy.DataPolicy]: yield from page.data_policies def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + return "{0}<{1!r}>".format(self.__class__.__name__, self._response) class ListDataPoliciesAsyncPager: @@ -112,14 +134,17 @@ class ListDataPoliciesAsyncPager: attributes are available on the pager. If multiple requests are made, only the most recent response is retained, and thus used for attribute lookup. """ - def __init__(self, - method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], - request: datapolicy.ListDataPoliciesRequest, - response: datapolicy.ListDataPoliciesResponse, - *, - retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, - timeout: Union[float, object] = gapic_v1.method.DEFAULT, - metadata: Sequence[Tuple[str, Union[str, bytes]]] = ()): + + def __init__( + self, + method: Callable[..., Awaitable[datapolicy.ListDataPoliciesResponse]], + request: datapolicy.ListDataPoliciesRequest, + response: datapolicy.ListDataPoliciesResponse, + *, + retry: OptionalAsyncRetry = gapic_v1.method.DEFAULT, + timeout: Union[float, object] = gapic_v1.method.DEFAULT, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = () + ): """Instantiates the pager. Args: @@ -152,8 +177,14 @@ async def pages(self) -> AsyncIterator[datapolicy.ListDataPoliciesResponse]: yield self._response while self._response.next_page_token: self._request.page_token = self._response.next_page_token - self._response = await self._method(self._request, retry=self._retry, timeout=self._timeout, metadata=self._metadata) + self._response = await self._method( + self._request, + retry=self._retry, + timeout=self._timeout, + metadata=self._metadata, + ) yield self._response + def __aiter__(self) -> AsyncIterator[datapolicy.DataPolicy]: async def async_generator(): async for page in self.pages: @@ -163,4 +194,4 @@ async def async_generator(): return async_generator() def __repr__(self) -> str: - return '{0}<{1!r}>'.format(self.__class__.__name__, self._response) + return "{0}<{1!r}>".format(self.__class__.__name__, self._response) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1beta1/google/cloud/bigquery_datapolicies_v1beta1/services/data_policy_service/transports/README.rst rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/README.rst diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py similarity index 66% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py index 2c95ef809668..5f4519a975c4 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v1/google/cloud/bigquery_datapolicies_v1/services/data_policy_service/transports/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/__init__.py @@ -19,20 +19,18 @@ from .base import DataPolicyServiceTransport from .grpc import DataPolicyServiceGrpcTransport from .grpc_asyncio import DataPolicyServiceGrpcAsyncIOTransport -from .rest import DataPolicyServiceRestTransport -from .rest import DataPolicyServiceRestInterceptor - +from .rest import DataPolicyServiceRestInterceptor, DataPolicyServiceRestTransport # Compile a registry of transports. _transport_registry = OrderedDict() # type: Dict[str, Type[DataPolicyServiceTransport]] -_transport_registry['grpc'] = DataPolicyServiceGrpcTransport -_transport_registry['grpc_asyncio'] = DataPolicyServiceGrpcAsyncIOTransport -_transport_registry['rest'] = DataPolicyServiceRestTransport +_transport_registry["grpc"] = DataPolicyServiceGrpcTransport +_transport_registry["grpc_asyncio"] = DataPolicyServiceGrpcAsyncIOTransport +_transport_registry["rest"] = DataPolicyServiceRestTransport __all__ = ( - 'DataPolicyServiceTransport', - 'DataPolicyServiceGrpcTransport', - 'DataPolicyServiceGrpcAsyncIOTransport', - 'DataPolicyServiceRestTransport', - 'DataPolicyServiceRestInterceptor', + "DataPolicyServiceTransport", + "DataPolicyServiceGrpcTransport", + "DataPolicyServiceGrpcAsyncIOTransport", + "DataPolicyServiceRestTransport", + "DataPolicyServiceRestInterceptor", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py similarity index 74% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py index 0191e15330e0..153bfa41bacc 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/base.py @@ -16,23 +16,24 @@ import abc from typing import Awaitable, Callable, Dict, Optional, Sequence, Union -from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version - -import google.auth # type: ignore import google.api_core from google.api_core import exceptions as core_exceptions from google.api_core import gapic_v1 from google.api_core import retry as retries +import google.auth # type: ignore from google.auth import credentials as ga_credentials # type: ignore -from google.oauth2 import service_account # type: ignore -import google.protobuf - -from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore +from google.oauth2 import service_account # type: ignore +import google.protobuf from google.protobuf import empty_pb2 # type: ignore -DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo(gapic_version=package_version.__version__) +from google.cloud.bigquery_datapolicies_v2beta1 import gapic_version as package_version +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=package_version.__version__ +) if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO COVER DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__ @@ -42,24 +43,25 @@ class DataPolicyServiceTransport(abc.ABC): """Abstract transport class for DataPolicyService.""" AUTH_SCOPES = ( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", ) - DEFAULT_HOST: str = 'bigquerydatapolicy.googleapis.com' + DEFAULT_HOST: str = "bigquerydatapolicy.googleapis.com" def __init__( - self, *, - host: str = DEFAULT_HOST, - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - **kwargs, - ) -> None: + self, + *, + host: str = DEFAULT_HOST, + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + **kwargs, + ) -> None: """Instantiate the transport. Args: @@ -95,30 +97,38 @@ def __init__( # If no credentials are provided, then determine the appropriate # defaults. if credentials and credentials_file: - raise core_exceptions.DuplicateCredentialArgs("'credentials_file' and 'credentials' are mutually exclusive") + raise core_exceptions.DuplicateCredentialArgs( + "'credentials_file' and 'credentials' are mutually exclusive" + ) if credentials_file is not None: credentials, _ = google.auth.load_credentials_from_file( - credentials_file, - **scopes_kwargs, - quota_project_id=quota_project_id - ) + credentials_file, **scopes_kwargs, quota_project_id=quota_project_id + ) elif credentials is None and not self._ignore_credentials: - credentials, _ = google.auth.default(**scopes_kwargs, quota_project_id=quota_project_id) + credentials, _ = google.auth.default( + **scopes_kwargs, quota_project_id=quota_project_id + ) # Don't apply audience if the credentials file passed from user. if hasattr(credentials, "with_gdch_audience"): - credentials = credentials.with_gdch_audience(api_audience if api_audience else host) + credentials = credentials.with_gdch_audience( + api_audience if api_audience else host + ) # If the credentials are service account credentials, then always try to use self signed JWT. - if always_use_jwt_access and isinstance(credentials, service_account.Credentials) and hasattr(service_account.Credentials, "with_always_use_jwt_access"): + if ( + always_use_jwt_access + and isinstance(credentials, service_account.Credentials) + and hasattr(service_account.Credentials, "with_always_use_jwt_access") + ): credentials = credentials.with_always_use_jwt_access(True) # Save the credentials. self._credentials = credentials # Save the hostname. Default to port 443 (HTTPS) if none is specified. - if ':' not in host: - host += ':443' + if ":" not in host: + host += ":443" self._host = host @property @@ -288,105 +298,111 @@ def _prep_wrapped_messages(self, client_info): default_timeout=64.0, client_info=client_info, ), - } + } def close(self): """Closes resources associated with the transport. - .. warning:: - Only call this method if the transport is NOT shared - with other clients - this may cause errors in other clients! + .. warning:: + Only call this method if the transport is NOT shared + with other clients - this may cause errors in other clients! """ raise NotImplementedError() @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def create_data_policy( + self, + ) -> Callable[ + [datapolicy.CreateDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def add_grantees( + self, + ) -> Callable[ + [datapolicy.AddGranteesRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def remove_grantees( + self, + ) -> Callable[ + [datapolicy.RemoveGranteesRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def update_data_policy( + self, + ) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Union[ - empty_pb2.Empty, - Awaitable[empty_pb2.Empty] - ]]: + def delete_data_policy( + self, + ) -> Callable[ + [datapolicy.DeleteDataPolicyRequest], + Union[empty_pb2.Empty, Awaitable[empty_pb2.Empty]], + ]: raise NotImplementedError() @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Union[ - datapolicy.DataPolicy, - Awaitable[datapolicy.DataPolicy] - ]]: + def get_data_policy( + self, + ) -> Callable[ + [datapolicy.GetDataPolicyRequest], + Union[datapolicy.DataPolicy, Awaitable[datapolicy.DataPolicy]], + ]: raise NotImplementedError() @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Union[ - datapolicy.ListDataPoliciesResponse, - Awaitable[datapolicy.ListDataPoliciesResponse] - ]]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Union[ + datapolicy.ListDataPoliciesResponse, + Awaitable[datapolicy.ListDataPoliciesResponse], + ], + ]: raise NotImplementedError() @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: + def get_iam_policy( + self, + ) -> Callable[ + [iam_policy_pb2.GetIamPolicyRequest], + Union[policy_pb2.Policy, Awaitable[policy_pb2.Policy]], + ]: raise NotImplementedError() @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Union[ - policy_pb2.Policy, - Awaitable[policy_pb2.Policy] - ]]: + def set_iam_policy( + self, + ) -> Callable[ + [iam_policy_pb2.SetIamPolicyRequest], + Union[policy_pb2.Policy, Awaitable[policy_pb2.Policy]], + ]: raise NotImplementedError() @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Union[ - iam_policy_pb2.TestIamPermissionsResponse, - Awaitable[iam_policy_pb2.TestIamPermissionsResponse] - ]]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Union[ + iam_policy_pb2.TestIamPermissionsResponse, + Awaitable[iam_policy_pb2.TestIamPermissionsResponse], + ], + ]: raise NotImplementedError() @property @@ -394,6 +410,4 @@ def kind(self) -> str: raise NotImplementedError() -__all__ = ( - 'DataPolicyServiceTransport', -) +__all__ = ("DataPolicyServiceTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py similarity index 78% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py index 5765b0af6257..0c3835b88d3b 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc.py @@ -16,28 +16,28 @@ import json import logging as std_logging import pickle -import warnings from typing import Callable, Dict, Optional, Sequence, Tuple, Union +import warnings -from google.api_core import grpc_helpers -from google.api_core import gapic_v1 -import google.auth # type: ignore +from google.api_core import gapic_v1, grpc_helpers +import google.auth # type: ignore from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore from google.protobuf.json_format import MessageToJson import google.protobuf.message - import grpc # type: ignore import proto # type: ignore from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -47,7 +47,9 @@ class _LoggingClientInterceptor(grpc.UnaryUnaryClientInterceptor): # pragma: NO COVER def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ) if logging_enabled: # pragma: NO COVER request_metadata = client_call_details.metadata if isinstance(request, proto.Message): @@ -68,7 +70,7 @@ def intercept_unary_unary(self, continuation, client_call_details, request): } _LOGGER.debug( f"Sending request for {client_call_details.method}", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": str(client_call_details.method), "request": grpc_request, @@ -79,7 +81,11 @@ def intercept_unary_unary(self, continuation, client_call_details, request): if logging_enabled: # pragma: NO COVER response_metadata = response.trailing_metadata() # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + metadata = ( + dict([(k, str(v)) for k, v in response_metadata]) + if response_metadata + else None + ) result = response.result() if isinstance(result, proto.Message): response_payload = type(result).to_json(result) @@ -94,7 +100,7 @@ def intercept_unary_unary(self, continuation, client_call_details, request): } _LOGGER.debug( f"Received response for {client_call_details.method}.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": client_call_details.method, "response": grpc_response, @@ -117,23 +123,26 @@ class DataPolicyServiceGrpcTransport(DataPolicyServiceTransport): It sends protocol buffers over the wire using gRPC (which is built on top of HTTP/2); the ``grpcio`` package must be installed. """ + _stubs: Dict[str, Callable] - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[grpc.Channel, Callable[..., grpc.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -255,19 +264,23 @@ def __init__(self, *, ) self._interceptor = _LoggingClientInterceptor() - self._logged_channel = grpc.intercept_channel(self._grpc_channel, self._interceptor) + self._logged_channel = grpc.intercept_channel( + self._grpc_channel, self._interceptor + ) # Wrap messages. This must be done after self._logged_channel exists self._prep_wrapped_messages(client_info) @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> grpc.Channel: + def create_channel( + cls, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs, + ) -> grpc.Channel: """Create and return a gRPC channel object. Args: host (Optional[str]): The host for the channel to use. @@ -302,19 +315,18 @@ def create_channel(cls, default_scopes=cls.AUTH_SCOPES, scopes=scopes, default_host=cls.DEFAULT_HOST, - **kwargs + **kwargs, ) @property def grpc_channel(self) -> grpc.Channel: - """Return the channel designed to connect to this service. - """ + """Return the channel designed to connect to this service.""" return self._grpc_channel @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: + def create_data_policy( + self, + ) -> Callable[[datapolicy.CreateDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the create data policy method over gRPC. Creates a new data policy under a project with the given @@ -331,18 +343,18 @@ def create_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy', + if "create_data_policy" not in self._stubs: + self._stubs["create_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy", request_serializer=datapolicy.CreateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['create_data_policy'] + return self._stubs["create_data_policy"] @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - datapolicy.DataPolicy]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], datapolicy.DataPolicy]: r"""Return a callable for the add grantees method over gRPC. Adds new grantees to a data policy. @@ -361,18 +373,18 @@ def add_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'add_grantees' not in self._stubs: - self._stubs['add_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees', + if "add_grantees" not in self._stubs: + self._stubs["add_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees", request_serializer=datapolicy.AddGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['add_grantees'] + return self._stubs["add_grantees"] @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - datapolicy.DataPolicy]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], datapolicy.DataPolicy]: r"""Return a callable for the remove grantees method over gRPC. Removes grantees from a data policy. @@ -390,18 +402,18 @@ def remove_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'remove_grantees' not in self._stubs: - self._stubs['remove_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees', + if "remove_grantees" not in self._stubs: + self._stubs["remove_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees", request_serializer=datapolicy.RemoveGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['remove_grantees'] + return self._stubs["remove_grantees"] @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: + def update_data_policy( + self, + ) -> Callable[[datapolicy.UpdateDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the update data policy method over gRPC. Updates the metadata for an existing data policy. The @@ -418,18 +430,18 @@ def update_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy', + if "update_data_policy" not in self._stubs: + self._stubs["update_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy", request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['update_data_policy'] + return self._stubs["update_data_policy"] @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], empty_pb2.Empty]: r"""Return a callable for the delete data policy method over gRPC. Deletes the data policy specified by its resource @@ -445,18 +457,18 @@ def delete_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy', + if "delete_data_policy" not in self._stubs: + self._stubs["delete_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy", request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, response_deserializer=empty_pb2.Empty.FromString, ) - return self._stubs['delete_data_policy'] + return self._stubs["delete_data_policy"] @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], datapolicy.DataPolicy]: r"""Return a callable for the get data policy method over gRPC. Gets the data policy specified by its resource name. @@ -471,18 +483,20 @@ def get_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy', + if "get_data_policy" not in self._stubs: + self._stubs["get_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy", request_serializer=datapolicy.GetDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['get_data_policy'] + return self._stubs["get_data_policy"] @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], datapolicy.ListDataPoliciesResponse + ]: r"""Return a callable for the list data policies method over gRPC. List all of the data policies in the specified parent @@ -498,18 +512,18 @@ def list_data_policies(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies', + if "list_data_policies" not in self._stubs: + self._stubs["list_data_policies"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies", request_serializer=datapolicy.ListDataPoliciesRequest.serialize, response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, ) - return self._stubs['list_data_policies'] + return self._stubs["list_data_policies"] @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], policy_pb2.Policy]: r"""Return a callable for the get iam policy method over gRPC. Gets the IAM policy for the specified data policy. @@ -524,18 +538,18 @@ def get_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy', + if "get_iam_policy" not in self._stubs: + self._stubs["get_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy", request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['get_iam_policy'] + return self._stubs["get_iam_policy"] @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], policy_pb2.Policy]: r"""Return a callable for the set iam policy method over gRPC. Sets the IAM policy for the specified data policy. @@ -550,18 +564,21 @@ def set_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy', + if "set_iam_policy" not in self._stubs: + self._stubs["set_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy", request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['set_iam_policy'] + return self._stubs["set_iam_policy"] @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse, + ]: r"""Return a callable for the test iam permissions method over gRPC. Returns the caller's permission on the specified data @@ -577,13 +594,13 @@ def test_iam_permissions(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions', + if "test_iam_permissions" not in self._stubs: + self._stubs["test_iam_permissions"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions", request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, ) - return self._stubs['test_iam_permissions'] + return self._stubs["test_iam_permissions"] def close(self): self._logged_channel.close() @@ -593,6 +610,4 @@ def kind(self) -> str: return "grpc" -__all__ = ( - 'DataPolicyServiceGrpcTransport', -) +__all__ = ("DataPolicyServiceGrpcTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py similarity index 82% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py index 6859c56a7aef..a258f099c6e6 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/grpc_asyncio.py @@ -15,33 +15,33 @@ # import inspect import json -import pickle import logging as std_logging -import warnings +import pickle from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union +import warnings -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers_async from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1, grpc_helpers_async from google.api_core import retry_async as retries -from google.auth import credentials as ga_credentials # type: ignore +from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore from google.protobuf.json_format import MessageToJson import google.protobuf.message - -import grpc # type: ignore -import proto # type: ignore +import grpc # type: ignore from grpc.experimental import aio # type: ignore +import proto # type: ignore from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport from .grpc import DataPolicyServiceGrpcTransport try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -49,9 +49,13 @@ _LOGGER = std_logging.getLogger(__name__) -class _LoggingClientAIOInterceptor(grpc.aio.UnaryUnaryClientInterceptor): # pragma: NO COVER +class _LoggingClientAIOInterceptor( + grpc.aio.UnaryUnaryClientInterceptor +): # pragma: NO COVER async def intercept_unary_unary(self, continuation, client_call_details, request): - logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(std_logging.DEBUG) + logging_enabled = CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + std_logging.DEBUG + ) if logging_enabled: # pragma: NO COVER request_metadata = client_call_details.metadata if isinstance(request, proto.Message): @@ -72,7 +76,7 @@ async def intercept_unary_unary(self, continuation, client_call_details, request } _LOGGER.debug( f"Sending request for {client_call_details.method}", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": str(client_call_details.method), "request": grpc_request, @@ -83,7 +87,11 @@ async def intercept_unary_unary(self, continuation, client_call_details, request if logging_enabled: # pragma: NO COVER response_metadata = await response.trailing_metadata() # Convert gRPC metadata `` to list of tuples - metadata = dict([(k, str(v)) for k, v in response_metadata]) if response_metadata else None + metadata = ( + dict([(k, str(v)) for k, v in response_metadata]) + if response_metadata + else None + ) result = await response if isinstance(result, proto.Message): response_payload = type(result).to_json(result) @@ -98,7 +106,7 @@ async def intercept_unary_unary(self, continuation, client_call_details, request } _LOGGER.debug( f"Received response to rpc {client_call_details.method}.", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": str(client_call_details.method), "response": grpc_response, @@ -126,13 +134,15 @@ class DataPolicyServiceGrpcAsyncIOTransport(DataPolicyServiceTransport): _stubs: Dict[str, Callable] = {} @classmethod - def create_channel(cls, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - quota_project_id: Optional[str] = None, - **kwargs) -> aio.Channel: + def create_channel( + cls, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + quota_project_id: Optional[str] = None, + **kwargs, + ) -> aio.Channel: """Create and return a gRPC AsyncIO channel object. Args: host (Optional[str]): The host for the channel to use. @@ -162,24 +172,26 @@ def create_channel(cls, default_scopes=cls.AUTH_SCOPES, scopes=scopes, default_host=cls.DEFAULT_HOST, - **kwargs + **kwargs, ) - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, - api_mtls_endpoint: Optional[str] = None, - client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, - client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + channel: Optional[Union[aio.Channel, Callable[..., aio.Channel]]] = None, + api_mtls_endpoint: Optional[str] = None, + client_cert_source: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + ssl_channel_credentials: Optional[grpc.ChannelCredentials] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -303,7 +315,9 @@ def __init__(self, *, self._interceptor = _LoggingClientAIOInterceptor() self._grpc_channel._unary_unary_interceptors.append(self._interceptor) self._logged_channel = self._grpc_channel - self._wrap_with_kind = "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + self._wrap_with_kind = ( + "kind" in inspect.signature(gapic_v1.method_async.wrap_method).parameters + ) # Wrap messages. This must be done after self._logged_channel exists self._prep_wrapped_messages(client_info) @@ -318,9 +332,11 @@ def grpc_channel(self) -> aio.Channel: return self._grpc_channel @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def create_data_policy( + self, + ) -> Callable[ + [datapolicy.CreateDataPolicyRequest], Awaitable[datapolicy.DataPolicy] + ]: r"""Return a callable for the create data policy method over gRPC. Creates a new data policy under a project with the given @@ -337,18 +353,18 @@ def create_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'create_data_policy' not in self._stubs: - self._stubs['create_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy', + if "create_data_policy" not in self._stubs: + self._stubs["create_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/CreateDataPolicy", request_serializer=datapolicy.CreateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['create_data_policy'] + return self._stubs["create_data_policy"] @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - Awaitable[datapolicy.DataPolicy]]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the add grantees method over gRPC. Adds new grantees to a data policy. @@ -367,18 +383,18 @@ def add_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'add_grantees' not in self._stubs: - self._stubs['add_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees', + if "add_grantees" not in self._stubs: + self._stubs["add_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/AddGrantees", request_serializer=datapolicy.AddGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['add_grantees'] + return self._stubs["add_grantees"] @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - Awaitable[datapolicy.DataPolicy]]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the remove grantees method over gRPC. Removes grantees from a data policy. @@ -396,18 +412,20 @@ def remove_grantees(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'remove_grantees' not in self._stubs: - self._stubs['remove_grantees'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees', + if "remove_grantees" not in self._stubs: + self._stubs["remove_grantees"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/RemoveGrantees", request_serializer=datapolicy.RemoveGranteesRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['remove_grantees'] + return self._stubs["remove_grantees"] @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def update_data_policy( + self, + ) -> Callable[ + [datapolicy.UpdateDataPolicyRequest], Awaitable[datapolicy.DataPolicy] + ]: r"""Return a callable for the update data policy method over gRPC. Updates the metadata for an existing data policy. The @@ -424,18 +442,18 @@ def update_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'update_data_policy' not in self._stubs: - self._stubs['update_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy', + if "update_data_policy" not in self._stubs: + self._stubs["update_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/UpdateDataPolicy", request_serializer=datapolicy.UpdateDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['update_data_policy'] + return self._stubs["update_data_policy"] @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - Awaitable[empty_pb2.Empty]]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], Awaitable[empty_pb2.Empty]]: r"""Return a callable for the delete data policy method over gRPC. Deletes the data policy specified by its resource @@ -451,18 +469,18 @@ def delete_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'delete_data_policy' not in self._stubs: - self._stubs['delete_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy', + if "delete_data_policy" not in self._stubs: + self._stubs["delete_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/DeleteDataPolicy", request_serializer=datapolicy.DeleteDataPolicyRequest.serialize, response_deserializer=empty_pb2.Empty.FromString, ) - return self._stubs['delete_data_policy'] + return self._stubs["delete_data_policy"] @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - Awaitable[datapolicy.DataPolicy]]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], Awaitable[datapolicy.DataPolicy]]: r"""Return a callable for the get data policy method over gRPC. Gets the data policy specified by its resource name. @@ -477,18 +495,21 @@ def get_data_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_data_policy' not in self._stubs: - self._stubs['get_data_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy', + if "get_data_policy" not in self._stubs: + self._stubs["get_data_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetDataPolicy", request_serializer=datapolicy.GetDataPolicyRequest.serialize, response_deserializer=datapolicy.DataPolicy.deserialize, ) - return self._stubs['get_data_policy'] + return self._stubs["get_data_policy"] @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - Awaitable[datapolicy.ListDataPoliciesResponse]]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], + Awaitable[datapolicy.ListDataPoliciesResponse], + ]: r"""Return a callable for the list data policies method over gRPC. List all of the data policies in the specified parent @@ -504,18 +525,18 @@ def list_data_policies(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'list_data_policies' not in self._stubs: - self._stubs['list_data_policies'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies', + if "list_data_policies" not in self._stubs: + self._stubs["list_data_policies"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/ListDataPolicies", request_serializer=datapolicy.ListDataPoliciesRequest.serialize, response_deserializer=datapolicy.ListDataPoliciesResponse.deserialize, ) - return self._stubs['list_data_policies'] + return self._stubs["list_data_policies"] @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], Awaitable[policy_pb2.Policy]]: r"""Return a callable for the get iam policy method over gRPC. Gets the IAM policy for the specified data policy. @@ -530,18 +551,18 @@ def get_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'get_iam_policy' not in self._stubs: - self._stubs['get_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy', + if "get_iam_policy" not in self._stubs: + self._stubs["get_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/GetIamPolicy", request_serializer=iam_policy_pb2.GetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['get_iam_policy'] + return self._stubs["get_iam_policy"] @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - Awaitable[policy_pb2.Policy]]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], Awaitable[policy_pb2.Policy]]: r"""Return a callable for the set iam policy method over gRPC. Sets the IAM policy for the specified data policy. @@ -556,18 +577,21 @@ def set_iam_policy(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'set_iam_policy' not in self._stubs: - self._stubs['set_iam_policy'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy', + if "set_iam_policy" not in self._stubs: + self._stubs["set_iam_policy"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/SetIamPolicy", request_serializer=iam_policy_pb2.SetIamPolicyRequest.SerializeToString, response_deserializer=policy_pb2.Policy.FromString, ) - return self._stubs['set_iam_policy'] + return self._stubs["set_iam_policy"] @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - Awaitable[iam_policy_pb2.TestIamPermissionsResponse]]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + Awaitable[iam_policy_pb2.TestIamPermissionsResponse], + ]: r"""Return a callable for the test iam permissions method over gRPC. Returns the caller's permission on the specified data @@ -583,16 +607,16 @@ def test_iam_permissions(self) -> Callable[ # the request. # gRPC handles serialization and deserialization, so we just need # to pass in the functions for each. - if 'test_iam_permissions' not in self._stubs: - self._stubs['test_iam_permissions'] = self._logged_channel.unary_unary( - '/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions', + if "test_iam_permissions" not in self._stubs: + self._stubs["test_iam_permissions"] = self._logged_channel.unary_unary( + "/google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService/TestIamPermissions", request_serializer=iam_policy_pb2.TestIamPermissionsRequest.SerializeToString, response_deserializer=iam_policy_pb2.TestIamPermissionsResponse.FromString, ) - return self._stubs['test_iam_permissions'] + return self._stubs["test_iam_permissions"] def _prep_wrapped_messages(self, client_info): - """ Precompute the wrapped methods, overriding the base class method to use async wrappers.""" + """Precompute the wrapped methods, overriding the base class method to use async wrappers.""" self._wrapped_methods = { self.create_data_policy: self._wrap_method( self.create_data_policy, @@ -769,6 +793,4 @@ def kind(self) -> str: return "grpc_asyncio" -__all__ = ( - 'DataPolicyServiceGrpcAsyncIOTransport', -) +__all__ = ("DataPolicyServiceGrpcAsyncIOTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py similarity index 71% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py index 8a958bfae26e..dfd83ea586de 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest.py @@ -13,34 +13,28 @@ # See the License for the specific language governing permissions and # limitations under the License. # -import logging +import dataclasses import json # type: ignore +import logging +from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings -from google.auth.transport.requests import AuthorizedSession # type: ignore -from google.auth import credentials as ga_credentials # type: ignore from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1, rest_helpers, rest_streaming from google.api_core import retry as retries -from google.api_core import rest_helpers -from google.api_core import rest_streaming -from google.api_core import gapic_v1 +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore import google.protobuf - +from google.protobuf import empty_pb2 # type: ignore from google.protobuf import json_format - from requests import __version__ as requests_version -import dataclasses -from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union -import warnings - from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy -from google.iam.v1 import iam_policy_pb2 # type: ignore -from google.iam.v1 import policy_pb2 # type: ignore -from google.protobuf import empty_pb2 # type: ignore - -from .rest_base import _BaseDataPolicyServiceRestTransport from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO +from .rest_base import _BaseDataPolicyServiceRestTransport try: OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault, None] @@ -49,6 +43,7 @@ try: from google.api_core import client_logging # type: ignore + CLIENT_LOGGING_SUPPORTED = True # pragma: NO COVER except ImportError: # pragma: NO COVER CLIENT_LOGGING_SUPPORTED = False @@ -161,7 +156,12 @@ def post_update_data_policy(self, response): """ - def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + + def pre_add_grantees( + self, + request: datapolicy.AddGranteesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.AddGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: """Pre-rpc interceptor for add_grantees Override in a subclass to manipulate the request or metadata @@ -169,7 +169,9 @@ def pre_add_grantees(self, request: datapolicy.AddGranteesRequest, metadata: Seq """ return request, metadata - def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_add_grantees( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for add_grantees DEPRECATED. Please use the `post_add_grantees_with_metadata` @@ -182,7 +184,11 @@ def post_add_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataP """ return response - def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_add_grantees_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for add_grantees Override in a subclass to read or manipulate the response or metadata after it @@ -197,7 +203,13 @@ def post_add_grantees_with_metadata(self, response: datapolicy.DataPolicy, metad """ return response, metadata - def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_create_data_policy( + self, + request: datapolicy.CreateDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.CreateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for create_data_policy Override in a subclass to manipulate the request or metadata @@ -205,7 +217,9 @@ def pre_create_data_policy(self, request: datapolicy.CreateDataPolicyRequest, me """ return request, metadata - def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_create_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for create_data_policy DEPRECATED. Please use the `post_create_data_policy_with_metadata` @@ -218,7 +232,11 @@ def post_create_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy """ return response - def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_create_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for create_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -233,7 +251,13 @@ def post_create_data_policy_with_metadata(self, response: datapolicy.DataPolicy, """ return response, metadata - def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_delete_data_policy( + self, + request: datapolicy.DeleteDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.DeleteDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for delete_data_policy Override in a subclass to manipulate the request or metadata @@ -241,7 +265,13 @@ def pre_delete_data_policy(self, request: datapolicy.DeleteDataPolicyRequest, me """ return request, metadata - def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_get_data_policy( + self, + request: datapolicy.GetDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.GetDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for get_data_policy Override in a subclass to manipulate the request or metadata @@ -249,7 +279,9 @@ def pre_get_data_policy(self, request: datapolicy.GetDataPolicyRequest, metadata """ return request, metadata - def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_get_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for get_data_policy DEPRECATED. Please use the `post_get_data_policy_with_metadata` @@ -262,7 +294,11 @@ def post_get_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.Da """ return response - def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_get_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for get_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -277,7 +313,13 @@ def post_get_data_policy_with_metadata(self, response: datapolicy.DataPolicy, me """ return response, metadata - def pre_get_iam_policy(self, request: iam_policy_pb2.GetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_get_iam_policy( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.GetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for get_iam_policy Override in a subclass to manipulate the request or metadata @@ -298,7 +340,11 @@ def post_get_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: """ return response - def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_get_iam_policy_with_metadata( + self, + response: policy_pb2.Policy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for get_iam_policy Override in a subclass to read or manipulate the response or metadata after it @@ -313,7 +359,13 @@ def post_get_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadat """ return response, metadata - def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_list_data_policies( + self, + request: datapolicy.ListDataPoliciesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.ListDataPoliciesRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for list_data_policies Override in a subclass to manipulate the request or metadata @@ -321,7 +373,9 @@ def pre_list_data_policies(self, request: datapolicy.ListDataPoliciesRequest, me """ return request, metadata - def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) -> datapolicy.ListDataPoliciesResponse: + def post_list_data_policies( + self, response: datapolicy.ListDataPoliciesResponse + ) -> datapolicy.ListDataPoliciesResponse: """Post-rpc interceptor for list_data_policies DEPRECATED. Please use the `post_list_data_policies_with_metadata` @@ -334,7 +388,13 @@ def post_list_data_policies(self, response: datapolicy.ListDataPoliciesResponse) """ return response - def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPoliciesResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_list_data_policies_with_metadata( + self, + response: datapolicy.ListDataPoliciesResponse, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.ListDataPoliciesResponse, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Post-rpc interceptor for list_data_policies Override in a subclass to read or manipulate the response or metadata after it @@ -349,7 +409,13 @@ def post_list_data_policies_with_metadata(self, response: datapolicy.ListDataPol """ return response, metadata - def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_remove_grantees( + self, + request: datapolicy.RemoveGranteesRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.RemoveGranteesRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for remove_grantees Override in a subclass to manipulate the request or metadata @@ -357,7 +423,9 @@ def pre_remove_grantees(self, request: datapolicy.RemoveGranteesRequest, metadat """ return request, metadata - def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_remove_grantees( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for remove_grantees DEPRECATED. Please use the `post_remove_grantees_with_metadata` @@ -370,7 +438,11 @@ def post_remove_grantees(self, response: datapolicy.DataPolicy) -> datapolicy.Da """ return response - def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_remove_grantees_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for remove_grantees Override in a subclass to read or manipulate the response or metadata after it @@ -385,7 +457,13 @@ def post_remove_grantees_with_metadata(self, response: datapolicy.DataPolicy, me """ return response, metadata - def pre_set_iam_policy(self, request: iam_policy_pb2.SetIamPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_set_iam_policy( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.SetIamPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for set_iam_policy Override in a subclass to manipulate the request or metadata @@ -406,7 +484,11 @@ def post_set_iam_policy(self, response: policy_pb2.Policy) -> policy_pb2.Policy: """ return response - def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_set_iam_policy_with_metadata( + self, + response: policy_pb2.Policy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[policy_pb2.Policy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for set_iam_policy Override in a subclass to read or manipulate the response or metadata after it @@ -421,7 +503,14 @@ def post_set_iam_policy_with_metadata(self, response: policy_pb2.Policy, metadat """ return response, metadata - def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_test_iam_permissions( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.TestIamPermissionsRequest, + Sequence[Tuple[str, Union[str, bytes]]], + ]: """Pre-rpc interceptor for test_iam_permissions Override in a subclass to manipulate the request or metadata @@ -429,7 +518,9 @@ def pre_test_iam_permissions(self, request: iam_policy_pb2.TestIamPermissionsReq """ return request, metadata - def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsResponse) -> iam_policy_pb2.TestIamPermissionsResponse: + def post_test_iam_permissions( + self, response: iam_policy_pb2.TestIamPermissionsResponse + ) -> iam_policy_pb2.TestIamPermissionsResponse: """Post-rpc interceptor for test_iam_permissions DEPRECATED. Please use the `post_test_iam_permissions_with_metadata` @@ -442,7 +533,14 @@ def post_test_iam_permissions(self, response: iam_policy_pb2.TestIamPermissionsR """ return response - def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestIamPermissionsResponse, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[iam_policy_pb2.TestIamPermissionsResponse, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_test_iam_permissions_with_metadata( + self, + response: iam_policy_pb2.TestIamPermissionsResponse, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + iam_policy_pb2.TestIamPermissionsResponse, + Sequence[Tuple[str, Union[str, bytes]]], + ]: """Post-rpc interceptor for test_iam_permissions Override in a subclass to read or manipulate the response or metadata after it @@ -457,7 +555,13 @@ def post_test_iam_permissions_with_metadata(self, response: iam_policy_pb2.TestI """ return response, metadata - def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]]]: + def pre_update_data_policy( + self, + request: datapolicy.UpdateDataPolicyRequest, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[ + datapolicy.UpdateDataPolicyRequest, Sequence[Tuple[str, Union[str, bytes]]] + ]: """Pre-rpc interceptor for update_data_policy Override in a subclass to manipulate the request or metadata @@ -465,7 +569,9 @@ def pre_update_data_policy(self, request: datapolicy.UpdateDataPolicyRequest, me """ return request, metadata - def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy.DataPolicy: + def post_update_data_policy( + self, response: datapolicy.DataPolicy + ) -> datapolicy.DataPolicy: """Post-rpc interceptor for update_data_policy DEPRECATED. Please use the `post_update_data_policy_with_metadata` @@ -478,7 +584,11 @@ def post_update_data_policy(self, response: datapolicy.DataPolicy) -> datapolicy """ return response - def post_update_data_policy_with_metadata(self, response: datapolicy.DataPolicy, metadata: Sequence[Tuple[str, Union[str, bytes]]]) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: + def post_update_data_policy_with_metadata( + self, + response: datapolicy.DataPolicy, + metadata: Sequence[Tuple[str, Union[str, bytes]]], + ) -> Tuple[datapolicy.DataPolicy, Sequence[Tuple[str, Union[str, bytes]]]]: """Post-rpc interceptor for update_data_policy Override in a subclass to read or manipulate the response or metadata after it @@ -514,20 +624,21 @@ class DataPolicyServiceRestTransport(_BaseDataPolicyServiceRestTransport): It sends JSON representations of protocol buffers over HTTP/1.1 """ - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[ga_credentials.Credentials] = None, - credentials_file: Optional[str] = None, - scopes: Optional[Sequence[str]] = None, - client_cert_source_for_mtls: Optional[Callable[[ - ], Tuple[bytes, bytes]]] = None, - quota_project_id: Optional[str] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - interceptor: Optional[DataPolicyServiceRestInterceptor] = None, - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[DataPolicyServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: @@ -570,16 +681,19 @@ def __init__(self, *, client_info=client_info, always_use_jwt_access=always_use_jwt_access, url_scheme=url_scheme, - api_audience=api_audience + api_audience=api_audience, ) self._session = AuthorizedSession( - self._credentials, default_host=self.DEFAULT_HOST) + self._credentials, default_host=self.DEFAULT_HOST + ) if client_cert_source_for_mtls: self._session.configure_mtls_channel(client_cert_source_for_mtls) self._interceptor = interceptor or DataPolicyServiceRestInterceptor() self._prep_wrapped_messages(client_info) - class _AddGrantees(_BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub): + class _AddGrantees( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.AddGrantees") @@ -591,27 +705,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.AddGranteesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.AddGranteesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the add grantees method over HTTP. Args: @@ -631,32 +747,44 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_http_options() + ) request, metadata = self._interceptor.pre_add_grantees(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.AddGrantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "AddGrantees", "httpRequest": http_request, @@ -665,7 +793,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._AddGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._AddGrantees._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -680,20 +816,24 @@ def __call__(self, resp = self._interceptor.post_add_grantees(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_add_grantees_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_add_grantees_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.add_grantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "AddGrantees", "metadata": http_response["headers"], @@ -702,7 +842,10 @@ def __call__(self, ) return resp - class _CreateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, DataPolicyServiceRestStub): + class _CreateDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.CreateDataPolicy") @@ -714,27 +857,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.CreateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.CreateDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the create data policy method over HTTP. Args: @@ -754,32 +899,46 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_create_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_create_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.CreateDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "CreateDataPolicy", "httpRequest": http_request, @@ -788,7 +947,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._CreateDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -803,20 +970,24 @@ def __call__(self, resp = self._interceptor.post_create_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_create_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_create_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.create_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "CreateDataPolicy", "metadata": http_response["headers"], @@ -825,7 +996,10 @@ def __call__(self, ) return resp - class _DeleteDataPolicy(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, DataPolicyServiceRestStub): + class _DeleteDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.DeleteDataPolicy") @@ -837,26 +1011,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.DeleteDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ): + def __call__( + self, + request: datapolicy.DeleteDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ): r"""Call the delete data policy method over HTTP. Args: @@ -872,30 +1048,42 @@ def __call__(self, be of type `bytes`. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_delete_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_delete_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.DeleteDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "DeleteDataPolicy", "httpRequest": http_request, @@ -904,14 +1092,24 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._DeleteDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. if response.status_code >= 400: raise core_exceptions.from_http_response(response) - class _GetDataPolicy(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, DataPolicyServiceRestStub): + class _GetDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.GetDataPolicy") @@ -923,26 +1121,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.GetDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.GetDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the get data policy method over HTTP. Args: @@ -962,30 +1162,40 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_get_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.GetDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "GetDataPolicy", "httpRequest": http_request, @@ -994,7 +1204,14 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._GetDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._GetDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1009,20 +1226,24 @@ def __call__(self, resp = self._interceptor.post_get_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_get_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.get_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "GetDataPolicy", "metadata": http_response["headers"], @@ -1031,7 +1252,9 @@ def __call__(self, ) return resp - class _GetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub): + class _GetIamPolicy( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.GetIamPolicy") @@ -1043,27 +1266,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.GetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: + def __call__( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Call the get iam policy method over HTTP. Args: @@ -1157,32 +1382,44 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.GetIamPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "GetIamPolicy", "httpRequest": http_request, @@ -1191,7 +1428,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._GetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._GetIamPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1206,20 +1451,24 @@ def __call__(self, resp = self._interceptor.post_get_iam_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_get_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_get_iam_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.get_iam_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "GetIamPolicy", "metadata": http_response["headers"], @@ -1228,7 +1477,10 @@ def __call__(self, ) return resp - class _ListDataPolicies(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies, DataPolicyServiceRestStub): + class _ListDataPolicies( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.ListDataPolicies") @@ -1240,26 +1492,28 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), - ) + ) return response - def __call__(self, - request: datapolicy.ListDataPoliciesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.ListDataPoliciesResponse: + def __call__( + self, + request: datapolicy.ListDataPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.ListDataPoliciesResponse: r"""Call the list data policies method over HTTP. Args: @@ -1281,30 +1535,42 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_http_options() + ) - request, metadata = self._interceptor.pre_list_data_policies(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_list_data_policies( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_transcoded_request( + http_options, request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.ListDataPolicies", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "ListDataPolicies", "httpRequest": http_request, @@ -1313,7 +1579,14 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._ListDataPolicies._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request) + response = DataPolicyServiceRestTransport._ListDataPolicies._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1328,20 +1601,26 @@ def __call__(self, resp = self._interceptor.post_list_data_policies(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_list_data_policies_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_list_data_policies_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: - response_payload = datapolicy.ListDataPoliciesResponse.to_json(response) + response_payload = datapolicy.ListDataPoliciesResponse.to_json( + response + ) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.list_data_policies", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "ListDataPolicies", "metadata": http_response["headers"], @@ -1350,7 +1629,10 @@ def __call__(self, ) return resp - class _RemoveGrantees(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, DataPolicyServiceRestStub): + class _RemoveGrantees( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.RemoveGrantees") @@ -1362,27 +1644,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.RemoveGranteesRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.RemoveGranteesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the remove grantees method over HTTP. Args: @@ -1402,32 +1686,44 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_http_options() + ) request, metadata = self._interceptor.pre_remove_grantees(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.RemoveGrantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "RemoveGrantees", "httpRequest": http_request, @@ -1436,7 +1732,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._RemoveGrantees._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._RemoveGrantees._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1451,20 +1755,24 @@ def __call__(self, resp = self._interceptor.post_remove_grantees(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_remove_grantees_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_remove_grantees_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.remove_grantees", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "RemoveGrantees", "metadata": http_response["headers"], @@ -1473,7 +1781,9 @@ def __call__(self, ) return resp - class _SetIamPolicy(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub): + class _SetIamPolicy( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy, DataPolicyServiceRestStub + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.SetIamPolicy") @@ -1485,27 +1795,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.SetIamPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> policy_pb2.Policy: + def __call__( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> policy_pb2.Policy: r"""Call the set iam policy method over HTTP. Args: @@ -1599,32 +1911,44 @@ def __call__(self, """ - http_options = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_http_options() + ) request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request(http_options, request) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.SetIamPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "SetIamPolicy", "httpRequest": http_request, @@ -1633,7 +1957,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._SetIamPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._SetIamPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1648,20 +1980,24 @@ def __call__(self, resp = self._interceptor.post_set_iam_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_set_iam_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_set_iam_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.set_iam_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "SetIamPolicy", "metadata": http_response["headers"], @@ -1670,7 +2006,10 @@ def __call__(self, ) return resp - class _TestIamPermissions(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, DataPolicyServiceRestStub): + class _TestIamPermissions( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.TestIamPermissions") @@ -1682,27 +2021,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: iam_policy_pb2.TestIamPermissionsRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> iam_policy_pb2.TestIamPermissionsResponse: + def __call__( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: r"""Call the test iam permissions method over HTTP. Args: @@ -1721,32 +2062,46 @@ def __call__(self, Response message for ``TestIamPermissions`` method. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_http_options() + ) - request, metadata = self._interceptor.pre_test_iam_permissions(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_test_iam_permissions( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = json_format.MessageToJson(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.TestIamPermissions", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "TestIamPermissions", "httpRequest": http_request, @@ -1755,7 +2110,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._TestIamPermissions._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._TestIamPermissions._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1770,20 +2133,24 @@ def __call__(self, resp = self._interceptor.post_test_iam_permissions(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_test_iam_permissions_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_test_iam_permissions_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = json_format.MessageToJson(resp) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.test_iam_permissions", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "TestIamPermissions", "metadata": http_response["headers"], @@ -1792,7 +2159,10 @@ def __call__(self, ) return resp - class _UpdateDataPolicy(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, DataPolicyServiceRestStub): + class _UpdateDataPolicy( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy, + DataPolicyServiceRestStub, + ): def __hash__(self): return hash("DataPolicyServiceRestTransport.UpdateDataPolicy") @@ -1804,27 +2174,29 @@ def _get_response( session, timeout, transcoded_request, - body=None): - - uri = transcoded_request['uri'] - method = transcoded_request['method'] + body=None, + ): + uri = transcoded_request["uri"] + method = transcoded_request["method"] headers = dict(metadata) - headers['Content-Type'] = 'application/json' + headers["Content-Type"] = "application/json" response = getattr(session, method)( "{host}{uri}".format(host=host, uri=uri), timeout=timeout, headers=headers, params=rest_helpers.flatten_query_params(query_params, strict=True), data=body, - ) + ) return response - def __call__(self, - request: datapolicy.UpdateDataPolicyRequest, *, - retry: OptionalRetry=gapic_v1.method.DEFAULT, - timeout: Optional[float]=None, - metadata: Sequence[Tuple[str, Union[str, bytes]]]=(), - ) -> datapolicy.DataPolicy: + def __call__( + self, + request: datapolicy.UpdateDataPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, Union[str, bytes]]] = (), + ) -> datapolicy.DataPolicy: r"""Call the update data policy method over HTTP. Args: @@ -1844,32 +2216,46 @@ def __call__(self, Represents the label-policy binding. """ - http_options = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + http_options = ( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_http_options() + ) - request, metadata = self._interceptor.pre_update_data_policy(request, metadata) - transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request(http_options, request) + request, metadata = self._interceptor.pre_update_data_policy( + request, metadata + ) + transcoded_request = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_transcoded_request( + http_options, request + ) - body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json(transcoded_request) + body = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_request_body_json( + transcoded_request + ) # Jsonify the query params - query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json(transcoded_request) - - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER - request_url = "{host}{uri}".format(host=self._host, uri=transcoded_request['uri']) - method = transcoded_request['method'] + query_params = _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_query_params_json( + transcoded_request + ) + + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER + request_url = "{host}{uri}".format( + host=self._host, uri=transcoded_request["uri"] + ) + method = transcoded_request["method"] try: request_payload = type(request).to_json(request) except: request_payload = None http_request = { - "payload": request_payload, - "requestMethod": method, - "requestUrl": request_url, - "headers": dict(metadata), + "payload": request_payload, + "requestMethod": method, + "requestUrl": request_url, + "headers": dict(metadata), } _LOGGER.debug( f"Sending request for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.UpdateDataPolicy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "UpdateDataPolicy", "httpRequest": http_request, @@ -1878,7 +2264,15 @@ def __call__(self, ) # Send the request - response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response(self._host, metadata, query_params, self._session, timeout, transcoded_request, body) + response = DataPolicyServiceRestTransport._UpdateDataPolicy._get_response( + self._host, + metadata, + query_params, + self._session, + timeout, + transcoded_request, + body, + ) # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception # subclass. @@ -1893,20 +2287,24 @@ def __call__(self, resp = self._interceptor.post_update_data_policy(resp) response_metadata = [(k, str(v)) for k, v in response.headers.items()] - resp, _ = self._interceptor.post_update_data_policy_with_metadata(resp, response_metadata) - if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor(logging.DEBUG): # pragma: NO COVER + resp, _ = self._interceptor.post_update_data_policy_with_metadata( + resp, response_metadata + ) + if CLIENT_LOGGING_SUPPORTED and _LOGGER.isEnabledFor( + logging.DEBUG + ): # pragma: NO COVER try: response_payload = datapolicy.DataPolicy.to_json(response) except: response_payload = None http_response = { - "payload": response_payload, - "headers": dict(response.headers), - "status": response.status_code, + "payload": response_payload, + "headers": dict(response.headers), + "status": response.status_code, } _LOGGER.debug( "Received response for google.cloud.bigquery.datapolicies_v2beta1.DataPolicyServiceClient.update_data_policy", - extra = { + extra={ "serviceName": "google.cloud.bigquery.datapolicies.v2beta1.DataPolicyService", "rpcName": "UpdateDataPolicy", "metadata": http_response["headers"], @@ -1916,84 +2314,89 @@ def __call__(self, return resp @property - def add_grantees(self) -> Callable[ - [datapolicy.AddGranteesRequest], - datapolicy.DataPolicy]: + def add_grantees( + self, + ) -> Callable[[datapolicy.AddGranteesRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore + return self._AddGrantees(self._session, self._host, self._interceptor) # type: ignore @property - def create_data_policy(self) -> Callable[ - [datapolicy.CreateDataPolicyRequest], - datapolicy.DataPolicy]: + def create_data_policy( + self, + ) -> Callable[[datapolicy.CreateDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._CreateDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def delete_data_policy(self) -> Callable[ - [datapolicy.DeleteDataPolicyRequest], - empty_pb2.Empty]: + def delete_data_policy( + self, + ) -> Callable[[datapolicy.DeleteDataPolicyRequest], empty_pb2.Empty]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._DeleteDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def get_data_policy(self) -> Callable[ - [datapolicy.GetDataPolicyRequest], - datapolicy.DataPolicy]: + def get_data_policy( + self, + ) -> Callable[[datapolicy.GetDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._GetDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def get_iam_policy(self) -> Callable[ - [iam_policy_pb2.GetIamPolicyRequest], - policy_pb2.Policy]: + def get_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.GetIamPolicyRequest], policy_pb2.Policy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def list_data_policies(self) -> Callable[ - [datapolicy.ListDataPoliciesRequest], - datapolicy.ListDataPoliciesResponse]: + def list_data_policies( + self, + ) -> Callable[ + [datapolicy.ListDataPoliciesRequest], datapolicy.ListDataPoliciesResponse + ]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore + return self._ListDataPolicies(self._session, self._host, self._interceptor) # type: ignore @property - def remove_grantees(self) -> Callable[ - [datapolicy.RemoveGranteesRequest], - datapolicy.DataPolicy]: + def remove_grantees( + self, + ) -> Callable[[datapolicy.RemoveGranteesRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore + return self._RemoveGrantees(self._session, self._host, self._interceptor) # type: ignore @property - def set_iam_policy(self) -> Callable[ - [iam_policy_pb2.SetIamPolicyRequest], - policy_pb2.Policy]: + def set_iam_policy( + self, + ) -> Callable[[iam_policy_pb2.SetIamPolicyRequest], policy_pb2.Policy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore @property - def test_iam_permissions(self) -> Callable[ - [iam_policy_pb2.TestIamPermissionsRequest], - iam_policy_pb2.TestIamPermissionsResponse]: + def test_iam_permissions( + self, + ) -> Callable[ + [iam_policy_pb2.TestIamPermissionsRequest], + iam_policy_pb2.TestIamPermissionsResponse, + ]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore @property - def update_data_policy(self) -> Callable[ - [datapolicy.UpdateDataPolicyRequest], - datapolicy.DataPolicy]: + def update_data_policy( + self, + ) -> Callable[[datapolicy.UpdateDataPolicyRequest], datapolicy.DataPolicy]: # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. # In C++ this would require a dynamic_cast - return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore + return self._UpdateDataPolicy(self._session, self._host, self._interceptor) # type: ignore @property def kind(self) -> str: @@ -2003,6 +2406,4 @@ def close(self): self._session.close() -__all__=( - 'DataPolicyServiceRestTransport', -) +__all__ = ("DataPolicyServiceRestTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py similarity index 54% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py index c26988f31683..5b2aaa5d5911 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/services/data_policy_service/transports/rest_base.py @@ -14,20 +14,18 @@ # limitations under the License. # import json # type: ignore -from google.api_core import path_template -from google.api_core import gapic_v1 - -from google.protobuf import json_format -from .base import DataPolicyServiceTransport, DEFAULT_CLIENT_INFO - import re from typing import Any, Callable, Dict, List, Optional, Sequence, Tuple, Union - -from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy +from google.api_core import gapic_v1, path_template from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.protobuf import empty_pb2 # type: ignore +from google.protobuf import json_format + +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy + +from .base import DEFAULT_CLIENT_INFO, DataPolicyServiceTransport class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): @@ -43,14 +41,16 @@ class _BaseDataPolicyServiceRestTransport(DataPolicyServiceTransport): It sends JSON representations of protocol buffers over HTTP/1.1 """ - def __init__(self, *, - host: str = 'bigquerydatapolicy.googleapis.com', - credentials: Optional[Any] = None, - client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, - always_use_jwt_access: Optional[bool] = False, - url_scheme: str = 'https', - api_audience: Optional[str] = None, - ) -> None: + def __init__( + self, + *, + host: str = "bigquerydatapolicy.googleapis.com", + credentials: Optional[Any] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + api_audience: Optional[str] = None, + ) -> None: """Instantiate the transport. Args: host (Optional[str]): @@ -74,7 +74,9 @@ def __init__(self, *, # Run the base constructor maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) if maybe_url_match is None: - raise ValueError(f"Unexpected hostname structure: {host}") # pragma: NO COVER + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER url_match_items = maybe_url_match.groupdict() @@ -85,27 +87,31 @@ def __init__(self, *, credentials=credentials, client_info=client_info, always_use_jwt_access=always_use_jwt_access, - api_audience=api_audience + api_audience=api_audience, ) class _BaseAddGrantees: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees", + "body": "*", + }, ] return http_options @@ -120,17 +126,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseAddGrantees._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -139,20 +151,24 @@ class _BaseCreateDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{parent=projects/*/locations/*}/dataPolicies', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{parent=projects/*/locations/*}/dataPolicies", + "body": "*", + }, ] return http_options @@ -167,17 +183,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseCreateDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -186,19 +208,23 @@ class _BaseDeleteDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'delete', - 'uri': '/v2beta1/{name=projects/*/locations/*/dataPolicies/*}', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v2beta1/{name=projects/*/locations/*/dataPolicies/*}", + }, ] return http_options @@ -210,11 +236,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseDeleteDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -223,19 +255,23 @@ class _BaseGetDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v2beta1/{name=projects/*/locations/*/dataPolicies/*}', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v2beta1/{name=projects/*/locations/*/dataPolicies/*}", + }, ] return http_options @@ -247,11 +283,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseGetDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -260,20 +302,24 @@ class _BaseGetIamPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:getIamPolicy", + "body": "*", + }, ] return http_options @@ -288,17 +334,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseGetIamPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -307,19 +359,23 @@ class _BaseListDataPolicies: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'get', - 'uri': '/v2beta1/{parent=projects/*/locations/*}/dataPolicies', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v2beta1/{parent=projects/*/locations/*}/dataPolicies", + }, ] return http_options @@ -331,11 +387,17 @@ def _get_transcoded_request(http_options, request): @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseListDataPolicies._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -344,20 +406,24 @@ class _BaseRemoveGrantees: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees", + "body": "*", + }, ] return http_options @@ -372,17 +438,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseRemoveGrantees._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -391,20 +463,24 @@ class _BaseSetIamPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:setIamPolicy", + "body": "*", + }, ] return http_options @@ -419,17 +495,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseSetIamPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -438,20 +520,24 @@ class _BaseTestIamPermissions: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'post', - 'uri': '/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions', - 'body': '*', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v2beta1/{resource=projects/*/locations/*/dataPolicies/*}:testIamPermissions", + "body": "*", + }, ] return http_options @@ -466,17 +552,23 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseTestIamPermissions._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params @@ -485,20 +577,24 @@ class _BaseUpdateDataPolicy: def __hash__(self): # pragma: NO COVER return NotImplementedError("__hash__ must be implemented.") - __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = { - } + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, Any] = {} @classmethod def _get_unset_required_fields(cls, message_dict): - return {k: v for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() if k not in message_dict} + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } @staticmethod def _get_http_options(): - http_options: List[Dict[str, str]] = [{ - 'method': 'patch', - 'uri': '/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}', - 'body': 'data_policy', - }, + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}", + "body": "data_policy", + }, ] return http_options @@ -513,22 +609,26 @@ def _get_request_body_json(transcoded_request): # Jsonify the request body body = json_format.MessageToJson( - transcoded_request['body'], - use_integers_for_enums=True + transcoded_request["body"], use_integers_for_enums=True ) return body + @staticmethod def _get_query_params_json(transcoded_request): - query_params = json.loads(json_format.MessageToJson( - transcoded_request['query_params'], - use_integers_for_enums=True, - )) - query_params.update(_BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields(query_params)) + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + use_integers_for_enums=True, + ) + ) + query_params.update( + _BaseDataPolicyServiceRestTransport._BaseUpdateDataPolicy._get_unset_required_fields( + query_params + ) + ) query_params["$alt"] = "json;enum-encoding=int" return query_params -__all__=( - '_BaseDataPolicyServiceRestTransport', -) +__all__ = ("_BaseDataPolicyServiceRestTransport",) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py similarity index 76% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py index b090af352c68..3ad48e25ef88 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/__init__.py @@ -27,14 +27,14 @@ ) __all__ = ( - 'AddGranteesRequest', - 'CreateDataPolicyRequest', - 'DataMaskingPolicy', - 'DataPolicy', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'RemoveGranteesRequest', - 'UpdateDataPolicyRequest', + "AddGranteesRequest", + "CreateDataPolicyRequest", + "DataMaskingPolicy", + "DataPolicy", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "RemoveGranteesRequest", + "UpdateDataPolicyRequest", ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py similarity index 94% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py rename to packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py index df5bb545fbdc..8a28774a4a5d 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py +++ b/packages/google-cloud-bigquery-datapolicies/google/cloud/bigquery_datapolicies_v2beta1/types/datapolicy.py @@ -17,24 +17,22 @@ from typing import MutableMapping, MutableSequence -import proto # type: ignore - from google.protobuf import field_mask_pb2 # type: ignore - +import proto # type: ignore __protobuf__ = proto.module( - package='google.cloud.bigquery.datapolicies.v2beta1', + package="google.cloud.bigquery.datapolicies.v2beta1", manifest={ - 'CreateDataPolicyRequest', - 'UpdateDataPolicyRequest', - 'AddGranteesRequest', - 'RemoveGranteesRequest', - 'DeleteDataPolicyRequest', - 'GetDataPolicyRequest', - 'ListDataPoliciesRequest', - 'ListDataPoliciesResponse', - 'DataPolicy', - 'DataMaskingPolicy', + "CreateDataPolicyRequest", + "UpdateDataPolicyRequest", + "AddGranteesRequest", + "RemoveGranteesRequest", + "DeleteDataPolicyRequest", + "GetDataPolicyRequest", + "ListDataPoliciesRequest", + "ListDataPoliciesResponse", + "DataPolicy", + "DataMaskingPolicy", }, ) @@ -64,10 +62,10 @@ class CreateDataPolicyRequest(proto.Message): proto.STRING, number=2, ) - data_policy: 'DataPolicy' = proto.Field( + data_policy: "DataPolicy" = proto.Field( proto.MESSAGE, number=3, - message='DataPolicy', + message="DataPolicy", ) @@ -92,10 +90,10 @@ class UpdateDataPolicyRequest(proto.Message): allowed. """ - data_policy: 'DataPolicy' = proto.Field( + data_policy: "DataPolicy" = proto.Field( proto.MESSAGE, number=1, - message='DataPolicy', + message="DataPolicy", ) update_mask: field_mask_pb2.FieldMask = proto.Field( proto.MESSAGE, @@ -250,10 +248,10 @@ class ListDataPoliciesResponse(proto.Message): def raw_page(self): return self - data_policies: MutableSequence['DataPolicy'] = proto.RepeatedField( + data_policies: MutableSequence["DataPolicy"] = proto.RepeatedField( proto.MESSAGE, number=1, - message='DataPolicy', + message="DataPolicy", ) next_page_token: str = proto.Field( proto.STRING, @@ -311,6 +309,7 @@ class DataPolicy(proto.Message): Output only. The version of the Data Policy resource. """ + class DataPolicyType(proto.Enum): r"""A list of supported data policy types. @@ -347,11 +346,11 @@ class Version(proto.Enum): V1 = 1 V2 = 2 - data_masking_policy: 'DataMaskingPolicy' = proto.Field( + data_masking_policy: "DataMaskingPolicy" = proto.Field( proto.MESSAGE, number=7, - oneof='policy', - message='DataMaskingPolicy', + oneof="policy", + message="DataMaskingPolicy", ) name: str = proto.Field( proto.STRING, @@ -397,6 +396,7 @@ class DataMaskingPolicy(proto.Message): This field is a member of `oneof`_ ``masking_expression``. """ + class PredefinedExpression(proto.Enum): r"""The available masking rules. Learn more here: https://cloud.google.com/bigquery/docs/column-data-masking-intro#masking_options. @@ -441,7 +441,7 @@ class PredefinedExpression(proto.Enum): predefined_expression: PredefinedExpression = proto.Field( proto.ENUM, number=1, - oneof='masking_expression', + oneof="masking_expression", enum=PredefinedExpression, ) diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_add_grantees_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_create_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_delete_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_get_iam_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_list_data_policies_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_remove_grantees_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_set_iam_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_test_iam_permissions_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2_generated_data_policy_service_update_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_add_grantees_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_create_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_delete_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_data_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_get_iam_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_list_data_policies_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_remove_grantees_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_set_iam_policy_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_test_iam_permissions_sync.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_async.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/bigquerydatapolicy_v2beta1_generated_data_policy_service_update_data_policy_sync.py diff --git a/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json index 9ff586bd1dce..8f3adb520dfb 100644 --- a/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json +++ b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1.json @@ -8,7 +8,7 @@ ], "language": "PYTHON", "name": "google-cloud-bigquery-datapolicies", - "version": "0.6.15" + "version": "0.1.0" }, "snippets": [ { diff --git a/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json index f9234d51eea3..f5896d1aac3d 100644 --- a/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json +++ b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v1beta1.json @@ -8,7 +8,7 @@ ], "language": "PYTHON", "name": "google-cloud-bigquery-datapolicies", - "version": "0.6.15" + "version": "0.1.0" }, "snippets": [ { diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2.json diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json b/packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json rename to packages/google-cloud-bigquery-datapolicies/samples/generated_samples/snippet_metadata_google.cloud.bigquery.datapolicies.v2beta1.json diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py b/packages/google-cloud-bigquery-datapolicies/scripts/fixup_bigquery_datapolicies_v2_keywords.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/scripts/fixup_bigquery_datapolicies_v2_keywords.py rename to packages/google-cloud-bigquery-datapolicies/scripts/fixup_bigquery_datapolicies_v2_keywords.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py b/packages/google-cloud-bigquery-datapolicies/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py rename to packages/google-cloud-bigquery-datapolicies/scripts/fixup_bigquery_datapolicies_v2beta1_keywords.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/google/cloud/bigquery_datapolicies_v2/services/__init__.py rename to packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2/__init__.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py similarity index 68% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py rename to packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py index 5370751479c3..2d120904bd64 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py +++ b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2/test_data_policy_service.py @@ -14,6 +14,7 @@ # limitations under the License. # import os + # try/except added for compatibility with python < 3.8 try: from unittest import mock @@ -21,50 +22,48 @@ except ImportError: # pragma: NO COVER import mock -import grpc -from grpc.experimental import aio -from collections.abc import Iterable, AsyncIterable -from google.protobuf import json_format +from collections.abc import AsyncIterable, Iterable import json import math -import pytest + from google.api_core import api_core_version -from proto.marshal.rules.dates import DurationRule, TimestampRule +from google.protobuf import json_format +import grpc +from grpc.experimental import aio from proto.marshal.rules import wrappers -from requests import Response -from requests import Request, PreparedRequest +from proto.marshal.rules.dates import DurationRule, TimestampRule +import pytest +from requests import PreparedRequest, Request, Response from requests.sessions import Session -from google.protobuf import json_format try: from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True -except ImportError: # pragma: NO COVER +except ImportError: # pragma: NO COVER HAS_GOOGLE_AUTH_AIO = False +from google.api_core import gapic_v1, grpc_helpers, grpc_helpers_async, path_template from google.api_core import client_options from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers -from google.api_core import grpc_helpers_async -from google.api_core import path_template from google.api_core import retry as retries +import google.auth from google.auth import credentials as ga_credentials from google.auth.exceptions import MutualTLSChannelError -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import DataPolicyServiceAsyncClient -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import transports -from google.cloud.bigquery_datapolicies_v2.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import options_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.oauth2 import service_account from google.protobuf import field_mask_pb2 # type: ignore from google.type import expr_pb2 # type: ignore -import google.auth - +from google.cloud.bigquery_datapolicies_v2.services.data_policy_service import ( + DataPolicyServiceAsyncClient, + DataPolicyServiceClient, + pagers, + transports, +) +from google.cloud.bigquery_datapolicies_v2.types import datapolicy CRED_INFO_JSON = { "credential_source": "/path/to/file", @@ -79,9 +78,11 @@ async def mock_async_gen(data, chunk_size=1): chunk = data[i : i + chunk_size] yield chunk.encode("utf-8") + def client_cert_source_callback(): return b"cert bytes", b"key bytes" + # TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. # See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. def async_anonymous_credentials(): @@ -89,17 +90,27 @@ def async_anonymous_credentials(): return ga_credentials_async.AnonymousCredentials() return ga_credentials.AnonymousCredentials() + # If default endpoint is localhost, then default mtls endpoint will be the same. # This method modifies the default endpoint so the client can produce a different # mtls endpoint for endpoint testing purposes. def modify_default_endpoint(client): - return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + return ( + "foo.googleapis.com" + if ("localhost" in client.DEFAULT_ENDPOINT) + else client.DEFAULT_ENDPOINT + ) + # If default endpoint template is localhost, then default mtls endpoint will be the same. # This method modifies the default endpoint template so the client can produce a different # mtls endpoint for endpoint testing purposes. def modify_default_endpoint_template(client): - return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + return ( + "test.{UNIVERSE_DOMAIN}" + if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) + else client._DEFAULT_ENDPOINT_TEMPLATE + ) def test__get_default_mtls_endpoint(): @@ -110,101 +121,237 @@ def test__get_default_mtls_endpoint(): non_googleapi = "api.example.com" assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) + == api_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) + == api_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) + == sandbox_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) + == sandbox_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) + == non_googleapi + ) + def test__read_environment_variables(): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + True, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "never", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "always", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): with pytest.raises(MutualTLSChannelError) as excinfo: DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + "foo.com", + ) + def test__get_client_cert_source(): mock_provided_cert_source = mock.Mock() mock_default_cert_source = mock.Mock() assert DataPolicyServiceClient._get_client_cert_source(None, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + assert ( + DataPolicyServiceClient._get_client_cert_source( + mock_provided_cert_source, False + ) + is None + ) + assert ( + DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) + == mock_provided_cert_source + ) + + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", return_value=True + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=mock_default_cert_source, + ): + assert ( + DataPolicyServiceClient._get_client_cert_source(None, True) + is mock_default_cert_source + ) + assert ( + DataPolicyServiceClient._get_client_cert_source( + mock_provided_cert_source, "true" + ) + is mock_provided_cert_source + ) - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): - assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) def test__get_api_endpoint(): api_override = "foo.com" mock_client_cert_source = mock.Mock() default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=default_universe + ) mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=mock_universe + ) - assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + assert ( + DataPolicyServiceClient._get_api_endpoint( + api_override, mock_client_cert_source, default_universe, "always" + ) + == api_override + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, default_universe, "auto" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") + == default_endpoint + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, None, default_universe, "always" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, default_universe, "always" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") + == mock_endpoint + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") + == default_endpoint + ) with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") - assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, mock_universe, "auto" + ) + assert ( + str(excinfo.value) + == "mTLS is not supported in any universe other than googleapis.com." + ) def test__get_universe_domain(): client_universe_domain = "foo.com" universe_domain_env = "bar.com" - assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain - assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env - assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + assert ( + DataPolicyServiceClient._get_universe_domain( + client_universe_domain, universe_domain_env + ) + == client_universe_domain + ) + assert ( + DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) + == universe_domain_env + ) + assert ( + DataPolicyServiceClient._get_universe_domain(None, None) + == DataPolicyServiceClient._DEFAULT_UNIVERSE + ) with pytest.raises(ValueError) as excinfo: DataPolicyServiceClient._get_universe_domain("", None) assert str(excinfo.value) == "Universe Domain cannot be an empty string." -@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ - (401, CRED_INFO_JSON, True), - (403, CRED_INFO_JSON, True), - (404, CRED_INFO_JSON, True), - (500, CRED_INFO_JSON, False), - (401, None, False), - (403, None, False), - (404, None, False), - (500, None, False) -]) + +@pytest.mark.parametrize( + "error_code,cred_info_json,show_cred_info", + [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False), + ], +) def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): cred = mock.Mock(["get_cred_info"]) cred.get_cred_info = mock.Mock(return_value=cred_info_json) @@ -220,7 +367,8 @@ def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_in else: assert error.details == ["foo"] -@pytest.mark.parametrize("error_code", [401,403,404,500]) + +@pytest.mark.parametrize("error_code", [401, 403, 404, 500]) def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): cred = mock.Mock([]) assert not hasattr(cred, "get_cred_info") @@ -233,14 +381,22 @@ def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): client._add_cred_info_for_auth_errors(error) assert error.details == [] -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + +@pytest.mark.parametrize( + "client_class,transport_name", + [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), + ], +) +def test_data_policy_service_client_from_service_account_info( + client_class, transport_name +): creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + with mock.patch.object( + service_account.Credentials, "from_service_account_info" + ) as factory: factory.return_value = creds info = {"valid": True} client = client_class.from_service_account_info(info, transport=transport_name) @@ -248,52 +404,70 @@ def test_data_policy_service_client_from_service_account_info(client_class, tran assert isinstance(client, client_class) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) -@pytest.mark.parametrize("transport_class,transport_name", [ - (transports.DataPolicyServiceGrpcTransport, "grpc"), - (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: +@pytest.mark.parametrize( + "transport_class,transport_name", + [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.DataPolicyServiceRestTransport, "rest"), + ], +) +def test_data_policy_service_client_service_account_always_use_jwt( + transport_class, transport_name +): + with mock.patch.object( + service_account.Credentials, "with_always_use_jwt_access", create=True + ) as use_jwt: creds = service_account.Credentials(None, None, None) transport = transport_class(credentials=creds, always_use_jwt_access=True) use_jwt.assert_called_once_with(True) - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + with mock.patch.object( + service_account.Credentials, "with_always_use_jwt_access", create=True + ) as use_jwt: creds = service_account.Credentials(None, None, None) transport = transport_class(credentials=creds, always_use_jwt_access=False) use_jwt.assert_not_called() -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_file(client_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_name", + [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), + ], +) +def test_data_policy_service_client_from_service_account_file( + client_class, transport_name +): creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + with mock.patch.object( + service_account.Credentials, "from_service_account_file" + ) as factory: factory.return_value = creds - client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + client = client_class.from_service_account_file( + "dummy/file/path.json", transport=transport_name + ) assert client.transport._credentials == creds assert isinstance(client, client_class) - client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + client = client_class.from_service_account_json( + "dummy/file/path.json", transport=transport_name + ) assert client.transport._credentials == creds assert isinstance(client, client_class) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) @@ -309,30 +483,45 @@ def test_data_policy_service_client_get_transport_class(): assert transport == transports.DataPolicyServiceGrpcTransport -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + ), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), + ], +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) +def test_data_policy_service_client_client_options( + client_class, transport_class, transport_name +): # Check that if channel is provided we won't create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials() - ) + with mock.patch.object(DataPolicyServiceClient, "get_transport_class") as gtc: + transport = transport_class(credentials=ga_credentials.AnonymousCredentials()) client = client_class(transport=transport) gtc.assert_not_called() # Check that if channel is provided via str we will create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + with mock.patch.object(DataPolicyServiceClient, "get_transport_class") as gtc: client = client_class(transport=transport_name) gtc.assert_called() # Check the case api_endpoint is provided. options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name, client_options=options) patched.assert_called_once_with( @@ -350,13 +539,15 @@ def test_data_policy_service_client_client_options(client_class, transport_class # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is # "never". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -368,7 +559,7 @@ def test_data_policy_service_client_client_options(client_class, transport_class # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is # "always". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( @@ -388,23 +579,33 @@ def test_data_policy_service_client_client_options(client_class, transport_class with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): with pytest.raises(MutualTLSChannelError) as excinfo: client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) # Check the case quota_project_id is provided options = client_options.ClientOptions(quota_project_id="octopus") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id="octopus", @@ -413,48 +614,102 @@ def test_data_policy_service_client_client_options(client_class, transport_class api_audience=None, ) # Check the case api_endpoint is provided - options = client_options.ClientOptions(api_audience="https://language.googleapis.com") - with mock.patch.object(transport_class, '__init__') as patched: + options = client_options.ClientOptions( + api_audience="https://language.googleapis.com" + ) + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, client_info=transports.base.DEFAULT_CLIENT_INFO, always_use_jwt_access=True, - api_audience="https://language.googleapis.com" - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) + api_audience="https://language.googleapis.com", + ) + + +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,use_client_cert_env", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + "true", + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + "true", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + "false", + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + "false", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + "true", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + "false", + ), + ], +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) @mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) -def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): +def test_data_policy_service_client_mtls_env_auto( + client_class, transport_class, transport_name, use_client_cert_env +): # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. # Check the case client_cert_source is provided. Whether client cert is used depends on # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + options = client_options.ClientOptions( + client_cert_source=client_cert_source_callback + ) + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) if use_client_cert_env == "false": expected_client_cert_source = None - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ) else: expected_client_cert_source = client_cert_source_callback expected_host = client.DEFAULT_MTLS_ENDPOINT @@ -473,12 +728,22 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, # Check the case ADC client cert is provided. Whether client cert is used depends on # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + with mock.patch.object(transport_class, "__init__") as patched: + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=True, + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=client_cert_source_callback, + ): if use_client_cert_env == "false": - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ) expected_client_cert_source = None else: expected_host = client.DEFAULT_MTLS_ENDPOINT @@ -499,15 +764,22 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, ) # Check the case client_cert_source and ADC client cert are not provided. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + with mock.patch.object(transport_class, "__init__") as patched: + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=False, + ): patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -517,19 +789,31 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, ) -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +@pytest.mark.parametrize( + "client_class", [DataPolicyServiceClient, DataPolicyServiceAsyncClient] +) +@mock.patch.object( + DataPolicyServiceClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(DataPolicyServiceAsyncClient), +) def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): mock_client_cert_source = mock.Mock() # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) assert api_endpoint == mock_api_endpoint assert cert_source == mock_client_cert_source @@ -537,8 +821,12 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): mock_client_cert_source = mock.Mock() mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) assert api_endpoint == mock_api_endpoint assert cert_source is None @@ -556,16 +844,28 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=False, + ): api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() assert api_endpoint == client_class.DEFAULT_ENDPOINT assert cert_source is None # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=True, + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=mock_client_cert_source, + ): + ( + api_endpoint, + cert_source, + ) = client_class.get_mtls_endpoint_and_cert_source() assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT assert cert_source == mock_client_cert_source @@ -575,34 +875,62 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla with pytest.raises(MutualTLSChannelError) as excinfo: client_class.get_mtls_endpoint_and_cert_source() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: client_class.get_mtls_endpoint_and_cert_source() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) + -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@pytest.mark.parametrize( + "client_class", [DataPolicyServiceClient, DataPolicyServiceAsyncClient] +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) def test_data_policy_service_client_client_api_endpoint(client_class): mock_client_cert_source = client_cert_source_callback api_override = "foo.com" default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=default_universe + ) mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=mock_universe + ) # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", # use ClientOptions.api_endpoint as the api endpoint regardless. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ): + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=api_override + ) + client = client_class( + client_options=options, + credentials=ga_credentials.AnonymousCredentials(), + ) assert client.api_endpoint == api_override # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", @@ -625,11 +953,19 @@ def test_data_policy_service_client_client_api_endpoint(client_class): universe_exists = hasattr(options, "universe_domain") if universe_exists: options = client_options.ClientOptions(universe_domain=mock_universe) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) else: - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) - assert client.universe_domain == (mock_universe if universe_exists else default_universe) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + assert client.api_endpoint == ( + mock_endpoint if universe_exists else default_endpoint + ) + assert client.universe_domain == ( + mock_universe if universe_exists else default_universe + ) # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. @@ -637,27 +973,40 @@ def test_data_policy_service_client_client_api_endpoint(client_class): if hasattr(options, "universe_domain"): delattr(options, "universe_domain") with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) assert client.api_endpoint == default_endpoint -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + ), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), + ], +) +def test_data_policy_service_client_client_options_scopes( + client_class, transport_class, transport_name +): # Check the case scopes are provided. options = client_options.ClientOptions( scopes=["1", "2"], ) - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=["1", "2"], client_cert_source_for_mtls=None, quota_project_id=None, @@ -666,24 +1015,45 @@ def test_data_policy_service_client_client_options_scopes(client_class, transpor api_audience=None, ) -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), -]) -def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + None, + ), + ], +) +def test_data_policy_service_client_client_options_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) + options = client_options.ClientOptions(credentials_file="credentials.json") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -692,11 +1062,14 @@ def test_data_policy_service_client_client_options_credentials_file(client_class api_audience=None, ) + def test_data_policy_service_client_client_options_from_dict(): - with mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + with mock.patch( + "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__" + ) as grpc_transport: grpc_transport.return_value = None client = DataPolicyServiceClient( - client_options={'api_endpoint': 'squid.clam.whelk'} + client_options={"api_endpoint": "squid.clam.whelk"} ) grpc_transport.assert_called_once_with( credentials=None, @@ -711,23 +1084,38 @@ def test_data_policy_service_client_client_options_from_dict(): ) -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), -]) -def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ], +) +def test_data_policy_service_client_create_channel_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) + options = client_options.ClientOptions(credentials_file="credentials.json") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -755,9 +1143,9 @@ def test_data_policy_service_client_create_channel_credentials_file(client_class credentials_file=None, quota_project_id=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), scopes=None, default_host="bigquerydatapolicy.googleapis.com", ssl_credentials=None, @@ -768,11 +1156,14 @@ def test_data_policy_service_client_create_channel_credentials_file(client_class ) -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) -def test_create_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.CreateDataPolicyRequest, + dict, + ], +) +def test_create_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -784,16 +1175,16 @@ def test_create_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.create_data_policy(request) @@ -806,12 +1197,15 @@ def test_create_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -820,30 +1214,33 @@ def test_create_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.CreateDataPolicyRequest( - parent='parent_value', - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy_id="data_policy_id_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.create_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.create_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.CreateDataPolicyRequest( - parent='parent_value', - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy_id="data_policy_id_value", ) + def test_create_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -858,12 +1255,18 @@ def test_create_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods + assert ( + client._transport.create_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.create_data_policy + ] = mock_rpc request = {} client.create_data_policy(request) @@ -876,8 +1279,11 @@ def test_create_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_create_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -891,12 +1297,17 @@ async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.create_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.create_data_policy + ] = mock_rpc request = {} await client.create_data_policy(request) @@ -910,8 +1321,11 @@ async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): +async def test_create_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.CreateDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -923,18 +1337,20 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.create_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -945,12 +1361,15 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -958,6 +1377,7 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request async def test_create_data_policy_async_from_dict(): await test_create_data_policy_async(request_type=dict) + def test_create_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -967,12 +1387,12 @@ def test_create_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.CreateDataPolicyRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.create_data_policy(request) @@ -984,9 +1404,9 @@ def test_create_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -999,13 +1419,15 @@ async def test_create_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.CreateDataPolicyRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + type(client.transport.create_data_policy), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.create_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -1016,9 +1438,9 @@ async def test_create_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] def test_create_data_policy_flattened(): @@ -1028,16 +1450,20 @@ def test_create_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) # Establish that the underlying call was made with the expected @@ -1045,13 +1471,17 @@ def test_create_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].data_policy_id - mock_val = 'data_policy_id_value' + mock_val = "data_policy_id_value" assert arg == mock_val @@ -1065,11 +1495,16 @@ def test_create_data_policy_flattened_error(): with pytest.raises(ValueError): client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) + @pytest.mark.asyncio async def test_create_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1078,18 +1513,24 @@ async def test_create_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) # Establish that the underlying call was made with the expected @@ -1097,15 +1538,20 @@ async def test_create_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].data_policy_id - mock_val = 'data_policy_id_value' + mock_val = "data_policy_id_value" assert arg == mock_val + @pytest.mark.asyncio async def test_create_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1117,17 +1563,24 @@ async def test_create_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.AddGranteesRequest, - dict, -]) -def test_add_grantees(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.AddGranteesRequest, + dict, + ], +) +def test_add_grantees(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1138,17 +1591,15 @@ def test_add_grantees(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.add_grantees(request) @@ -1161,12 +1612,15 @@ def test_add_grantees(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1175,28 +1629,29 @@ def test_add_grantees_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.AddGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.add_grantees(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.AddGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) + def test_add_grantees_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -1215,7 +1670,9 @@ def test_add_grantees_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc request = {} client.add_grantees(request) @@ -1229,8 +1686,11 @@ def test_add_grantees_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_add_grantees_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1244,12 +1704,17 @@ async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_ wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.add_grantees in client._client._transport._wrapped_methods + assert ( + client._client._transport.add_grantees + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.add_grantees] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.add_grantees + ] = mock_rpc request = {} await client.add_grantees(request) @@ -1263,8 +1728,11 @@ async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_ assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.AddGranteesRequest): +async def test_add_grantees_async( + transport: str = "grpc_asyncio", request_type=datapolicy.AddGranteesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1275,19 +1743,19 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.add_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1298,12 +1766,15 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1311,6 +1782,7 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= async def test_add_grantees_async_from_dict(): await test_add_grantees_async(request_type=dict) + def test_add_grantees_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -1320,12 +1792,10 @@ def test_add_grantees_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.AddGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.add_grantees(request) @@ -1337,9 +1807,9 @@ def test_add_grantees_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -1352,13 +1822,13 @@ async def test_add_grantees_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.AddGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.add_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1369,9 +1839,9 @@ async def test_add_grantees_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] def test_add_grantees_flattened(): @@ -1380,16 +1850,14 @@ def test_add_grantees_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.add_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1397,10 +1865,10 @@ def test_add_grantees_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val @@ -1414,10 +1882,11 @@ def test_add_grantees_flattened_error(): with pytest.raises(ValueError): client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) + @pytest.mark.asyncio async def test_add_grantees_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1425,18 +1894,18 @@ async def test_add_grantees_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.add_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1444,12 +1913,13 @@ async def test_add_grantees_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val + @pytest.mark.asyncio async def test_add_grantees_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1461,16 +1931,19 @@ async def test_add_grantees_flattened_error_async(): with pytest.raises(ValueError): await client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) -@pytest.mark.parametrize("request_type", [ - datapolicy.RemoveGranteesRequest, - dict, -]) -def test_remove_grantees(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.RemoveGranteesRequest, + dict, + ], +) +def test_remove_grantees(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1481,17 +1954,15 @@ def test_remove_grantees(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.remove_grantees(request) @@ -1504,12 +1975,15 @@ def test_remove_grantees(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1518,28 +1992,29 @@ def test_remove_grantees_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.RemoveGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.remove_grantees(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.RemoveGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) + def test_remove_grantees_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -1558,7 +2033,9 @@ def test_remove_grantees_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc request = {} client.remove_grantees(request) @@ -1572,8 +2049,11 @@ def test_remove_grantees_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_remove_grantees_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1587,12 +2067,17 @@ async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "gr wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.remove_grantees in client._client._transport._wrapped_methods + assert ( + client._client._transport.remove_grantees + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.remove_grantees] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.remove_grantees + ] = mock_rpc request = {} await client.remove_grantees(request) @@ -1606,8 +2091,11 @@ async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "gr assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RemoveGranteesRequest): +async def test_remove_grantees_async( + transport: str = "grpc_asyncio", request_type=datapolicy.RemoveGranteesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1618,19 +2106,19 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.remove_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1641,12 +2129,15 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1654,6 +2145,7 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty async def test_remove_grantees_async_from_dict(): await test_remove_grantees_async(request_type=dict) + def test_remove_grantees_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -1663,12 +2155,10 @@ def test_remove_grantees_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.RemoveGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.remove_grantees(request) @@ -1680,9 +2170,9 @@ def test_remove_grantees_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -1695,13 +2185,13 @@ async def test_remove_grantees_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.RemoveGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.remove_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1712,9 +2202,9 @@ async def test_remove_grantees_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] def test_remove_grantees_flattened(): @@ -1723,16 +2213,14 @@ def test_remove_grantees_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.remove_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1740,10 +2228,10 @@ def test_remove_grantees_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val @@ -1757,10 +2245,11 @@ def test_remove_grantees_flattened_error(): with pytest.raises(ValueError): client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) + @pytest.mark.asyncio async def test_remove_grantees_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1768,18 +2257,18 @@ async def test_remove_grantees_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.remove_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1787,12 +2276,13 @@ async def test_remove_grantees_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val + @pytest.mark.asyncio async def test_remove_grantees_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1804,16 +2294,19 @@ async def test_remove_grantees_flattened_error_async(): with pytest.raises(ValueError): await client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) -def test_update_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.UpdateDataPolicyRequest, + dict, + ], +) +def test_update_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1825,16 +2318,16 @@ def test_update_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.update_data_policy(request) @@ -1847,12 +2340,15 @@ def test_update_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1861,25 +2357,26 @@ def test_update_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. - request = datapolicy.UpdateDataPolicyRequest( - ) + request = datapolicy.UpdateDataPolicyRequest() # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.update_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.update_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.UpdateDataPolicyRequest( - ) + assert args[0] == datapolicy.UpdateDataPolicyRequest() + def test_update_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, @@ -1895,12 +2392,18 @@ def test_update_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods + assert ( + client._transport.update_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.update_data_policy + ] = mock_rpc request = {} client.update_data_policy(request) @@ -1913,8 +2416,11 @@ def test_update_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_update_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1928,12 +2434,17 @@ async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.update_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.update_data_policy + ] = mock_rpc request = {} await client.update_data_policy(request) @@ -1947,8 +2458,11 @@ async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): +async def test_update_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.UpdateDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1960,18 +2474,20 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.update_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -1982,12 +2498,15 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1995,6 +2514,7 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request async def test_update_data_policy_async_from_dict(): await test_update_data_policy_async(request_type=dict) + def test_update_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2004,12 +2524,12 @@ def test_update_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.UpdateDataPolicyRequest() - request.data_policy.name = 'name_value' + request.data_policy.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.update_data_policy(request) @@ -2021,9 +2541,9 @@ def test_update_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy.name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2036,13 +2556,15 @@ async def test_update_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.UpdateDataPolicyRequest() - request.data_policy.name = 'name_value' + request.data_policy.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + type(client.transport.update_data_policy), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.update_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2053,9 +2575,9 @@ async def test_update_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy.name=name_value", + ) in kw["metadata"] def test_update_data_policy_flattened(): @@ -2065,15 +2587,19 @@ def test_update_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.update_data_policy( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) # Establish that the underlying call was made with the expected @@ -2081,10 +2607,14 @@ def test_update_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) assert arg == mock_val @@ -2098,10 +2628,15 @@ def test_update_data_policy_flattened_error(): with pytest.raises(ValueError): client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) + @pytest.mark.asyncio async def test_update_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2110,17 +2645,23 @@ async def test_update_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.update_data_policy( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) # Establish that the underlying call was made with the expected @@ -2128,12 +2669,17 @@ async def test_update_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) assert arg == mock_val + @pytest.mark.asyncio async def test_update_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2145,16 +2691,23 @@ async def test_update_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) -def test_delete_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.DeleteDataPolicyRequest, + dict, + ], +) +def test_delete_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2166,8 +2719,8 @@ def test_delete_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None response = client.delete_data_policy(request) @@ -2187,28 +2740,31 @@ def test_delete_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.DeleteDataPolicyRequest( - name='name_value', + name="name_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.delete_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.delete_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.DeleteDataPolicyRequest( - name='name_value', + name="name_value", ) + def test_delete_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2223,12 +2779,18 @@ def test_delete_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods + assert ( + client._transport.delete_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.delete_data_policy + ] = mock_rpc request = {} client.delete_data_policy(request) @@ -2241,8 +2803,11 @@ def test_delete_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_delete_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2256,12 +2821,17 @@ async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.delete_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.delete_data_policy + ] = mock_rpc request = {} await client.delete_data_policy(request) @@ -2275,8 +2845,11 @@ async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): +async def test_delete_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.DeleteDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2288,8 +2861,8 @@ async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) response = await client.delete_data_policy(request) @@ -2308,6 +2881,7 @@ async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request async def test_delete_data_policy_async_from_dict(): await test_delete_data_policy_async(request_type=dict) + def test_delete_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2317,12 +2891,12 @@ def test_delete_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.DeleteDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = None client.delete_data_policy(request) @@ -2334,9 +2908,9 @@ def test_delete_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2349,12 +2923,12 @@ async def test_delete_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.DeleteDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) await client.delete_data_policy(request) @@ -2366,9 +2940,9 @@ async def test_delete_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] def test_delete_data_policy_flattened(): @@ -2378,14 +2952,14 @@ def test_delete_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.delete_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2393,7 +2967,7 @@ def test_delete_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val @@ -2407,9 +2981,10 @@ def test_delete_data_policy_flattened_error(): with pytest.raises(ValueError): client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) + @pytest.mark.asyncio async def test_delete_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2418,8 +2993,8 @@ async def test_delete_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None @@ -2427,7 +3002,7 @@ async def test_delete_data_policy_flattened_async(): # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.delete_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2435,9 +3010,10 @@ async def test_delete_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val + @pytest.mark.asyncio async def test_delete_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2449,15 +3025,18 @@ async def test_delete_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) -def test_get_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.GetDataPolicyRequest, + dict, + ], +) +def test_get_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2468,17 +3047,15 @@ def test_get_data_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.get_data_policy(request) @@ -2491,12 +3068,15 @@ def test_get_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -2505,28 +3085,29 @@ def test_get_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.GetDataPolicyRequest( - name='name_value', + name="name_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.get_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.GetDataPolicyRequest( - name='name_value', + name="name_value", ) + def test_get_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2545,7 +3126,9 @@ def test_get_data_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc request = {} client.get_data_policy(request) @@ -2559,8 +3142,11 @@ def test_get_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_get_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2574,12 +3160,17 @@ async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "gr wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.get_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.get_data_policy + ] = mock_rpc request = {} await client.get_data_policy(request) @@ -2593,8 +3184,11 @@ async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "gr assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): +async def test_get_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.GetDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2605,19 +3199,19 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.get_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2628,12 +3222,15 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -2641,6 +3238,7 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty async def test_get_data_policy_async_from_dict(): await test_get_data_policy_async(request_type=dict) + def test_get_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2650,12 +3248,10 @@ def test_get_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.GetDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.get_data_policy(request) @@ -2667,9 +3263,9 @@ def test_get_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2682,13 +3278,13 @@ async def test_get_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.GetDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.get_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2699,9 +3295,9 @@ async def test_get_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] def test_get_data_policy_flattened(): @@ -2710,15 +3306,13 @@ def test_get_data_policy_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.get_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2726,7 +3320,7 @@ def test_get_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val @@ -2740,9 +3334,10 @@ def test_get_data_policy_flattened_error(): with pytest.raises(ValueError): client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) + @pytest.mark.asyncio async def test_get_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2750,17 +3345,17 @@ async def test_get_data_policy_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.get_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2768,9 +3363,10 @@ async def test_get_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val + @pytest.mark.asyncio async def test_get_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2782,15 +3378,18 @@ async def test_get_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) -def test_list_data_policies(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.ListDataPoliciesRequest, + dict, + ], +) +def test_list_data_policies(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2802,11 +3401,11 @@ def test_list_data_policies(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', + next_page_token="next_page_token_value", ) response = client.list_data_policies(request) @@ -2818,7 +3417,7 @@ def test_list_data_policies(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" def test_list_data_policies_non_empty_request_with_auto_populated_field(): @@ -2826,32 +3425,35 @@ def test_list_data_policies_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - filter='filter_value', + parent="parent_value", + page_token="page_token_value", + filter="filter_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.list_data_policies), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.list_data_policies(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', - filter='filter_value', + parent="parent_value", + page_token="page_token_value", + filter="filter_value", ) + def test_list_data_policies_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2866,12 +3468,18 @@ def test_list_data_policies_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods + assert ( + client._transport.list_data_policies in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.list_data_policies + ] = mock_rpc request = {} client.list_data_policies(request) @@ -2884,8 +3492,11 @@ def test_list_data_policies_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_list_data_policies_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2899,12 +3510,17 @@ async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + assert ( + client._client._transport.list_data_policies + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.list_data_policies + ] = mock_rpc request = {} await client.list_data_policies(request) @@ -2918,8 +3534,11 @@ async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): +async def test_list_data_policies_async( + transport: str = "grpc_asyncio", request_type=datapolicy.ListDataPoliciesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2931,12 +3550,14 @@ async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse( + next_page_token="next_page_token_value", + ) + ) response = await client.list_data_policies(request) # Establish that the underlying gRPC stub method was called. @@ -2947,13 +3568,14 @@ async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesAsyncPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" @pytest.mark.asyncio async def test_list_data_policies_async_from_dict(): await test_list_data_policies_async(request_type=dict) + def test_list_data_policies_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2963,12 +3585,12 @@ def test_list_data_policies_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.ListDataPoliciesRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: call.return_value = datapolicy.ListDataPoliciesResponse() client.list_data_policies(request) @@ -2980,9 +3602,9 @@ def test_list_data_policies_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2995,13 +3617,15 @@ async def test_list_data_policies_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.ListDataPoliciesRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + type(client.transport.list_data_policies), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse() + ) await client.list_data_policies(request) # Establish that the underlying gRPC stub method was called. @@ -3012,9 +3636,9 @@ async def test_list_data_policies_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] def test_list_data_policies_flattened(): @@ -3024,14 +3648,14 @@ def test_list_data_policies_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.list_data_policies( - parent='parent_value', + parent="parent_value", ) # Establish that the underlying call was made with the expected @@ -3039,7 +3663,7 @@ def test_list_data_policies_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val @@ -3053,9 +3677,10 @@ def test_list_data_policies_flattened_error(): with pytest.raises(ValueError): client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) + @pytest.mark.asyncio async def test_list_data_policies_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -3064,16 +3689,18 @@ async def test_list_data_policies_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.list_data_policies( - parent='parent_value', + parent="parent_value", ) # Establish that the underlying call was made with the expected @@ -3081,9 +3708,10 @@ async def test_list_data_policies_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val + @pytest.mark.asyncio async def test_list_data_policies_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -3095,7 +3723,7 @@ async def test_list_data_policies_flattened_error_async(): with pytest.raises(ValueError): await client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) @@ -3107,8 +3735,8 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3117,17 +3745,17 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3142,9 +3770,7 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): retry = retries.Retry() timeout = 5 expected_metadata = tuple(expected_metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ('parent', ''), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", ""),)), ) pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) @@ -3154,8 +3780,9 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): results = list(pager) assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) + assert all(isinstance(i, datapolicy.DataPolicy) for i in results) + + def test_list_data_policies_pages(transport_name: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3164,8 +3791,8 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3174,17 +3801,17 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3195,9 +3822,10 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): RuntimeError, ) pages = list(client.list_data_policies(request={}).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token + @pytest.mark.asyncio async def test_list_data_policies_async_pager(): client = DataPolicyServiceAsyncClient( @@ -3206,8 +3834,10 @@ async def test_list_data_policies_async_pager(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: + type(client.transport.list_data_policies), + "__call__", + new_callable=mock.AsyncMock, + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3216,17 +3846,17 @@ async def test_list_data_policies_async_pager(): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3236,15 +3866,16 @@ async def test_list_data_policies_async_pager(): ), RuntimeError, ) - async_pager = await client.list_data_policies(request={},) - assert async_pager.next_page_token == 'abc' + async_pager = await client.list_data_policies( + request={}, + ) + assert async_pager.next_page_token == "abc" responses = [] - async for response in async_pager: # pragma: no branch + async for response in async_pager: # pragma: no branch responses.append(response) assert len(responses) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in responses) + assert all(isinstance(i, datapolicy.DataPolicy) for i in responses) @pytest.mark.asyncio @@ -3255,8 +3886,10 @@ async def test_list_data_policies_async_pages(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: + type(client.transport.list_data_policies), + "__call__", + new_callable=mock.AsyncMock, + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3265,17 +3898,17 @@ async def test_list_data_policies_async_pages(): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3288,18 +3921,22 @@ async def test_list_data_policies_async_pages(): pages = [] # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 - async for page_ in ( # pragma: no branch + async for page_ in ( # pragma: no branch await client.list_data_policies(request={}) ).pages: pages.append(page_) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) -def test_get_iam_policy(request_type, transport: str = 'grpc'): + +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.GetIamPolicyRequest, + dict, + ], +) +def test_get_iam_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3310,13 +3947,11 @@ def test_get_iam_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy( version=774, - etag=b'etag_blob', + etag=b"etag_blob", ) response = client.get_iam_policy(request) @@ -3329,7 +3964,7 @@ def test_get_iam_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" def test_get_iam_policy_non_empty_request_with_auto_populated_field(): @@ -3337,28 +3972,29 @@ def test_get_iam_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.get_iam_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) + def test_get_iam_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3377,7 +4013,9 @@ def test_get_iam_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc request = {} client.get_iam_policy(request) @@ -3391,8 +4029,11 @@ def test_get_iam_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_get_iam_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3406,12 +4047,17 @@ async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.get_iam_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.get_iam_policy + ] = mock_rpc request = {} await client.get_iam_policy(request) @@ -3425,8 +4071,11 @@ async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): +async def test_get_iam_policy_async( + transport: str = "grpc_asyncio", request_type=iam_policy_pb2.GetIamPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3437,14 +4086,14 @@ async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_typ request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) response = await client.get_iam_policy(request) # Establish that the underlying gRPC stub method was called. @@ -3456,13 +4105,14 @@ async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_typ # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.asyncio async def test_get_iam_policy_async_from_dict(): await test_get_iam_policy_async(request_type=dict) + def test_get_iam_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3472,12 +4122,10 @@ def test_get_iam_policy_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.GetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.get_iam_policy(request) @@ -3489,9 +4137,9 @@ def test_get_iam_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3504,12 +4152,10 @@ async def test_get_iam_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.GetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) await client.get_iam_policy(request) @@ -3521,33 +4167,36 @@ async def test_get_iam_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_get_iam_policy_from_dict_foreign(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy() - response = client.get_iam_policy(request={ - 'resource': 'resource_value', - 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + response = client.get_iam_policy( + request={ + "resource": "resource_value", + "options": options_pb2.GetPolicyOptions(requested_policy_version=2598), } ) call.assert_called() -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) -def test_set_iam_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.SetIamPolicyRequest, + dict, + ], +) +def test_set_iam_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3558,13 +4207,11 @@ def test_set_iam_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy( version=774, - etag=b'etag_blob', + etag=b"etag_blob", ) response = client.set_iam_policy(request) @@ -3577,7 +4224,7 @@ def test_set_iam_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" def test_set_iam_policy_non_empty_request_with_auto_populated_field(): @@ -3585,28 +4232,29 @@ def test_set_iam_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.set_iam_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) + def test_set_iam_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3625,7 +4273,9 @@ def test_set_iam_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc request = {} client.set_iam_policy(request) @@ -3639,8 +4289,11 @@ def test_set_iam_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_set_iam_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3654,12 +4307,17 @@ async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.set_iam_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.set_iam_policy + ] = mock_rpc request = {} await client.set_iam_policy(request) @@ -3673,8 +4331,11 @@ async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): +async def test_set_iam_policy_async( + transport: str = "grpc_asyncio", request_type=iam_policy_pb2.SetIamPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3685,14 +4346,14 @@ async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_typ request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) response = await client.set_iam_policy(request) # Establish that the underlying gRPC stub method was called. @@ -3704,13 +4365,14 @@ async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_typ # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.asyncio async def test_set_iam_policy_async_from_dict(): await test_set_iam_policy_async(request_type=dict) + def test_set_iam_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3720,12 +4382,10 @@ def test_set_iam_policy_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.SetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.set_iam_policy(request) @@ -3737,9 +4397,9 @@ def test_set_iam_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3752,12 +4412,10 @@ async def test_set_iam_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.SetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) await client.set_iam_policy(request) @@ -3769,34 +4427,37 @@ async def test_set_iam_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_set_iam_policy_from_dict_foreign(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy() - response = client.set_iam_policy(request={ - 'resource': 'resource_value', - 'policy': policy_pb2.Policy(version=774), - 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + response = client.set_iam_policy( + request={ + "resource": "resource_value", + "policy": policy_pb2.Policy(version=774), + "update_mask": field_mask_pb2.FieldMask(paths=["paths_value"]), } ) call.assert_called() -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) -def test_test_iam_permissions(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, + ], +) +def test_test_iam_permissions(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3808,11 +4469,11 @@ def test_test_iam_permissions(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], + permissions=["permissions_value"], ) response = client.test_iam_permissions(request) @@ -3824,7 +4485,7 @@ def test_test_iam_permissions(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): @@ -3832,28 +4493,31 @@ def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.test_iam_permissions), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.test_iam_permissions(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', + resource="resource_value", ) + def test_test_iam_permissions_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3868,12 +4532,18 @@ def test_test_iam_permissions_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods + assert ( + client._transport.test_iam_permissions in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.test_iam_permissions + ] = mock_rpc request = {} client.test_iam_permissions(request) @@ -3886,8 +4556,11 @@ def test_test_iam_permissions_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_test_iam_permissions_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3901,12 +4574,17 @@ async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + assert ( + client._client._transport.test_iam_permissions + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.test_iam_permissions + ] = mock_rpc request = {} await client.test_iam_permissions(request) @@ -3920,8 +4598,12 @@ async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): +async def test_test_iam_permissions_async( + transport: str = "grpc_asyncio", + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3933,12 +4615,14 @@ async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', reque # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse( + permissions=["permissions_value"], + ) + ) response = await client.test_iam_permissions(request) # Establish that the underlying gRPC stub method was called. @@ -3949,13 +4633,14 @@ async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', reque # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] @pytest.mark.asyncio async def test_test_iam_permissions_async_from_dict(): await test_test_iam_permissions_async(request_type=dict) + def test_test_iam_permissions_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3965,12 +4650,12 @@ def test_test_iam_permissions_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.TestIamPermissionsRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: call.return_value = iam_policy_pb2.TestIamPermissionsResponse() client.test_iam_permissions(request) @@ -3982,9 +4667,9 @@ def test_test_iam_permissions_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3997,13 +4682,15 @@ async def test_test_iam_permissions_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.TestIamPermissionsRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + type(client.transport.test_iam_permissions), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse() + ) await client.test_iam_permissions(request) # Establish that the underlying gRPC stub method was called. @@ -4014,9 +4701,10 @@ async def test_test_iam_permissions_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_test_iam_permissions_from_dict_foreign(): client = DataPolicyServiceClient( @@ -4024,13 +4712,14 @@ def test_test_iam_permissions_from_dict_foreign(): ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - response = client.test_iam_permissions(request={ - 'resource': 'resource_value', - 'permissions': ['permissions_value'], + response = client.test_iam_permissions( + request={ + "resource": "resource_value", + "permissions": ["permissions_value"], } ) call.assert_called() @@ -4050,12 +4739,18 @@ def test_create_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods + assert ( + client._transport.create_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.create_data_policy + ] = mock_rpc request = {} client.create_data_policy(request) @@ -4070,7 +4765,9 @@ def test_create_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): +def test_create_data_policy_rest_required_fields( + request_type=datapolicy.CreateDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -4078,53 +4775,56 @@ def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateD request_init["data_policy_id"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["parent"] = 'parent_value' - jsonified_request["dataPolicyId"] = 'data_policy_id_value' + jsonified_request["parent"] = "parent_value" + jsonified_request["dataPolicyId"] = "data_policy_id_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' + assert jsonified_request["parent"] == "parent_value" assert "dataPolicyId" in jsonified_request - assert jsonified_request["dataPolicyId"] == 'data_policy_id_value' + assert jsonified_request["dataPolicyId"] == "data_policy_id_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4134,24 +4834,33 @@ def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateD return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.create_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_create_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.create_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("parent", "dataPolicyId", "dataPolicy", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "parent", + "dataPolicyId", + "dataPolicy", + ) + ) + ) def test_create_data_policy_rest_flattened(): @@ -4161,18 +4870,22 @@ def test_create_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} # get truthy value for each flattened field mock_args = dict( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) mock_args.update(sample_request) @@ -4182,7 +4895,7 @@ def test_create_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4192,10 +4905,14 @@ def test_create_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{parent=projects/*/locations/*}/dataPolicies" + % client.transport._host, + args[1], + ) -def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_create_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4206,9 +4923,13 @@ def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) @@ -4230,7 +4951,9 @@ def test_add_grantees_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc request = {} @@ -4254,53 +4977,56 @@ def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRe request_init["grantees"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).add_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["dataPolicy"] = 'data_policy_value' - jsonified_request["grantees"] = 'grantees_value' + jsonified_request["dataPolicy"] = "data_policy_value" + jsonified_request["grantees"] = "grantees_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).add_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "dataPolicy" in jsonified_request - assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert jsonified_request["dataPolicy"] == "data_policy_value" assert "grantees" in jsonified_request - assert jsonified_request["grantees"] == 'grantees_value' + assert jsonified_request["grantees"] == "grantees_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4310,24 +5036,32 @@ def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRe return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.add_grantees(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_add_grantees_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.add_grantees._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "dataPolicy", + "grantees", + ) + ) + ) def test_add_grantees_rest_flattened(): @@ -4337,17 +5071,19 @@ def test_add_grantees_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) mock_args.update(sample_request) @@ -4357,7 +5093,7 @@ def test_add_grantees_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4367,10 +5103,14 @@ def test_add_grantees_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" + % client.transport._host, + args[1], + ) -def test_add_grantees_rest_flattened_error(transport: str = 'rest'): +def test_add_grantees_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4381,8 +5121,8 @@ def test_add_grantees_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) @@ -4404,7 +5144,9 @@ def test_remove_grantees_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc request = {} @@ -4420,7 +5162,9 @@ def test_remove_grantees_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGranteesRequest): +def test_remove_grantees_rest_required_fields( + request_type=datapolicy.RemoveGranteesRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -4428,53 +5172,56 @@ def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGran request_init["grantees"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).remove_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["dataPolicy"] = 'data_policy_value' - jsonified_request["grantees"] = 'grantees_value' + jsonified_request["dataPolicy"] = "data_policy_value" + jsonified_request["grantees"] = "grantees_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).remove_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "dataPolicy" in jsonified_request - assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert jsonified_request["dataPolicy"] == "data_policy_value" assert "grantees" in jsonified_request - assert jsonified_request["grantees"] == 'grantees_value' + assert jsonified_request["grantees"] == "grantees_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4484,24 +5231,32 @@ def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGran return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.remove_grantees(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_remove_grantees_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.remove_grantees._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "dataPolicy", + "grantees", + ) + ) + ) def test_remove_grantees_rest_flattened(): @@ -4511,17 +5266,19 @@ def test_remove_grantees_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) mock_args.update(sample_request) @@ -4531,7 +5288,7 @@ def test_remove_grantees_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4541,10 +5298,14 @@ def test_remove_grantees_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" + % client.transport._host, + args[1], + ) -def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): +def test_remove_grantees_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4555,8 +5316,8 @@ def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) @@ -4574,12 +5335,18 @@ def test_update_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods + assert ( + client._transport.update_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.update_data_policy + ] = mock_rpc request = {} client.update_data_policy(request) @@ -4594,54 +5361,64 @@ def test_update_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): +def test_update_data_policy_rest_required_fields( + request_type=datapolicy.UpdateDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_data_policy._get_unset_required_fields(jsonified_request) # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("allow_missing", "update_mask", )) + assert not set(unset_fields) - set( + ( + "allow_missing", + "update_mask", + ) + ) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "patch", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4651,24 +5428,32 @@ def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateD return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.update_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_update_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.update_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(("allowMissing", "updateMask", )) & set(("dataPolicy", ))) + assert set(unset_fields) == ( + set( + ( + "allowMissing", + "updateMask", + ) + ) + & set(("dataPolicy",)) + ) def test_update_data_policy_rest_flattened(): @@ -4678,17 +5463,25 @@ def test_update_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + sample_request = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } # get truthy value for each flattened field mock_args = dict( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) mock_args.update(sample_request) @@ -4698,7 +5491,7 @@ def test_update_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4708,10 +5501,14 @@ def test_update_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{data_policy.name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_update_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4722,8 +5519,12 @@ def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) @@ -4741,12 +5542,18 @@ def test_delete_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods + assert ( + client._transport.delete_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.delete_data_policy + ] = mock_rpc request = {} client.delete_data_policy(request) @@ -4761,80 +5568,85 @@ def test_delete_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): +def test_delete_data_policy_rest_required_fields( + request_type=datapolicy.DeleteDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["name"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["name"] = 'name_value' + jsonified_request["name"] = "name_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' + assert jsonified_request["name"] == "name_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = None # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "delete", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, } transcode.return_value = transcode_result response_value = Response() response_value.status_code = 200 - json_return_value = '' + json_return_value = "" - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.delete_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_delete_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.delete_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) + assert set(unset_fields) == (set(()) & set(("name",))) def test_delete_data_policy_rest_flattened(): @@ -4844,24 +5656,26 @@ def test_delete_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = None # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - name='name_value', + name="name_value", ) mock_args.update(sample_request) # Wrap the value into a proper Response obj response_value = Response() response_value.status_code = 200 - json_return_value = '' - response_value._content = json_return_value.encode('UTF-8') + json_return_value = "" + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4871,10 +5685,14 @@ def test_delete_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_delete_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4885,7 +5703,7 @@ def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) @@ -4907,7 +5725,9 @@ def test_get_data_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc request = {} @@ -4923,55 +5743,60 @@ def test_get_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): +def test_get_data_policy_rest_required_fields( + request_type=datapolicy.GetDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["name"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["name"] = 'name_value' + jsonified_request["name"] = "name_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' + assert jsonified_request["name"] == "name_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, } transcode.return_value = transcode_result @@ -4982,24 +5807,24 @@ def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPol return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_get_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.get_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) + assert set(unset_fields) == (set(()) & set(("name",))) def test_get_data_policy_rest_flattened(): @@ -5009,16 +5834,18 @@ def test_get_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - name='name_value', + name="name_value", ) mock_args.update(sample_request) @@ -5028,7 +5855,7 @@ def test_get_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -5038,10 +5865,14 @@ def test_get_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_get_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -5052,7 +5883,7 @@ def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) @@ -5070,12 +5901,18 @@ def test_list_data_policies_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods + assert ( + client._transport.list_data_policies in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.list_data_policies + ] = mock_rpc request = {} client.list_data_policies(request) @@ -5090,57 +5927,68 @@ def test_list_data_policies_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): +def test_list_data_policies_rest_required_fields( + request_type=datapolicy.ListDataPoliciesRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["parent"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_data_policies._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["parent"] = 'parent_value' + jsonified_request["parent"] = "parent_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_data_policies._get_unset_required_fields(jsonified_request) # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("filter", "page_size", "page_token", )) + assert not set(unset_fields) - set( + ( + "filter", + "page_size", + "page_token", + ) + ) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' + assert jsonified_request["parent"] == "parent_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, } transcode.return_value = transcode_result @@ -5151,24 +5999,33 @@ def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDat return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.list_data_policies(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_list_data_policies_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.list_data_policies._get_unset_required_fields({}) - assert set(unset_fields) == (set(("filter", "pageSize", "pageToken", )) & set(("parent", ))) + assert set(unset_fields) == ( + set( + ( + "filter", + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) def test_list_data_policies_rest_flattened(): @@ -5178,16 +6035,16 @@ def test_list_data_policies_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse() # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} # get truthy value for each flattened field mock_args = dict( - parent='parent_value', + parent="parent_value", ) mock_args.update(sample_request) @@ -5197,7 +6054,7 @@ def test_list_data_policies_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -5207,10 +6064,14 @@ def test_list_data_policies_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2/{parent=projects/*/locations/*}/dataPolicies" + % client.transport._host, + args[1], + ) -def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): +def test_list_data_policies_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -5221,20 +6082,20 @@ def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) -def test_list_data_policies_rest_pager(transport: str = 'rest'): +def test_list_data_policies_rest_pager(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # TODO(kbandes): remove this mock unless there's a good reason for it. - #with mock.patch.object(path_template, 'transcode') as transcode: + # with mock.patch.object(path_template, 'transcode') as transcode: # Set the response as a series of pages response = ( datapolicy.ListDataPoliciesResponse( @@ -5243,17 +6104,17 @@ def test_list_data_policies_rest_pager(transport: str = 'rest'): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -5266,24 +6127,25 @@ def test_list_data_policies_rest_pager(transport: str = 'rest'): response = response + response # Wrap the values into proper Response objs - response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) + response = tuple( + datapolicy.ListDataPoliciesResponse.to_json(x) for x in response + ) return_values = tuple(Response() for i in response) for return_val, response_val in zip(return_values, response): - return_val._content = response_val.encode('UTF-8') + return_val._content = response_val.encode("UTF-8") return_val.status_code = 200 req.side_effect = return_values - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} pager = client.list_data_policies(request=sample_request) results = list(pager) assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) + assert all(isinstance(i, datapolicy.DataPolicy) for i in results) pages = list(client.list_data_policies(request=sample_request).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token @@ -5305,7 +6167,9 @@ def test_get_iam_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc request = {} @@ -5321,57 +6185,62 @@ def test_get_iam_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): +def test_get_iam_policy_rest_required_fields( + request_type=iam_policy_pb2.GetIamPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["resource"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' + jsonified_request["resource"] = "resource_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5379,24 +6248,24 @@ def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamP json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_iam_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_get_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.get_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", ))) + assert set(unset_fields) == (set(()) & set(("resource",))) def test_set_iam_policy_rest_use_cached_wrapped_rpc(): @@ -5417,7 +6286,9 @@ def test_set_iam_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc request = {} @@ -5433,57 +6304,62 @@ def test_set_iam_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): +def test_set_iam_policy_rest_required_fields( + request_type=iam_policy_pb2.SetIamPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["resource"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).set_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' + jsonified_request["resource"] = "resource_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).set_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5491,24 +6367,32 @@ def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamP json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.set_iam_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_set_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.set_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "resource", + "policy", + ) + ) + ) def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): @@ -5525,12 +6409,18 @@ def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods + assert ( + client._transport.test_iam_permissions in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.test_iam_permissions + ] = mock_rpc request = {} client.test_iam_permissions(request) @@ -5545,7 +6435,9 @@ def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): +def test_test_iam_permissions_rest_required_fields( + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -5553,53 +6445,56 @@ def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.T request_init["permissions"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).test_iam_permissions._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' - jsonified_request["permissions"] = 'permissions_value' + jsonified_request["resource"] = "resource_value" + jsonified_request["permissions"] = "permissions_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).test_iam_permissions._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" assert "permissions" in jsonified_request - assert jsonified_request["permissions"] == 'permissions_value' + assert jsonified_request["permissions"] == "permissions_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = iam_policy_pb2.TestIamPermissionsResponse() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5607,24 +6502,32 @@ def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.T json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.test_iam_permissions(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_test_iam_permissions_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "resource", + "permissions", + ) + ) + ) def test_credentials_transport_error(): @@ -5665,8 +6568,7 @@ def test_credentials_transport_error(): options.api_key = "api_key" with pytest.raises(ValueError): client = DataPolicyServiceClient( - client_options=options, - credentials=ga_credentials.AnonymousCredentials() + client_options=options, credentials=ga_credentials.AnonymousCredentials() ) # It is an error to provide scopes and a transport instance. @@ -5688,6 +6590,7 @@ def test_transport_instance(): client = DataPolicyServiceClient(transport=transport) assert client.transport is transport + def test_transport_get_channel(): # A client may be instantiated with a custom transport instance. transport = transports.DataPolicyServiceGrpcTransport( @@ -5702,18 +6605,23 @@ def test_transport_get_channel(): channel = transport.grpc_channel assert channel -@pytest.mark.parametrize("transport_class", [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - transports.DataPolicyServiceRestTransport, -]) + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, + ], +) def test_transport_adc(transport_class): # Test default credentials are used if not provided. - with mock.patch.object(google.auth, 'default') as adc: + with mock.patch.object(google.auth, "default") as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport_class() adc.assert_called_once() + def test_transport_kind_grpc(): transport = DataPolicyServiceClient.get_transport_class("grpc")( credentials=ga_credentials.AnonymousCredentials() @@ -5723,8 +6631,7 @@ def test_transport_kind_grpc(): def test_initialize_client_w_grpc(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" + credentials=ga_credentials.AnonymousCredentials(), transport="grpc" ) assert client is not None @@ -5739,8 +6646,8 @@ def test_create_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.create_data_policy(request=None) @@ -5761,9 +6668,7 @@ def test_add_grantees_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.add_grantees(request=None) @@ -5784,9 +6689,7 @@ def test_remove_grantees_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.remove_grantees(request=None) @@ -5808,8 +6711,8 @@ def test_update_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.update_data_policy(request=None) @@ -5831,8 +6734,8 @@ def test_delete_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = None client.delete_data_policy(request=None) @@ -5853,9 +6756,7 @@ def test_get_data_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.get_data_policy(request=None) @@ -5877,8 +6778,8 @@ def test_list_data_policies_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: call.return_value = datapolicy.ListDataPoliciesResponse() client.list_data_policies(request=None) @@ -5899,9 +6800,7 @@ def test_get_iam_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.get_iam_policy(request=None) @@ -5922,9 +6821,7 @@ def test_set_iam_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.set_iam_policy(request=None) @@ -5946,8 +6843,8 @@ def test_test_iam_permissions_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: call.return_value = iam_policy_pb2.TestIamPermissionsResponse() client.test_iam_permissions(request=None) @@ -5968,8 +6865,7 @@ def test_transport_kind_grpc_asyncio(): def test_initialize_client_w_grpc_asyncio(): client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" + credentials=async_anonymous_credentials(), transport="grpc_asyncio" ) assert client is not None @@ -5985,18 +6881,20 @@ async def test_create_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.create_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6017,19 +6915,19 @@ async def test_add_grantees_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.add_grantees(request=None) # Establish that the underlying stub method was called. @@ -6050,19 +6948,19 @@ async def test_remove_grantees_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.remove_grantees(request=None) # Establish that the underlying stub method was called. @@ -6084,18 +6982,20 @@ async def test_update_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.update_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6117,8 +7017,8 @@ async def test_delete_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) await client.delete_data_policy(request=None) @@ -6141,19 +7041,19 @@ async def test_get_data_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.get_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6175,12 +7075,14 @@ async def test_list_data_policies_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse( + next_page_token="next_page_token_value", + ) + ) await client.list_data_policies(request=None) # Establish that the underlying stub method was called. @@ -6201,14 +7103,14 @@ async def test_get_iam_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) await client.get_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -6229,14 +7131,14 @@ async def test_set_iam_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) await client.set_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -6258,12 +7160,14 @@ async def test_test_iam_permissions_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse( + permissions=["permissions_value"], + ) + ) await client.test_iam_permissions(request=None) # Establish that the underlying stub method was called. @@ -6281,20 +7185,23 @@ def test_transport_kind_rest(): assert transport.kind == "rest" -def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): +def test_create_data_policy_rest_bad_request( + request_type=datapolicy.CreateDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6303,31 +7210,33 @@ def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataP client.create_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.CreateDataPolicyRequest, + dict, + ], +) def test_create_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6337,19 +7246,22 @@ def test_create_data_policy_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.create_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6357,19 +7269,30 @@ def test_create_data_policy_rest_call_success(request_type): def test_create_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_create_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_create_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) + pb_message = datapolicy.CreateDataPolicyRequest.pb( + datapolicy.CreateDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6384,7 +7307,7 @@ def test_create_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.CreateDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6392,7 +7315,13 @@ def test_create_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.create_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() @@ -6401,18 +7330,21 @@ def test_create_data_policy_rest_interceptors(null_interceptor): def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesRequest): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6421,31 +7353,35 @@ def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesReques client.add_grantees(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.AddGranteesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.AddGranteesRequest, + dict, + ], +) def test_add_grantees_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6455,19 +7391,22 @@ def test_add_grantees_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.add_grantees(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6475,15 +7414,23 @@ def test_add_grantees_rest_call_success(request_type): def test_add_grantees_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_add_grantees") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_add_grantees" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_add_grantees" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -6502,7 +7449,7 @@ def test_add_grantees_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.AddGranteesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6510,27 +7457,38 @@ def test_add_grantees_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.add_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.add_grantees( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGranteesRequest): +def test_remove_grantees_rest_bad_request( + request_type=datapolicy.RemoveGranteesRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6539,31 +7497,35 @@ def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGrantees client.remove_grantees(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.RemoveGranteesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.RemoveGranteesRequest, + dict, + ], +) def test_remove_grantees_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6573,19 +7535,22 @@ def test_remove_grantees_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.remove_grantees(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6593,19 +7558,30 @@ def test_remove_grantees_rest_call_success(request_type): def test_remove_grantees_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_remove_grantees" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_remove_grantees_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.RemoveGranteesRequest.pb(datapolicy.RemoveGranteesRequest()) + pb_message = datapolicy.RemoveGranteesRequest.pb( + datapolicy.RemoveGranteesRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6620,7 +7596,7 @@ def test_remove_grantees_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.RemoveGranteesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6628,27 +7604,40 @@ def test_remove_grantees_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.remove_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.remove_grantees( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): +def test_update_data_policy_rest_bad_request( + request_type=datapolicy.UpdateDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request_init = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6657,19 +7646,34 @@ def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataP client.update_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.UpdateDataPolicyRequest, + dict, + ], +) def test_update_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} - request_init["data_policy"] = {'data_masking_policy': {'predefined_expression': 1, 'routine': 'routine_value'}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_id': 'data_policy_id_value', 'etag': 'etag_value', 'data_policy_type': 1, 'policy_tag': 'policy_tag_value', 'grantees': ['grantees_value1', 'grantees_value2'], 'version': 1} + request_init = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } + request_init["data_policy"] = { + "data_masking_policy": {"predefined_expression": 1, "routine": "routine_value"}, + "name": "projects/sample1/locations/sample2/dataPolicies/sample3", + "data_policy_id": "data_policy_id_value", + "etag": "etag_value", + "data_policy_type": 1, + "policy_tag": "policy_tag_value", + "grantees": ["grantees_value1", "grantees_value2"], + "version": 1, + } # The version of a generated dependency at test runtime may differ from the version used during generation. # Delete any fields which are not present in the current runtime dependency # See https://github.com/googleapis/gapic-generator-python/issues/1748 @@ -6689,7 +7693,7 @@ def get_message_fields(field): if is_field_type_proto_plus_type: message_fields = field.message.meta.fields.values() # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types - else: # pragma: NO COVER + else: # pragma: NO COVER message_fields = field.message.DESCRIPTOR.fields return message_fields @@ -6703,7 +7707,7 @@ def get_message_fields(field): # For each item in the sample request, create a list of sub fields which are not present at runtime # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for field, value in request_init["data_policy"].items(): # pragma: NO COVER + for field, value in request_init["data_policy"].items(): # pragma: NO COVER result = None is_repeated = False # For repeated fields @@ -6718,12 +7722,16 @@ def get_message_fields(field): for subfield in result.keys(): if (field, subfield) not in runtime_nested_fields: subfields_not_in_runtime.append( - {"field": field, "subfield": subfield, "is_repeated": is_repeated} + { + "field": field, + "subfield": subfield, + "is_repeated": is_repeated, + } ) # Remove fields from the sample request which are not present in the runtime version of the dependency # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER field = subfield_to_delete.get("field") field_repeated = subfield_to_delete.get("is_repeated") subfield = subfield_to_delete.get("subfield") @@ -6736,16 +7744,16 @@ def get_message_fields(field): request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6755,19 +7763,22 @@ def get_message_fields(field): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.update_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6775,19 +7786,30 @@ def get_message_fields(field): def test_update_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_update_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_update_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) + pb_message = datapolicy.UpdateDataPolicyRequest.pb( + datapolicy.UpdateDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6802,7 +7824,7 @@ def test_update_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.UpdateDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6810,27 +7832,36 @@ def test_update_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.update_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): +def test_delete_data_policy_rest_bad_request( + request_type=datapolicy.DeleteDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6839,30 +7870,32 @@ def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataP client.delete_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.DeleteDataPolicyRequest, + dict, + ], +) def test_delete_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = None # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 - json_return_value = '' - response_value.content = json_return_value.encode('UTF-8') + json_return_value = "" + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.delete_data_policy(request) @@ -6875,15 +7908,23 @@ def test_delete_data_policy_rest_call_success(request_type): def test_delete_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy" + ) as pre: pre.assert_not_called() - pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) + pb_message = datapolicy.DeleteDataPolicyRequest.pb( + datapolicy.DeleteDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6896,31 +7937,38 @@ def test_delete_data_policy_rest_interceptors(null_interceptor): req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} request = datapolicy.DeleteDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata - client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.delete_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6929,31 +7977,33 @@ def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyR client.get_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.GetDataPolicyRequest, + dict, + ], +) def test_get_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6963,19 +8013,22 @@ def test_get_data_policy_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6983,19 +8036,30 @@ def test_get_data_policy_rest_call_success(request_type): def test_get_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_get_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) + pb_message = datapolicy.GetDataPolicyRequest.pb( + datapolicy.GetDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -7010,7 +8074,7 @@ def test_get_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.GetDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7018,27 +8082,36 @@ def test_get_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.get_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): +def test_list_data_policies_rest_bad_request( + request_type=datapolicy.ListDataPoliciesRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7047,25 +8120,27 @@ def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPol client.list_data_policies(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.ListDataPoliciesRequest, + dict, + ], +) def test_list_data_policies_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', + next_page_token="next_page_token_value", ) # Wrap the value into a proper Response obj @@ -7075,33 +8150,44 @@ def test_list_data_policies_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.list_data_policies(request) # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_list_data_policies_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_list_data_policies" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_list_data_policies_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) + pb_message = datapolicy.ListDataPoliciesRequest.pb( + datapolicy.ListDataPoliciesRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -7112,39 +8198,55 @@ def test_list_data_policies_rest_interceptors(null_interceptor): req.return_value = mock.Mock() req.return_value.status_code = 200 req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) + return_value = datapolicy.ListDataPoliciesResponse.to_json( + datapolicy.ListDataPoliciesResponse() + ) req.return_value.content = return_value request = datapolicy.ListDataPoliciesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata post.return_value = datapolicy.ListDataPoliciesResponse() - post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata + post_with_metadata.return_value = ( + datapolicy.ListDataPoliciesResponse(), + metadata, + ) - client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.list_data_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): +def test_get_iam_policy_rest_bad_request( + request_type=iam_policy_pb2.GetIamPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7153,33 +8255,37 @@ def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolic client.get_iam_policy(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.GetIamPolicyRequest, + dict, + ], +) def test_get_iam_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', + version=774, + etag=b"etag_blob", ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_iam_policy(request) @@ -7187,22 +8293,30 @@ def test_get_iam_policy_rest_call_success(request_type): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_get_iam_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7221,7 +8335,7 @@ def test_get_iam_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = iam_policy_pb2.GetIamPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7229,27 +8343,38 @@ def test_get_iam_policy_rest_interceptors(null_interceptor): post.return_value = policy_pb2.Policy() post_with_metadata.return_value = policy_pb2.Policy(), metadata - client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.get_iam_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): +def test_set_iam_policy_rest_bad_request( + request_type=iam_policy_pb2.SetIamPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7258,33 +8383,37 @@ def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolic client.set_iam_policy(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.SetIamPolicyRequest, + dict, + ], +) def test_set_iam_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', + version=774, + etag=b"etag_blob", ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.set_iam_policy(request) @@ -7292,22 +8421,30 @@ def test_set_iam_policy_rest_call_success(request_type): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_set_iam_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7326,7 +8463,7 @@ def test_set_iam_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = iam_policy_pb2.SetIamPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7334,27 +8471,38 @@ def test_set_iam_policy_rest_interceptors(null_interceptor): post.return_value = policy_pb2.Policy() post_with_metadata.return_value = policy_pb2.Policy(), metadata - client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.set_iam_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): +def test_test_iam_permissions_rest_bad_request( + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7363,54 +8511,67 @@ def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestI client.test_iam_permissions(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, + ], +) def test_test_iam_permissions_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], + permissions=["permissions_value"], ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.test_iam_permissions(request) # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] @pytest.mark.parametrize("null_interceptor", [True, False]) def test_test_iam_permissions_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_test_iam_permissions_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7425,28 +8586,39 @@ def test_test_iam_permissions_rest_interceptors(null_interceptor): req.return_value = mock.Mock() req.return_value.status_code = 200 req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) + return_value = json_format.MessageToJson( + iam_policy_pb2.TestIamPermissionsResponse() + ) req.return_value.content = return_value request = iam_policy_pb2.TestIamPermissionsRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata post.return_value = iam_policy_pb2.TestIamPermissionsResponse() - post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata + post_with_metadata.return_value = ( + iam_policy_pb2.TestIamPermissionsResponse(), + metadata, + ) - client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.test_iam_permissions( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() + def test_initialize_client_w_rest(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) assert client is not None @@ -7461,8 +8633,8 @@ def test_create_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: client.create_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7482,9 +8654,7 @@ def test_add_grantees_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: client.add_grantees(request=None) # Establish that the underlying stub method was called. @@ -7504,9 +8674,7 @@ def test_remove_grantees_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: client.remove_grantees(request=None) # Establish that the underlying stub method was called. @@ -7527,8 +8695,8 @@ def test_update_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: client.update_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7549,8 +8717,8 @@ def test_delete_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: client.delete_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7570,9 +8738,7 @@ def test_get_data_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: client.get_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7593,8 +8759,8 @@ def test_list_data_policies_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: client.list_data_policies(request=None) # Establish that the underlying stub method was called. @@ -7614,9 +8780,7 @@ def test_get_iam_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: client.get_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -7636,9 +8800,7 @@ def test_set_iam_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: client.set_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -7659,8 +8821,8 @@ def test_test_iam_permissions_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: client.test_iam_permissions(request=None) # Establish that the underlying stub method was called. @@ -7681,18 +8843,21 @@ def test_transport_grpc_default(): transports.DataPolicyServiceGrpcTransport, ) + def test_data_policy_service_base_transport_error(): # Passing both a credentials object and credentials_file should raise an error with pytest.raises(core_exceptions.DuplicateCredentialArgs): transport = transports.DataPolicyServiceTransport( credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json" + credentials_file="credentials.json", ) def test_data_policy_service_base_transport(): # Instantiate the base transport. - with mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + with mock.patch( + "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport.__init__" + ) as Transport: Transport.return_value = None transport = transports.DataPolicyServiceTransport( credentials=ga_credentials.AnonymousCredentials(), @@ -7701,16 +8866,16 @@ def test_data_policy_service_base_transport(): # Every method on the transport should just blindly # raise NotImplementedError. methods = ( - 'create_data_policy', - 'add_grantees', - 'remove_grantees', - 'update_data_policy', - 'delete_data_policy', - 'get_data_policy', - 'list_data_policies', - 'get_iam_policy', - 'set_iam_policy', - 'test_iam_permissions', + "create_data_policy", + "add_grantees", + "remove_grantees", + "update_data_policy", + "delete_data_policy", + "get_data_policy", + "list_data_policies", + "get_iam_policy", + "set_iam_policy", + "test_iam_permissions", ) for method in methods: with pytest.raises(NotImplementedError): @@ -7721,7 +8886,7 @@ def test_data_policy_service_base_transport(): # Catch all for all remaining methods and properties remainder = [ - 'kind', + "kind", ] for r in remainder: with pytest.raises(NotImplementedError): @@ -7730,26 +8895,33 @@ def test_data_policy_service_base_transport(): def test_data_policy_service_base_transport_with_credentials_file(): # Instantiate the base transport with a credentials file - with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch( + "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages" + ) as Transport: Transport.return_value = None load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) transport = transports.DataPolicyServiceTransport( credentials_file="credentials.json", quota_project_id="octopus", ) - load_creds.assert_called_once_with("credentials.json", + load_creds.assert_called_once_with( + "credentials.json", scopes=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id="octopus", ) def test_data_policy_service_base_transport_with_adc(): # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( + "google.cloud.bigquery_datapolicies_v2.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages" + ) as Transport: Transport.return_value = None adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport = transports.DataPolicyServiceTransport() @@ -7758,15 +8930,15 @@ def test_data_policy_service_base_transport_with_adc(): def test_data_policy_service_auth_adc(): # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) DataPolicyServiceClient() adc.assert_called_once_with( scopes=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id=None, ) @@ -7781,12 +8953,15 @@ def test_data_policy_service_auth_adc(): def test_data_policy_service_transport_auth_adc(transport_class): # If credentials and host are not provided, the transport class should use # ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport_class(quota_project_id="octopus", scopes=["1", "2"]) adc.assert_called_once_with( scopes=["1", "2"], - default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + default_scopes=( + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id="octopus", ) @@ -7800,39 +8975,38 @@ def test_data_policy_service_transport_auth_adc(transport_class): ], ) def test_data_policy_service_transport_auth_gdch_credentials(transport_class): - host = 'https://language.com' - api_audience_tests = [None, 'https://language2.com'] - api_audience_expect = [host, 'https://language2.com'] + host = "https://language.com" + api_audience_tests = [None, "https://language2.com"] + api_audience_expect = [host, "https://language2.com"] for t, e in zip(api_audience_tests, api_audience_expect): - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: gdch_mock = mock.MagicMock() - type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + type(gdch_mock).with_gdch_audience = mock.PropertyMock( + return_value=gdch_mock + ) adc.return_value = (gdch_mock, None) transport_class(host=host, api_audience=t) - gdch_mock.with_gdch_audience.assert_called_once_with( - e - ) + gdch_mock.with_gdch_audience.assert_called_once_with(e) @pytest.mark.parametrize( "transport_class,grpc_helpers", [ (transports.DataPolicyServiceGrpcTransport, grpc_helpers), - (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async), ], ) def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): # If credentials and host are not provided, the transport class should use # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + with mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( grpc_helpers, "create_channel", autospec=True ) as create_channel: creds = ga_credentials.AnonymousCredentials() adc.return_value = (creds, None) - transport_class( - quota_project_id="octopus", - scopes=["1", "2"] - ) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) create_channel.assert_called_with( "bigquerydatapolicy.googleapis.com:443", @@ -7840,9 +9014,9 @@ def test_data_policy_service_transport_create_channel(transport_class, grpc_help credentials_file=None, quota_project_id="octopus", default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), scopes=["1", "2"], default_host="bigquerydatapolicy.googleapis.com", ssl_credentials=None, @@ -7853,9 +9027,15 @@ def test_data_policy_service_transport_create_channel(transport_class, grpc_help ) -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( - transport_class + transport_class, ): cred = ga_credentials.AnonymousCredentials() @@ -7865,7 +9045,7 @@ def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( transport_class( host="squid.clam.whelk", credentials=cred, - ssl_channel_credentials=mock_ssl_channel_creds + ssl_channel_credentials=mock_ssl_channel_creds, ) mock_create_channel.assert_called_once_with( "squid.clam.whelk:443", @@ -7886,61 +9066,77 @@ def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: transport_class( credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback + client_cert_source_for_mtls=client_cert_source_callback, ) expected_cert, expected_key = client_cert_source_callback() mock_ssl_cred.assert_called_once_with( - certificate_chain=expected_cert, - private_key=expected_key + certificate_chain=expected_cert, private_key=expected_key ) + def test_data_policy_service_http_transport_client_cert_source_for_mtls(): cred = ga_credentials.AnonymousCredentials() - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: - transports.DataPolicyServiceRestTransport ( - credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.DataPolicyServiceRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback ) mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) def test_data_policy_service_host_no_port(transport_name): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), - transport=transport_name, + client_options=client_options.ClientOptions( + api_endpoint="bigquerydatapolicy.googleapis.com" + ), + transport=transport_name, ) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) def test_data_policy_service_host_with_port(transport_name): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + client_options=client_options.ClientOptions( + api_endpoint="bigquerydatapolicy.googleapis.com:8000" + ), transport=transport_name, ) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:8000' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com:8000' + "bigquerydatapolicy.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com:8000" ) -@pytest.mark.parametrize("transport_name", [ - "rest", -]) + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) def test_data_policy_service_client_transport_session_collision(transport_name): creds1 = ga_credentials.AnonymousCredentials() creds2 = ga_credentials.AnonymousCredentials() @@ -7982,8 +9178,10 @@ def test_data_policy_service_client_transport_session_collision(transport_name): session1 = client1.transport.test_iam_permissions._session session2 = client2.transport.test_iam_permissions._session assert session1 != session2 + + def test_data_policy_service_grpc_transport_channel(): - channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + channel = grpc.secure_channel("http://localhost/", grpc.local_channel_credentials()) # Check that channel is used if provided. transport = transports.DataPolicyServiceGrpcTransport( @@ -7996,7 +9194,7 @@ def test_data_policy_service_grpc_transport_channel(): def test_data_policy_service_grpc_asyncio_transport_channel(): - channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + channel = aio.secure_channel("http://localhost/", grpc.local_channel_credentials()) # Check that channel is used if provided. transport = transports.DataPolicyServiceGrpcAsyncIOTransport( @@ -8010,12 +9208,22 @@ def test_data_policy_service_grpc_asyncio_transport_channel(): # Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are # removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) def test_data_policy_service_transport_channel_mtls_with_client_cert_source( - transport_class + transport_class, ): - with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + with mock.patch( + "grpc.ssl_channel_credentials", autospec=True + ) as grpc_ssl_channel_cred: + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: mock_ssl_cred = mock.Mock() grpc_ssl_channel_cred.return_value = mock_ssl_cred @@ -8024,7 +9232,7 @@ def test_data_policy_service_transport_channel_mtls_with_client_cert_source( cred = ga_credentials.AnonymousCredentials() with pytest.warns(DeprecationWarning): - with mock.patch.object(google.auth, 'default') as adc: + with mock.patch.object(google.auth, "default") as adc: adc.return_value = (cred, None) transport = transport_class( host="squid.clam.whelk", @@ -8054,17 +9262,23 @@ def test_data_policy_service_transport_channel_mtls_with_client_cert_source( # Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are # removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_adc( - transport_class -): +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_channel_mtls_with_adc(transport_class): mock_ssl_cred = mock.Mock() with mock.patch.multiple( "google.auth.transport.grpc.SslCredentials", __init__=mock.Mock(return_value=None), ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), ): - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: mock_grpc_channel = mock.Mock() grpc_create_channel.return_value = mock_grpc_channel mock_cred = mock.Mock() @@ -8096,7 +9310,13 @@ def test_data_policy_path(): project = "squid" location = "clam" data_policy = "whelk" - expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + expected = ( + "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format( + project=project, + location=location, + data_policy=data_policy, + ) + ) actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) assert expected == actual @@ -8113,13 +9333,21 @@ def test_parse_data_policy_path(): actual = DataPolicyServiceClient.parse_data_policy_path(path) assert expected == actual + def test_policy_tag_path(): project = "cuttlefish" location = "mussel" taxonomy = "winkle" policy_tag = "nautilus" - expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) - actual = DataPolicyServiceClient.policy_tag_path(project, location, taxonomy, policy_tag) + expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format( + project=project, + location=location, + taxonomy=taxonomy, + policy_tag=policy_tag, + ) + actual = DataPolicyServiceClient.policy_tag_path( + project, location, taxonomy, policy_tag + ) assert expected == actual @@ -8136,11 +9364,16 @@ def test_parse_policy_tag_path(): actual = DataPolicyServiceClient.parse_policy_tag_path(path) assert expected == actual + def test_routine_path(): project = "whelk" dataset = "octopus" routine = "oyster" - expected = "projects/{project}/datasets/{dataset}/routines/{routine}".format(project=project, dataset=dataset, routine=routine, ) + expected = "projects/{project}/datasets/{dataset}/routines/{routine}".format( + project=project, + dataset=dataset, + routine=routine, + ) actual = DataPolicyServiceClient.routine_path(project, dataset, routine) assert expected == actual @@ -8157,9 +9390,12 @@ def test_parse_routine_path(): actual = DataPolicyServiceClient.parse_routine_path(path) assert expected == actual + def test_common_billing_account_path(): billing_account = "winkle" - expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + expected = "billingAccounts/{billing_account}".format( + billing_account=billing_account, + ) actual = DataPolicyServiceClient.common_billing_account_path(billing_account) assert expected == actual @@ -8174,9 +9410,12 @@ def test_parse_common_billing_account_path(): actual = DataPolicyServiceClient.parse_common_billing_account_path(path) assert expected == actual + def test_common_folder_path(): folder = "scallop" - expected = "folders/{folder}".format(folder=folder, ) + expected = "folders/{folder}".format( + folder=folder, + ) actual = DataPolicyServiceClient.common_folder_path(folder) assert expected == actual @@ -8191,9 +9430,12 @@ def test_parse_common_folder_path(): actual = DataPolicyServiceClient.parse_common_folder_path(path) assert expected == actual + def test_common_organization_path(): organization = "squid" - expected = "organizations/{organization}".format(organization=organization, ) + expected = "organizations/{organization}".format( + organization=organization, + ) actual = DataPolicyServiceClient.common_organization_path(organization) assert expected == actual @@ -8208,9 +9450,12 @@ def test_parse_common_organization_path(): actual = DataPolicyServiceClient.parse_common_organization_path(path) assert expected == actual + def test_common_project_path(): project = "whelk" - expected = "projects/{project}".format(project=project, ) + expected = "projects/{project}".format( + project=project, + ) actual = DataPolicyServiceClient.common_project_path(project) assert expected == actual @@ -8225,10 +9470,14 @@ def test_parse_common_project_path(): actual = DataPolicyServiceClient.parse_common_project_path(path) assert expected == actual + def test_common_location_path(): project = "oyster" location = "nudibranch" - expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + expected = "projects/{project}/locations/{location}".format( + project=project, + location=location, + ) actual = DataPolicyServiceClient.common_location_path(project, location) assert expected == actual @@ -8248,14 +9497,18 @@ def test_parse_common_location_path(): def test_client_with_default_client_info(): client_info = gapic_v1.client_info.ClientInfo() - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + with mock.patch.object( + transports.DataPolicyServiceTransport, "_prep_wrapped_messages" + ) as prep: client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), client_info=client_info, ) prep.assert_called_once_with(client_info) - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + with mock.patch.object( + transports.DataPolicyServiceTransport, "_prep_wrapped_messages" + ) as prep: transport_class = DataPolicyServiceClient.get_transport_class() transport = transport_class( credentials=ga_credentials.AnonymousCredentials(), @@ -8266,10 +9519,11 @@ def test_client_with_default_client_info(): def test_transport_close_grpc(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" + credentials=ga_credentials.AnonymousCredentials(), transport="grpc" ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_grpc_channel")), "close" + ) as close: with client: close.assert_not_called() close.assert_called_once() @@ -8278,10 +9532,11 @@ def test_transport_close_grpc(): @pytest.mark.asyncio async def test_transport_close_grpc_asyncio(): client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" + credentials=async_anonymous_credentials(), transport="grpc_asyncio" ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_grpc_channel")), "close" + ) as close: async with client: close.assert_not_called() close.assert_called_once() @@ -8289,10 +9544,11 @@ async def test_transport_close_grpc_asyncio(): def test_transport_close_rest(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) - with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_session")), "close" + ) as close: with client: close.assert_not_called() close.assert_called_once() @@ -8300,13 +9556,12 @@ def test_transport_close_rest(): def test_client_ctx(): transports = [ - 'rest', - 'grpc', + "rest", + "grpc", ] for transport in transports: client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport + credentials=ga_credentials.AnonymousCredentials(), transport=transport ) # Test client calls underlying transport. with mock.patch.object(type(client.transport), "close") as close: @@ -8315,10 +9570,17 @@ def test_client_ctx(): pass close.assert_called() -@pytest.mark.parametrize("client_class,transport_class", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), -]) + +@pytest.mark.parametrize( + "client_class,transport_class", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ), + ], +) def test_api_key_credentials(client_class, transport_class): with mock.patch.object( google.auth._default, "get_api_key_credentials", create=True @@ -8333,7 +9595,9 @@ def test_api_key_credentials(client_class, transport_class): patched.assert_called_once_with( credentials=mock_cred, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py similarity index 100% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/google/cloud/bigquery_datapolicies_v2beta1/services/__init__.py rename to packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1/__init__.py diff --git a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py similarity index 68% rename from owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py rename to packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py index 85d5811560d1..186a6f1c480e 100644 --- a/owl-bot-staging/google-cloud-bigquery-datapolicies/v2beta1/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py +++ b/packages/google-cloud-bigquery-datapolicies/tests/unit/gapic/bigquery_datapolicies_v2beta1/test_data_policy_service.py @@ -14,6 +14,7 @@ # limitations under the License. # import os + # try/except added for compatibility with python < 3.8 try: from unittest import mock @@ -21,50 +22,48 @@ except ImportError: # pragma: NO COVER import mock -import grpc -from grpc.experimental import aio -from collections.abc import Iterable, AsyncIterable -from google.protobuf import json_format +from collections.abc import AsyncIterable, Iterable import json import math -import pytest + from google.api_core import api_core_version -from proto.marshal.rules.dates import DurationRule, TimestampRule +from google.protobuf import json_format +import grpc +from grpc.experimental import aio from proto.marshal.rules import wrappers -from requests import Response -from requests import Request, PreparedRequest +from proto.marshal.rules.dates import DurationRule, TimestampRule +import pytest +from requests import PreparedRequest, Request, Response from requests.sessions import Session -from google.protobuf import json_format try: from google.auth.aio import credentials as ga_credentials_async + HAS_GOOGLE_AUTH_AIO = True -except ImportError: # pragma: NO COVER +except ImportError: # pragma: NO COVER HAS_GOOGLE_AUTH_AIO = False +from google.api_core import gapic_v1, grpc_helpers, grpc_helpers_async, path_template from google.api_core import client_options from google.api_core import exceptions as core_exceptions -from google.api_core import gapic_v1 -from google.api_core import grpc_helpers -from google.api_core import grpc_helpers_async -from google.api_core import path_template from google.api_core import retry as retries +import google.auth from google.auth import credentials as ga_credentials from google.auth.exceptions import MutualTLSChannelError -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import DataPolicyServiceAsyncClient -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import DataPolicyServiceClient -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import pagers -from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import transports -from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy from google.iam.v1 import iam_policy_pb2 # type: ignore from google.iam.v1 import options_pb2 # type: ignore from google.iam.v1 import policy_pb2 # type: ignore from google.oauth2 import service_account from google.protobuf import field_mask_pb2 # type: ignore from google.type import expr_pb2 # type: ignore -import google.auth - +from google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service import ( + DataPolicyServiceAsyncClient, + DataPolicyServiceClient, + pagers, + transports, +) +from google.cloud.bigquery_datapolicies_v2beta1.types import datapolicy CRED_INFO_JSON = { "credential_source": "/path/to/file", @@ -79,9 +78,11 @@ async def mock_async_gen(data, chunk_size=1): chunk = data[i : i + chunk_size] yield chunk.encode("utf-8") + def client_cert_source_callback(): return b"cert bytes", b"key bytes" + # TODO: use async auth anon credentials by default once the minimum version of google-auth is upgraded. # See related issue: https://github.com/googleapis/gapic-generator-python/issues/2107. def async_anonymous_credentials(): @@ -89,17 +90,27 @@ def async_anonymous_credentials(): return ga_credentials_async.AnonymousCredentials() return ga_credentials.AnonymousCredentials() + # If default endpoint is localhost, then default mtls endpoint will be the same. # This method modifies the default endpoint so the client can produce a different # mtls endpoint for endpoint testing purposes. def modify_default_endpoint(client): - return "foo.googleapis.com" if ("localhost" in client.DEFAULT_ENDPOINT) else client.DEFAULT_ENDPOINT + return ( + "foo.googleapis.com" + if ("localhost" in client.DEFAULT_ENDPOINT) + else client.DEFAULT_ENDPOINT + ) + # If default endpoint template is localhost, then default mtls endpoint will be the same. # This method modifies the default endpoint template so the client can produce a different # mtls endpoint for endpoint testing purposes. def modify_default_endpoint_template(client): - return "test.{UNIVERSE_DOMAIN}" if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) else client._DEFAULT_ENDPOINT_TEMPLATE + return ( + "test.{UNIVERSE_DOMAIN}" + if ("localhost" in client._DEFAULT_ENDPOINT_TEMPLATE) + else client._DEFAULT_ENDPOINT_TEMPLATE + ) def test__get_default_mtls_endpoint(): @@ -110,101 +121,237 @@ def test__get_default_mtls_endpoint(): non_googleapi = "api.example.com" assert DataPolicyServiceClient._get_default_mtls_endpoint(None) is None - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) == api_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) == sandbox_mtls_endpoint - assert DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) == non_googleapi + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(api_endpoint) + == api_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(api_mtls_endpoint) + == api_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_endpoint) + == sandbox_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(sandbox_mtls_endpoint) + == sandbox_mtls_endpoint + ) + assert ( + DataPolicyServiceClient._get_default_mtls_endpoint(non_googleapi) + == non_googleapi + ) + def test__read_environment_variables(): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - assert DataPolicyServiceClient._read_environment_variables() == (True, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + True, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "never", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "never", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "always", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "always", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", None) + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + None, + ) with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): with pytest.raises(MutualTLSChannelError) as excinfo: DataPolicyServiceClient._read_environment_variables() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) with mock.patch.dict(os.environ, {"GOOGLE_CLOUD_UNIVERSE_DOMAIN": "foo.com"}): - assert DataPolicyServiceClient._read_environment_variables() == (False, "auto", "foo.com") + assert DataPolicyServiceClient._read_environment_variables() == ( + False, + "auto", + "foo.com", + ) + def test__get_client_cert_source(): mock_provided_cert_source = mock.Mock() mock_default_cert_source = mock.Mock() assert DataPolicyServiceClient._get_client_cert_source(None, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, False) is None - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) == mock_provided_cert_source + assert ( + DataPolicyServiceClient._get_client_cert_source( + mock_provided_cert_source, False + ) + is None + ) + assert ( + DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, True) + == mock_provided_cert_source + ) - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_default_cert_source): - assert DataPolicyServiceClient._get_client_cert_source(None, True) is mock_default_cert_source - assert DataPolicyServiceClient._get_client_cert_source(mock_provided_cert_source, "true") is mock_provided_cert_source + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", return_value=True + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=mock_default_cert_source, + ): + assert ( + DataPolicyServiceClient._get_client_cert_source(None, True) + is mock_default_cert_source + ) + assert ( + DataPolicyServiceClient._get_client_cert_source( + mock_provided_cert_source, "true" + ) + is mock_provided_cert_source + ) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) + +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) def test__get_api_endpoint(): api_override = "foo.com" mock_client_cert_source = mock.Mock() default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=default_universe + ) mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=mock_universe + ) - assert DataPolicyServiceClient._get_api_endpoint(api_override, mock_client_cert_source, default_universe, "always") == api_override - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "auto") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") == default_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, default_universe, "always") == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT - assert DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") == mock_endpoint - assert DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") == default_endpoint + assert ( + DataPolicyServiceClient._get_api_endpoint( + api_override, mock_client_cert_source, default_universe, "always" + ) + == api_override + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, default_universe, "auto" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "auto") + == default_endpoint + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, None, default_universe, "always" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, default_universe, "always" + ) + == DataPolicyServiceClient.DEFAULT_MTLS_ENDPOINT + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, mock_universe, "never") + == mock_endpoint + ) + assert ( + DataPolicyServiceClient._get_api_endpoint(None, None, default_universe, "never") + == default_endpoint + ) with pytest.raises(MutualTLSChannelError) as excinfo: - DataPolicyServiceClient._get_api_endpoint(None, mock_client_cert_source, mock_universe, "auto") - assert str(excinfo.value) == "mTLS is not supported in any universe other than googleapis.com." + DataPolicyServiceClient._get_api_endpoint( + None, mock_client_cert_source, mock_universe, "auto" + ) + assert ( + str(excinfo.value) + == "mTLS is not supported in any universe other than googleapis.com." + ) def test__get_universe_domain(): client_universe_domain = "foo.com" universe_domain_env = "bar.com" - assert DataPolicyServiceClient._get_universe_domain(client_universe_domain, universe_domain_env) == client_universe_domain - assert DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) == universe_domain_env - assert DataPolicyServiceClient._get_universe_domain(None, None) == DataPolicyServiceClient._DEFAULT_UNIVERSE + assert ( + DataPolicyServiceClient._get_universe_domain( + client_universe_domain, universe_domain_env + ) + == client_universe_domain + ) + assert ( + DataPolicyServiceClient._get_universe_domain(None, universe_domain_env) + == universe_domain_env + ) + assert ( + DataPolicyServiceClient._get_universe_domain(None, None) + == DataPolicyServiceClient._DEFAULT_UNIVERSE + ) with pytest.raises(ValueError) as excinfo: DataPolicyServiceClient._get_universe_domain("", None) assert str(excinfo.value) == "Universe Domain cannot be an empty string." -@pytest.mark.parametrize("error_code,cred_info_json,show_cred_info", [ - (401, CRED_INFO_JSON, True), - (403, CRED_INFO_JSON, True), - (404, CRED_INFO_JSON, True), - (500, CRED_INFO_JSON, False), - (401, None, False), - (403, None, False), - (404, None, False), - (500, None, False) -]) + +@pytest.mark.parametrize( + "error_code,cred_info_json,show_cred_info", + [ + (401, CRED_INFO_JSON, True), + (403, CRED_INFO_JSON, True), + (404, CRED_INFO_JSON, True), + (500, CRED_INFO_JSON, False), + (401, None, False), + (403, None, False), + (404, None, False), + (500, None, False), + ], +) def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_info): cred = mock.Mock(["get_cred_info"]) cred.get_cred_info = mock.Mock(return_value=cred_info_json) @@ -220,7 +367,8 @@ def test__add_cred_info_for_auth_errors(error_code, cred_info_json, show_cred_in else: assert error.details == ["foo"] -@pytest.mark.parametrize("error_code", [401,403,404,500]) + +@pytest.mark.parametrize("error_code", [401, 403, 404, 500]) def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): cred = mock.Mock([]) assert not hasattr(cred, "get_cred_info") @@ -233,14 +381,22 @@ def test__add_cred_info_for_auth_errors_no_get_cred_info(error_code): client._add_cred_info_for_auth_errors(error) assert error.details == [] -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_info(client_class, transport_name): + +@pytest.mark.parametrize( + "client_class,transport_name", + [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), + ], +) +def test_data_policy_service_client_from_service_account_info( + client_class, transport_name +): creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_info') as factory: + with mock.patch.object( + service_account.Credentials, "from_service_account_info" + ) as factory: factory.return_value = creds info = {"valid": True} client = client_class.from_service_account_info(info, transport=transport_name) @@ -248,52 +404,70 @@ def test_data_policy_service_client_from_service_account_info(client_class, tran assert isinstance(client, client_class) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) -@pytest.mark.parametrize("transport_class,transport_name", [ - (transports.DataPolicyServiceGrpcTransport, "grpc"), - (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_service_account_always_use_jwt(transport_class, transport_name): - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: +@pytest.mark.parametrize( + "transport_class,transport_name", + [ + (transports.DataPolicyServiceGrpcTransport, "grpc"), + (transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.DataPolicyServiceRestTransport, "rest"), + ], +) +def test_data_policy_service_client_service_account_always_use_jwt( + transport_class, transport_name +): + with mock.patch.object( + service_account.Credentials, "with_always_use_jwt_access", create=True + ) as use_jwt: creds = service_account.Credentials(None, None, None) transport = transport_class(credentials=creds, always_use_jwt_access=True) use_jwt.assert_called_once_with(True) - with mock.patch.object(service_account.Credentials, 'with_always_use_jwt_access', create=True) as use_jwt: + with mock.patch.object( + service_account.Credentials, "with_always_use_jwt_access", create=True + ) as use_jwt: creds = service_account.Credentials(None, None, None) transport = transport_class(credentials=creds, always_use_jwt_access=False) use_jwt.assert_not_called() -@pytest.mark.parametrize("client_class,transport_name", [ - (DataPolicyServiceClient, "grpc"), - (DataPolicyServiceAsyncClient, "grpc_asyncio"), - (DataPolicyServiceClient, "rest"), -]) -def test_data_policy_service_client_from_service_account_file(client_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_name", + [ + (DataPolicyServiceClient, "grpc"), + (DataPolicyServiceAsyncClient, "grpc_asyncio"), + (DataPolicyServiceClient, "rest"), + ], +) +def test_data_policy_service_client_from_service_account_file( + client_class, transport_name +): creds = ga_credentials.AnonymousCredentials() - with mock.patch.object(service_account.Credentials, 'from_service_account_file') as factory: + with mock.patch.object( + service_account.Credentials, "from_service_account_file" + ) as factory: factory.return_value = creds - client = client_class.from_service_account_file("dummy/file/path.json", transport=transport_name) + client = client_class.from_service_account_file( + "dummy/file/path.json", transport=transport_name + ) assert client.transport._credentials == creds assert isinstance(client, client_class) - client = client_class.from_service_account_json("dummy/file/path.json", transport=transport_name) + client = client_class.from_service_account_json( + "dummy/file/path.json", transport=transport_name + ) assert client.transport._credentials == creds assert isinstance(client, client_class) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else - 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) @@ -309,30 +483,45 @@ def test_data_policy_service_client_get_transport_class(): assert transport == transports.DataPolicyServiceGrpcTransport -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) -def test_data_policy_service_client_client_options(client_class, transport_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + ), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), + ], +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) +def test_data_policy_service_client_client_options( + client_class, transport_class, transport_name +): # Check that if channel is provided we won't create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials() - ) + with mock.patch.object(DataPolicyServiceClient, "get_transport_class") as gtc: + transport = transport_class(credentials=ga_credentials.AnonymousCredentials()) client = client_class(transport=transport) gtc.assert_not_called() # Check that if channel is provided via str we will create a new one. - with mock.patch.object(DataPolicyServiceClient, 'get_transport_class') as gtc: + with mock.patch.object(DataPolicyServiceClient, "get_transport_class") as gtc: client = client_class(transport=transport_name) gtc.assert_called() # Check the case api_endpoint is provided. options = client_options.ClientOptions(api_endpoint="squid.clam.whelk") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name, client_options=options) patched.assert_called_once_with( @@ -350,13 +539,15 @@ def test_data_policy_service_client_client_options(client_class, transport_class # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is # "never". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -368,7 +559,7 @@ def test_data_policy_service_client_client_options(client_class, transport_class # Check the case api_endpoint is not provided and GOOGLE_API_USE_MTLS_ENDPOINT is # "always". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( @@ -388,23 +579,33 @@ def test_data_policy_service_client_client_options(client_class, transport_class with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): with pytest.raises(MutualTLSChannelError) as excinfo: client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: client = client_class(transport=transport_name) - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) # Check the case quota_project_id is provided options = client_options.ClientOptions(quota_project_id="octopus") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id="octopus", @@ -413,48 +614,102 @@ def test_data_policy_service_client_client_options(client_class, transport_class api_audience=None, ) # Check the case api_endpoint is provided - options = client_options.ClientOptions(api_audience="https://language.googleapis.com") - with mock.patch.object(transport_class, '__init__') as patched: + options = client_options.ClientOptions( + api_audience="https://language.googleapis.com" + ) + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, client_info=transports.base.DEFAULT_CLIENT_INFO, always_use_jwt_access=True, - api_audience="https://language.googleapis.com" - ) - -@pytest.mark.parametrize("client_class,transport_class,transport_name,use_client_cert_env", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "true"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", "false"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", "false"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "true"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", "false"), -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) + api_audience="https://language.googleapis.com", + ) + + +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,use_client_cert_env", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + "true", + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + "true", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + "false", + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + "false", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + "true", + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + "false", + ), + ], +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) @mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "auto"}) -def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, transport_name, use_client_cert_env): +def test_data_policy_service_client_mtls_env_auto( + client_class, transport_class, transport_name, use_client_cert_env +): # This tests the endpoint autoswitch behavior. Endpoint is autoswitched to the default # mtls endpoint, if GOOGLE_API_USE_CLIENT_CERTIFICATE is "true" and client cert exists. # Check the case client_cert_source is provided. Whether client cert is used depends on # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - options = client_options.ClientOptions(client_cert_source=client_cert_source_callback) - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + options = client_options.ClientOptions( + client_cert_source=client_cert_source_callback + ) + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) if use_client_cert_env == "false": expected_client_cert_source = None - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ) else: expected_client_cert_source = client_cert_source_callback expected_host = client.DEFAULT_MTLS_ENDPOINT @@ -473,12 +728,22 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, # Check the case ADC client cert is provided. Whether client cert is used depends on # GOOGLE_API_USE_CLIENT_CERTIFICATE value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=client_cert_source_callback): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + with mock.patch.object(transport_class, "__init__") as patched: + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=True, + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=client_cert_source_callback, + ): if use_client_cert_env == "false": - expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE) + expected_host = client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ) expected_client_cert_source = None else: expected_host = client.DEFAULT_MTLS_ENDPOINT @@ -499,15 +764,22 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, ) # Check the case client_cert_source and ADC client cert are not provided. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env}): - with mock.patch.object(transport_class, '__init__') as patched: - with mock.patch("google.auth.transport.mtls.has_default_client_cert_source", return_value=False): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": use_client_cert_env} + ): + with mock.patch.object(transport_class, "__init__") as patched: + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=False, + ): patched.return_value = None client = client_class(transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -517,19 +789,31 @@ def test_data_policy_service_client_mtls_env_auto(client_class, transport_class, ) -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "DEFAULT_ENDPOINT", modify_default_endpoint(DataPolicyServiceAsyncClient)) +@pytest.mark.parametrize( + "client_class", [DataPolicyServiceClient, DataPolicyServiceAsyncClient] +) +@mock.patch.object( + DataPolicyServiceClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(DataPolicyServiceAsyncClient), +) def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_class): mock_client_cert_source = mock.Mock() # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) assert api_endpoint == mock_api_endpoint assert cert_source == mock_client_cert_source @@ -537,8 +821,12 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): mock_client_cert_source = mock.Mock() mock_api_endpoint = "foo" - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint) - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source(options) + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) assert api_endpoint == mock_api_endpoint assert cert_source is None @@ -556,16 +844,28 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=False): + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=False, + ): api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() assert api_endpoint == client_class.DEFAULT_ENDPOINT assert cert_source is None # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch('google.auth.transport.mtls.has_default_client_cert_source', return_value=True): - with mock.patch('google.auth.transport.mtls.default_client_cert_source', return_value=mock_client_cert_source): - api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=True, + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=mock_client_cert_source, + ): + ( + api_endpoint, + cert_source, + ) = client_class.get_mtls_endpoint_and_cert_source() assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT assert cert_source == mock_client_cert_source @@ -575,34 +875,62 @@ def test_data_policy_service_client_get_mtls_endpoint_and_cert_source(client_cla with pytest.raises(MutualTLSChannelError) as excinfo: client_class.get_mtls_endpoint_and_cert_source() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. - with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"}): + with mock.patch.dict( + os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} + ): with pytest.raises(ValueError) as excinfo: client_class.get_mtls_endpoint_and_cert_source() - assert str(excinfo.value) == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + assert ( + str(excinfo.value) + == "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) + -@pytest.mark.parametrize("client_class", [ - DataPolicyServiceClient, DataPolicyServiceAsyncClient -]) -@mock.patch.object(DataPolicyServiceClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceClient)) -@mock.patch.object(DataPolicyServiceAsyncClient, "_DEFAULT_ENDPOINT_TEMPLATE", modify_default_endpoint_template(DataPolicyServiceAsyncClient)) +@pytest.mark.parametrize( + "client_class", [DataPolicyServiceClient, DataPolicyServiceAsyncClient] +) +@mock.patch.object( + DataPolicyServiceClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceClient), +) +@mock.patch.object( + DataPolicyServiceAsyncClient, + "_DEFAULT_ENDPOINT_TEMPLATE", + modify_default_endpoint_template(DataPolicyServiceAsyncClient), +) def test_data_policy_service_client_client_api_endpoint(client_class): mock_client_cert_source = client_cert_source_callback api_override = "foo.com" default_universe = DataPolicyServiceClient._DEFAULT_UNIVERSE - default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=default_universe) + default_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=default_universe + ) mock_universe = "bar.com" - mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=mock_universe) + mock_endpoint = DataPolicyServiceClient._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=mock_universe + ) # If ClientOptions.api_endpoint is set and GOOGLE_API_USE_CLIENT_CERTIFICATE="true", # use ClientOptions.api_endpoint as the api endpoint regardless. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel"): - options = client_options.ClientOptions(client_cert_source=mock_client_cert_source, api_endpoint=api_override) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ): + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=api_override + ) + client = client_class( + client_options=options, + credentials=ga_credentials.AnonymousCredentials(), + ) assert client.api_endpoint == api_override # If ClientOptions.api_endpoint is not set and GOOGLE_API_USE_MTLS_ENDPOINT="never", @@ -625,11 +953,19 @@ def test_data_policy_service_client_client_api_endpoint(client_class): universe_exists = hasattr(options, "universe_domain") if universe_exists: options = client_options.ClientOptions(universe_domain=mock_universe) - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) else: - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) - assert client.api_endpoint == (mock_endpoint if universe_exists else default_endpoint) - assert client.universe_domain == (mock_universe if universe_exists else default_universe) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + assert client.api_endpoint == ( + mock_endpoint if universe_exists else default_endpoint + ) + assert client.universe_domain == ( + mock_universe if universe_exists else default_universe + ) # If ClientOptions does not have a universe domain attribute and GOOGLE_API_USE_MTLS_ENDPOINT="never", # use the _DEFAULT_ENDPOINT_TEMPLATE populated with GDU as the api endpoint. @@ -637,27 +973,40 @@ def test_data_policy_service_client_client_api_endpoint(client_class): if hasattr(options, "universe_domain"): delattr(options, "universe_domain") with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): - client = client_class(client_options=options, credentials=ga_credentials.AnonymousCredentials()) + client = client_class( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) assert client.api_endpoint == default_endpoint -@pytest.mark.parametrize("client_class,transport_class,transport_name", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio"), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), -]) -def test_data_policy_service_client_client_options_scopes(client_class, transport_class, transport_name): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc"), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + ), + (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest"), + ], +) +def test_data_policy_service_client_client_options_scopes( + client_class, transport_class, transport_name +): # Check the case scopes are provided. options = client_options.ClientOptions( scopes=["1", "2"], ) - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=["1", "2"], client_cert_source_for_mtls=None, quota_project_id=None, @@ -666,24 +1015,45 @@ def test_data_policy_service_client_client_options_scopes(client_class, transpor api_audience=None, ) -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), - (DataPolicyServiceClient, transports.DataPolicyServiceRestTransport, "rest", None), -]) -def test_data_policy_service_client_client_options_credentials_file(client_class, transport_class, transport_name, grpc_helpers): + +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ( + DataPolicyServiceClient, + transports.DataPolicyServiceRestTransport, + "rest", + None, + ), + ], +) +def test_data_policy_service_client_client_options_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) + options = client_options.ClientOptions(credentials_file="credentials.json") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -692,11 +1062,14 @@ def test_data_policy_service_client_client_options_credentials_file(client_class api_audience=None, ) + def test_data_policy_service_client_client_options_from_dict(): - with mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__') as grpc_transport: + with mock.patch( + "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceGrpcTransport.__init__" + ) as grpc_transport: grpc_transport.return_value = None client = DataPolicyServiceClient( - client_options={'api_endpoint': 'squid.clam.whelk'} + client_options={"api_endpoint": "squid.clam.whelk"} ) grpc_transport.assert_called_once_with( credentials=None, @@ -711,23 +1084,38 @@ def test_data_policy_service_client_client_options_from_dict(): ) -@pytest.mark.parametrize("client_class,transport_class,transport_name,grpc_helpers", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport, "grpc", grpc_helpers), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport, "grpc_asyncio", grpc_helpers_async), -]) -def test_data_policy_service_client_create_channel_credentials_file(client_class, transport_class, transport_name, grpc_helpers): +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + DataPolicyServiceClient, + transports.DataPolicyServiceGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ], +) +def test_data_policy_service_client_create_channel_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): # Check the case credentials file is provided. - options = client_options.ClientOptions( - credentials_file="credentials.json" - ) + options = client_options.ClientOptions(credentials_file="credentials.json") - with mock.patch.object(transport_class, '__init__') as patched: + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file="credentials.json", - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None, @@ -755,9 +1143,9 @@ def test_data_policy_service_client_create_channel_credentials_file(client_class credentials_file=None, quota_project_id=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), scopes=None, default_host="bigquerydatapolicy.googleapis.com", ssl_credentials=None, @@ -768,11 +1156,14 @@ def test_data_policy_service_client_create_channel_credentials_file(client_class ) -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) -def test_create_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.CreateDataPolicyRequest, + dict, + ], +) +def test_create_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -784,16 +1175,16 @@ def test_create_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.create_data_policy(request) @@ -806,12 +1197,15 @@ def test_create_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -820,30 +1214,33 @@ def test_create_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.CreateDataPolicyRequest( - parent='parent_value', - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy_id="data_policy_id_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.create_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.create_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.CreateDataPolicyRequest( - parent='parent_value', - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy_id="data_policy_id_value", ) + def test_create_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -858,12 +1255,18 @@ def test_create_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods + assert ( + client._transport.create_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.create_data_policy + ] = mock_rpc request = {} client.create_data_policy(request) @@ -876,8 +1279,11 @@ def test_create_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_create_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -891,12 +1297,17 @@ async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.create_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.create_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.create_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.create_data_policy + ] = mock_rpc request = {} await client.create_data_policy(request) @@ -910,8 +1321,11 @@ async def test_create_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.CreateDataPolicyRequest): +async def test_create_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.CreateDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -923,18 +1337,20 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.create_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -945,12 +1361,15 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -958,6 +1377,7 @@ async def test_create_data_policy_async(transport: str = 'grpc_asyncio', request async def test_create_data_policy_async_from_dict(): await test_create_data_policy_async(request_type=dict) + def test_create_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -967,12 +1387,12 @@ def test_create_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.CreateDataPolicyRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.create_data_policy(request) @@ -984,9 +1404,9 @@ def test_create_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -999,13 +1419,15 @@ async def test_create_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.CreateDataPolicyRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + type(client.transport.create_data_policy), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.create_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -1016,9 +1438,9 @@ async def test_create_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] def test_create_data_policy_flattened(): @@ -1028,16 +1450,20 @@ def test_create_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) # Establish that the underlying call was made with the expected @@ -1045,13 +1471,17 @@ def test_create_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].data_policy_id - mock_val = 'data_policy_id_value' + mock_val = "data_policy_id_value" assert arg == mock_val @@ -1065,11 +1495,16 @@ def test_create_data_policy_flattened_error(): with pytest.raises(ValueError): client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) + @pytest.mark.asyncio async def test_create_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1078,18 +1513,24 @@ async def test_create_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.create_data_policy( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) # Establish that the underlying call was made with the expected @@ -1097,15 +1538,20 @@ async def test_create_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].data_policy_id - mock_val = 'data_policy_id_value' + mock_val = "data_policy_id_value" assert arg == mock_val + @pytest.mark.asyncio async def test_create_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1117,17 +1563,24 @@ async def test_create_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.AddGranteesRequest, - dict, -]) -def test_add_grantees(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.AddGranteesRequest, + dict, + ], +) +def test_add_grantees(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1138,17 +1591,15 @@ def test_add_grantees(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.add_grantees(request) @@ -1161,12 +1612,15 @@ def test_add_grantees(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1175,28 +1629,29 @@ def test_add_grantees_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.AddGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.add_grantees(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.AddGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) + def test_add_grantees_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -1215,7 +1670,9 @@ def test_add_grantees_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc request = {} client.add_grantees(request) @@ -1229,8 +1686,11 @@ def test_add_grantees_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_add_grantees_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1244,12 +1704,17 @@ async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_ wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.add_grantees in client._client._transport._wrapped_methods + assert ( + client._client._transport.add_grantees + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.add_grantees] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.add_grantees + ] = mock_rpc request = {} await client.add_grantees(request) @@ -1263,8 +1728,11 @@ async def test_add_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_ assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.AddGranteesRequest): +async def test_add_grantees_async( + transport: str = "grpc_asyncio", request_type=datapolicy.AddGranteesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1275,19 +1743,19 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.add_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1298,12 +1766,15 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1311,6 +1782,7 @@ async def test_add_grantees_async(transport: str = 'grpc_asyncio', request_type= async def test_add_grantees_async_from_dict(): await test_add_grantees_async(request_type=dict) + def test_add_grantees_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -1320,12 +1792,10 @@ def test_add_grantees_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.AddGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.add_grantees(request) @@ -1337,9 +1807,9 @@ def test_add_grantees_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -1352,13 +1822,13 @@ async def test_add_grantees_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.AddGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.add_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1369,9 +1839,9 @@ async def test_add_grantees_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] def test_add_grantees_flattened(): @@ -1380,16 +1850,14 @@ def test_add_grantees_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.add_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1397,10 +1865,10 @@ def test_add_grantees_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val @@ -1414,10 +1882,11 @@ def test_add_grantees_flattened_error(): with pytest.raises(ValueError): client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) + @pytest.mark.asyncio async def test_add_grantees_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1425,18 +1894,18 @@ async def test_add_grantees_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.add_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1444,12 +1913,13 @@ async def test_add_grantees_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val + @pytest.mark.asyncio async def test_add_grantees_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1461,16 +1931,19 @@ async def test_add_grantees_flattened_error_async(): with pytest.raises(ValueError): await client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) -@pytest.mark.parametrize("request_type", [ - datapolicy.RemoveGranteesRequest, - dict, -]) -def test_remove_grantees(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.RemoveGranteesRequest, + dict, + ], +) +def test_remove_grantees(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1481,17 +1954,15 @@ def test_remove_grantees(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.remove_grantees(request) @@ -1504,12 +1975,15 @@ def test_remove_grantees(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1518,28 +1992,29 @@ def test_remove_grantees_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.RemoveGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.remove_grantees(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.RemoveGranteesRequest( - data_policy='data_policy_value', + data_policy="data_policy_value", ) + def test_remove_grantees_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -1558,7 +2033,9 @@ def test_remove_grantees_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc request = {} client.remove_grantees(request) @@ -1572,8 +2049,11 @@ def test_remove_grantees_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_remove_grantees_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1587,12 +2067,17 @@ async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "gr wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.remove_grantees in client._client._transport._wrapped_methods + assert ( + client._client._transport.remove_grantees + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.remove_grantees] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.remove_grantees + ] = mock_rpc request = {} await client.remove_grantees(request) @@ -1606,8 +2091,11 @@ async def test_remove_grantees_async_use_cached_wrapped_rpc(transport: str = "gr assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_type=datapolicy.RemoveGranteesRequest): +async def test_remove_grantees_async( + transport: str = "grpc_asyncio", request_type=datapolicy.RemoveGranteesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1618,19 +2106,19 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.remove_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1641,12 +2129,15 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1654,6 +2145,7 @@ async def test_remove_grantees_async(transport: str = 'grpc_asyncio', request_ty async def test_remove_grantees_async_from_dict(): await test_remove_grantees_async(request_type=dict) + def test_remove_grantees_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -1663,12 +2155,10 @@ def test_remove_grantees_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.RemoveGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.remove_grantees(request) @@ -1680,9 +2170,9 @@ def test_remove_grantees_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -1695,13 +2185,13 @@ async def test_remove_grantees_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.RemoveGranteesRequest() - request.data_policy = 'data_policy_value' + request.data_policy = "data_policy_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.remove_grantees(request) # Establish that the underlying gRPC stub method was called. @@ -1712,9 +2202,9 @@ async def test_remove_grantees_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy=data_policy_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy=data_policy_value", + ) in kw["metadata"] def test_remove_grantees_flattened(): @@ -1723,16 +2213,14 @@ def test_remove_grantees_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.remove_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1740,10 +2228,10 @@ def test_remove_grantees_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val @@ -1757,10 +2245,11 @@ def test_remove_grantees_flattened_error(): with pytest.raises(ValueError): client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) + @pytest.mark.asyncio async def test_remove_grantees_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -1768,18 +2257,18 @@ async def test_remove_grantees_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.remove_grantees( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) # Establish that the underlying call was made with the expected @@ -1787,12 +2276,13 @@ async def test_remove_grantees_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = 'data_policy_value' + mock_val = "data_policy_value" assert arg == mock_val arg = args[0].grantees - mock_val = ['grantees_value'] + mock_val = ["grantees_value"] assert arg == mock_val + @pytest.mark.asyncio async def test_remove_grantees_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -1804,16 +2294,19 @@ async def test_remove_grantees_flattened_error_async(): with pytest.raises(ValueError): await client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) -def test_update_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.UpdateDataPolicyRequest, + dict, + ], +) +def test_update_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -1825,16 +2318,16 @@ def test_update_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.update_data_policy(request) @@ -1847,12 +2340,15 @@ def test_update_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1861,25 +2357,26 @@ def test_update_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. - request = datapolicy.UpdateDataPolicyRequest( - ) + request = datapolicy.UpdateDataPolicyRequest() # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.update_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.update_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] - assert args[0] == datapolicy.UpdateDataPolicyRequest( - ) + assert args[0] == datapolicy.UpdateDataPolicyRequest() + def test_update_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, @@ -1895,12 +2392,18 @@ def test_update_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods + assert ( + client._transport.update_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.update_data_policy + ] = mock_rpc request = {} client.update_data_policy(request) @@ -1913,8 +2416,11 @@ def test_update_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_update_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -1928,12 +2434,17 @@ async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.update_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.update_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.update_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.update_data_policy + ] = mock_rpc request = {} await client.update_data_policy(request) @@ -1947,8 +2458,11 @@ async def test_update_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.UpdateDataPolicyRequest): +async def test_update_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.UpdateDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -1960,18 +2474,20 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.update_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -1982,12 +2498,15 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -1995,6 +2514,7 @@ async def test_update_data_policy_async(transport: str = 'grpc_asyncio', request async def test_update_data_policy_async_from_dict(): await test_update_data_policy_async(request_type=dict) + def test_update_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2004,12 +2524,12 @@ def test_update_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.UpdateDataPolicyRequest() - request.data_policy.name = 'name_value' + request.data_policy.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.update_data_policy(request) @@ -2021,9 +2541,9 @@ def test_update_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy.name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2036,13 +2556,15 @@ async def test_update_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.UpdateDataPolicyRequest() - request.data_policy.name = 'name_value' + request.data_policy.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + type(client.transport.update_data_policy), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.update_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2053,9 +2575,9 @@ async def test_update_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'data_policy.name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "data_policy.name=name_value", + ) in kw["metadata"] def test_update_data_policy_flattened(): @@ -2065,15 +2587,19 @@ def test_update_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.update_data_policy( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) # Establish that the underlying call was made with the expected @@ -2081,10 +2607,14 @@ def test_update_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) assert arg == mock_val @@ -2098,10 +2628,15 @@ def test_update_data_policy_flattened_error(): with pytest.raises(ValueError): client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) + @pytest.mark.asyncio async def test_update_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2110,17 +2645,23 @@ async def test_update_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.update_data_policy( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) # Establish that the underlying call was made with the expected @@ -2128,12 +2669,17 @@ async def test_update_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].data_policy - mock_val = datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)) + mock_val = datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ) assert arg == mock_val arg = args[0].update_mask - mock_val = field_mask_pb2.FieldMask(paths=['paths_value']) + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) assert arg == mock_val + @pytest.mark.asyncio async def test_update_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2145,16 +2691,23 @@ async def test_update_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) -def test_delete_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.DeleteDataPolicyRequest, + dict, + ], +) +def test_delete_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2166,8 +2719,8 @@ def test_delete_data_policy(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None response = client.delete_data_policy(request) @@ -2187,28 +2740,31 @@ def test_delete_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.DeleteDataPolicyRequest( - name='name_value', + name="name_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.delete_data_policy), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.delete_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.DeleteDataPolicyRequest( - name='name_value', + name="name_value", ) + def test_delete_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2223,12 +2779,18 @@ def test_delete_data_policy_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods + assert ( + client._transport.delete_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.delete_data_policy + ] = mock_rpc request = {} client.delete_data_policy(request) @@ -2241,8 +2803,11 @@ def test_delete_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_delete_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2256,12 +2821,17 @@ async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.delete_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.delete_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.delete_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.delete_data_policy + ] = mock_rpc request = {} await client.delete_data_policy(request) @@ -2275,8 +2845,11 @@ async def test_delete_data_policy_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.DeleteDataPolicyRequest): +async def test_delete_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.DeleteDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2288,8 +2861,8 @@ async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) response = await client.delete_data_policy(request) @@ -2308,6 +2881,7 @@ async def test_delete_data_policy_async(transport: str = 'grpc_asyncio', request async def test_delete_data_policy_async_from_dict(): await test_delete_data_policy_async(request_type=dict) + def test_delete_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2317,12 +2891,12 @@ def test_delete_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.DeleteDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = None client.delete_data_policy(request) @@ -2334,9 +2908,9 @@ def test_delete_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2349,12 +2923,12 @@ async def test_delete_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.DeleteDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) await client.delete_data_policy(request) @@ -2366,9 +2940,9 @@ async def test_delete_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] def test_delete_data_policy_flattened(): @@ -2378,14 +2952,14 @@ def test_delete_data_policy_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.delete_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2393,7 +2967,7 @@ def test_delete_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val @@ -2407,9 +2981,10 @@ def test_delete_data_policy_flattened_error(): with pytest.raises(ValueError): client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) + @pytest.mark.asyncio async def test_delete_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2418,8 +2993,8 @@ async def test_delete_data_policy_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = None @@ -2427,7 +3002,7 @@ async def test_delete_data_policy_flattened_async(): # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.delete_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2435,9 +3010,10 @@ async def test_delete_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val + @pytest.mark.asyncio async def test_delete_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2449,15 +3025,18 @@ async def test_delete_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) -def test_get_data_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.GetDataPolicyRequest, + dict, + ], +) +def test_get_data_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2468,17 +3047,15 @@ def test_get_data_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], + policy_tag="policy_tag_value", + grantees=["grantees_value"], version=datapolicy.DataPolicy.Version.V1, ) response = client.get_data_policy(request) @@ -2491,12 +3068,15 @@ def test_get_data_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -2505,28 +3085,29 @@ def test_get_data_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.GetDataPolicyRequest( - name='name_value', + name="name_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.get_data_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.GetDataPolicyRequest( - name='name_value', + name="name_value", ) + def test_get_data_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2545,7 +3126,9 @@ def test_get_data_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc request = {} client.get_data_policy(request) @@ -2559,8 +3142,11 @@ def test_get_data_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_get_data_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2574,12 +3160,17 @@ async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "gr wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.get_data_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.get_data_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_data_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.get_data_policy + ] = mock_rpc request = {} await client.get_data_policy(request) @@ -2593,8 +3184,11 @@ async def test_get_data_policy_async_use_cached_wrapped_rpc(transport: str = "gr assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_type=datapolicy.GetDataPolicyRequest): +async def test_get_data_policy_async( + transport: str = "grpc_asyncio", request_type=datapolicy.GetDataPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2605,19 +3199,19 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) response = await client.get_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2628,12 +3222,15 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -2641,6 +3238,7 @@ async def test_get_data_policy_async(transport: str = 'grpc_asyncio', request_ty async def test_get_data_policy_async_from_dict(): await test_get_data_policy_async(request_type=dict) + def test_get_data_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2650,12 +3248,10 @@ def test_get_data_policy_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.GetDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.get_data_policy(request) @@ -2667,9 +3263,9 @@ def test_get_data_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2682,13 +3278,13 @@ async def test_get_data_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.GetDataPolicyRequest() - request.name = 'name_value' + request.name = "name_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) await client.get_data_policy(request) # Establish that the underlying gRPC stub method was called. @@ -2699,9 +3295,9 @@ async def test_get_data_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'name=name_value', - ) in kw['metadata'] + "x-goog-request-params", + "name=name_value", + ) in kw["metadata"] def test_get_data_policy_flattened(): @@ -2710,15 +3306,13 @@ def test_get_data_policy_flattened(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.get_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2726,7 +3320,7 @@ def test_get_data_policy_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val @@ -2740,9 +3334,10 @@ def test_get_data_policy_flattened_error(): with pytest.raises(ValueError): client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) + @pytest.mark.asyncio async def test_get_data_policy_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -2750,17 +3345,17 @@ async def test_get_data_policy_flattened_async(): ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.DataPolicy() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.get_data_policy( - name='name_value', + name="name_value", ) # Establish that the underlying call was made with the expected @@ -2768,9 +3363,10 @@ async def test_get_data_policy_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].name - mock_val = 'name_value' + mock_val = "name_value" assert arg == mock_val + @pytest.mark.asyncio async def test_get_data_policy_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -2782,15 +3378,18 @@ async def test_get_data_policy_flattened_error_async(): with pytest.raises(ValueError): await client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) -def test_list_data_policies(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.ListDataPoliciesRequest, + dict, + ], +) +def test_list_data_policies(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -2802,11 +3401,11 @@ def test_list_data_policies(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', + next_page_token="next_page_token_value", ) response = client.list_data_policies(request) @@ -2818,7 +3417,7 @@ def test_list_data_policies(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" def test_list_data_policies_non_empty_request_with_auto_populated_field(): @@ -2826,30 +3425,33 @@ def test_list_data_policies_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', + parent="parent_value", + page_token="page_token_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.list_data_policies), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.list_data_policies(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == datapolicy.ListDataPoliciesRequest( - parent='parent_value', - page_token='page_token_value', + parent="parent_value", + page_token="page_token_value", ) + def test_list_data_policies_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -2864,12 +3466,18 @@ def test_list_data_policies_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods + assert ( + client._transport.list_data_policies in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.list_data_policies + ] = mock_rpc request = {} client.list_data_policies(request) @@ -2882,8 +3490,11 @@ def test_list_data_policies_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_list_data_policies_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -2897,12 +3508,17 @@ async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.list_data_policies in client._client._transport._wrapped_methods + assert ( + client._client._transport.list_data_policies + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.list_data_policies] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.list_data_policies + ] = mock_rpc request = {} await client.list_data_policies(request) @@ -2916,8 +3532,11 @@ async def test_list_data_policies_async_use_cached_wrapped_rpc(transport: str = assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request_type=datapolicy.ListDataPoliciesRequest): +async def test_list_data_policies_async( + transport: str = "grpc_asyncio", request_type=datapolicy.ListDataPoliciesRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -2929,12 +3548,14 @@ async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse( + next_page_token="next_page_token_value", + ) + ) response = await client.list_data_policies(request) # Establish that the underlying gRPC stub method was called. @@ -2945,13 +3566,14 @@ async def test_list_data_policies_async(transport: str = 'grpc_asyncio', request # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesAsyncPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" @pytest.mark.asyncio async def test_list_data_policies_async_from_dict(): await test_list_data_policies_async(request_type=dict) + def test_list_data_policies_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -2961,12 +3583,12 @@ def test_list_data_policies_field_headers(): # a field header. Set these to a non-empty value. request = datapolicy.ListDataPoliciesRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: call.return_value = datapolicy.ListDataPoliciesResponse() client.list_data_policies(request) @@ -2978,9 +3600,9 @@ def test_list_data_policies_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -2993,13 +3615,15 @@ async def test_list_data_policies_field_headers_async(): # a field header. Set these to a non-empty value. request = datapolicy.ListDataPoliciesRequest() - request.parent = 'parent_value' + request.parent = "parent_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + type(client.transport.list_data_policies), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse() + ) await client.list_data_policies(request) # Establish that the underlying gRPC stub method was called. @@ -3010,9 +3634,9 @@ async def test_list_data_policies_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'parent=parent_value', - ) in kw['metadata'] + "x-goog-request-params", + "parent=parent_value", + ) in kw["metadata"] def test_list_data_policies_flattened(): @@ -3022,14 +3646,14 @@ def test_list_data_policies_flattened(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse() # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. client.list_data_policies( - parent='parent_value', + parent="parent_value", ) # Establish that the underlying call was made with the expected @@ -3037,7 +3661,7 @@ def test_list_data_policies_flattened(): assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val @@ -3051,9 +3675,10 @@ def test_list_data_policies_flattened_error(): with pytest.raises(ValueError): client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) + @pytest.mark.asyncio async def test_list_data_policies_flattened_async(): client = DataPolicyServiceAsyncClient( @@ -3062,16 +3687,18 @@ async def test_list_data_policies_flattened_async(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = datapolicy.ListDataPoliciesResponse() - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse()) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse() + ) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.list_data_policies( - parent='parent_value', + parent="parent_value", ) # Establish that the underlying call was made with the expected @@ -3079,9 +3706,10 @@ async def test_list_data_policies_flattened_async(): assert len(call.mock_calls) _, args, _ = call.mock_calls[0] arg = args[0].parent - mock_val = 'parent_value' + mock_val = "parent_value" assert arg == mock_val + @pytest.mark.asyncio async def test_list_data_policies_flattened_error_async(): client = DataPolicyServiceAsyncClient( @@ -3093,7 +3721,7 @@ async def test_list_data_policies_flattened_error_async(): with pytest.raises(ValueError): await client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) @@ -3105,8 +3733,8 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3115,17 +3743,17 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3140,9 +3768,7 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): retry = retries.Retry() timeout = 5 expected_metadata = tuple(expected_metadata) + ( - gapic_v1.routing_header.to_grpc_metadata(( - ('parent', ''), - )), + gapic_v1.routing_header.to_grpc_metadata((("parent", ""),)), ) pager = client.list_data_policies(request={}, retry=retry, timeout=timeout) @@ -3152,8 +3778,9 @@ def test_list_data_policies_pager(transport_name: str = "grpc"): results = list(pager) assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) + assert all(isinstance(i, datapolicy.DataPolicy) for i in results) + + def test_list_data_policies_pages(transport_name: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3162,8 +3789,8 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3172,17 +3799,17 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3193,9 +3820,10 @@ def test_list_data_policies_pages(transport_name: str = "grpc"): RuntimeError, ) pages = list(client.list_data_policies(request={}).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token + @pytest.mark.asyncio async def test_list_data_policies_async_pager(): client = DataPolicyServiceAsyncClient( @@ -3204,8 +3832,10 @@ async def test_list_data_policies_async_pager(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: + type(client.transport.list_data_policies), + "__call__", + new_callable=mock.AsyncMock, + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3214,17 +3844,17 @@ async def test_list_data_policies_async_pager(): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3234,15 +3864,16 @@ async def test_list_data_policies_async_pager(): ), RuntimeError, ) - async_pager = await client.list_data_policies(request={},) - assert async_pager.next_page_token == 'abc' + async_pager = await client.list_data_policies( + request={}, + ) + assert async_pager.next_page_token == "abc" responses = [] - async for response in async_pager: # pragma: no branch + async for response in async_pager: # pragma: no branch responses.append(response) assert len(responses) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in responses) + assert all(isinstance(i, datapolicy.DataPolicy) for i in responses) @pytest.mark.asyncio @@ -3253,8 +3884,10 @@ async def test_list_data_policies_async_pages(): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__', new_callable=mock.AsyncMock) as call: + type(client.transport.list_data_policies), + "__call__", + new_callable=mock.AsyncMock, + ) as call: # Set the response to a series of pages. call.side_effect = ( datapolicy.ListDataPoliciesResponse( @@ -3263,17 +3896,17 @@ async def test_list_data_policies_async_pages(): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -3286,18 +3919,22 @@ async def test_list_data_policies_async_pages(): pages = [] # Workaround issue in python 3.9 related to code coverage by adding `# pragma: no branch` # See https://github.com/googleapis/gapic-generator-python/pull/1174#issuecomment-1025132372 - async for page_ in ( # pragma: no branch + async for page_ in ( # pragma: no branch await client.list_data_policies(request={}) ).pages: pages.append(page_) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) -def test_get_iam_policy(request_type, transport: str = 'grpc'): + +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.GetIamPolicyRequest, + dict, + ], +) +def test_get_iam_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3308,13 +3945,11 @@ def test_get_iam_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy( version=774, - etag=b'etag_blob', + etag=b"etag_blob", ) response = client.get_iam_policy(request) @@ -3327,7 +3962,7 @@ def test_get_iam_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" def test_get_iam_policy_non_empty_request_with_auto_populated_field(): @@ -3335,28 +3970,29 @@ def test_get_iam_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.get_iam_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.GetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) + def test_get_iam_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3375,7 +4011,9 @@ def test_get_iam_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc request = {} client.get_iam_policy(request) @@ -3389,8 +4027,11 @@ def test_get_iam_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_get_iam_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3404,12 +4045,17 @@ async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.get_iam_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.get_iam_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.get_iam_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.get_iam_policy + ] = mock_rpc request = {} await client.get_iam_policy(request) @@ -3423,8 +4069,11 @@ async def test_get_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.GetIamPolicyRequest): +async def test_get_iam_policy_async( + transport: str = "grpc_asyncio", request_type=iam_policy_pb2.GetIamPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3435,14 +4084,14 @@ async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_typ request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) response = await client.get_iam_policy(request) # Establish that the underlying gRPC stub method was called. @@ -3454,13 +4103,14 @@ async def test_get_iam_policy_async(transport: str = 'grpc_asyncio', request_typ # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.asyncio async def test_get_iam_policy_async_from_dict(): await test_get_iam_policy_async(request_type=dict) + def test_get_iam_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3470,12 +4120,10 @@ def test_get_iam_policy_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.GetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.get_iam_policy(request) @@ -3487,9 +4135,9 @@ def test_get_iam_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3502,12 +4150,10 @@ async def test_get_iam_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.GetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) await client.get_iam_policy(request) @@ -3519,33 +4165,36 @@ async def test_get_iam_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_get_iam_policy_from_dict_foreign(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy() - response = client.get_iam_policy(request={ - 'resource': 'resource_value', - 'options': options_pb2.GetPolicyOptions(requested_policy_version=2598), + response = client.get_iam_policy( + request={ + "resource": "resource_value", + "options": options_pb2.GetPolicyOptions(requested_policy_version=2598), } ) call.assert_called() -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) -def test_set_iam_policy(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.SetIamPolicyRequest, + dict, + ], +) +def test_set_iam_policy(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3556,13 +4205,11 @@ def test_set_iam_policy(request_type, transport: str = 'grpc'): request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy( version=774, - etag=b'etag_blob', + etag=b"etag_blob", ) response = client.set_iam_policy(request) @@ -3575,7 +4222,7 @@ def test_set_iam_policy(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" def test_set_iam_policy_non_empty_request_with_auto_populated_field(): @@ -3583,28 +4230,29 @@ def test_set_iam_policy_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.set_iam_policy(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.SetIamPolicyRequest( - resource='resource_value', + resource="resource_value", ) + def test_set_iam_policy_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3623,7 +4271,9 @@ def test_set_iam_policy_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc request = {} client.set_iam_policy(request) @@ -3637,8 +4287,11 @@ def test_set_iam_policy_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_set_iam_policy_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3652,12 +4305,17 @@ async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.set_iam_policy in client._client._transport._wrapped_methods + assert ( + client._client._transport.set_iam_policy + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.set_iam_policy] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.set_iam_policy + ] = mock_rpc request = {} await client.set_iam_policy(request) @@ -3671,8 +4329,11 @@ async def test_set_iam_policy_async_use_cached_wrapped_rpc(transport: str = "grp assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.SetIamPolicyRequest): +async def test_set_iam_policy_async( + transport: str = "grpc_asyncio", request_type=iam_policy_pb2.SetIamPolicyRequest +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3683,14 +4344,14 @@ async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_typ request = request_type() # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) response = await client.set_iam_policy(request) # Establish that the underlying gRPC stub method was called. @@ -3702,13 +4363,14 @@ async def test_set_iam_policy_async(transport: str = 'grpc_asyncio', request_typ # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.asyncio async def test_set_iam_policy_async_from_dict(): await test_set_iam_policy_async(request_type=dict) + def test_set_iam_policy_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3718,12 +4380,10 @@ def test_set_iam_policy_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.SetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.set_iam_policy(request) @@ -3735,9 +4395,9 @@ def test_set_iam_policy_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3750,12 +4410,10 @@ async def test_set_iam_policy_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.SetIamPolicyRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy()) await client.set_iam_policy(request) @@ -3767,34 +4425,37 @@ async def test_set_iam_policy_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_set_iam_policy_from_dict_foreign(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = policy_pb2.Policy() - response = client.set_iam_policy(request={ - 'resource': 'resource_value', - 'policy': policy_pb2.Policy(version=774), - 'update_mask': field_mask_pb2.FieldMask(paths=['paths_value']), + response = client.set_iam_policy( + request={ + "resource": "resource_value", + "policy": policy_pb2.Policy(version=774), + "update_mask": field_mask_pb2.FieldMask(paths=["paths_value"]), } ) call.assert_called() -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) -def test_test_iam_permissions(request_type, transport: str = 'grpc'): +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, + ], +) +def test_test_iam_permissions(request_type, transport: str = "grpc"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -3806,11 +4467,11 @@ def test_test_iam_permissions(request_type, transport: str = 'grpc'): # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], + permissions=["permissions_value"], ) response = client.test_iam_permissions(request) @@ -3822,7 +4483,7 @@ def test_test_iam_permissions(request_type, transport: str = 'grpc'): # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): @@ -3830,28 +4491,31 @@ def test_test_iam_permissions_non_empty_request_with_auto_populated_field(): # automatically populated, according to AIP-4235, with non-empty requests. client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='grpc', + transport="grpc", ) # Populate all string fields in the request which are not UUID4 # since we want to check that UUID4 are populated automatically # if they meet the requirements of AIP 4235. request = iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', + resource="resource_value", ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + type(client.transport.test_iam_permissions), "__call__" + ) as call: + call.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client.test_iam_permissions(request=request) call.assert_called() _, args, _ = call.mock_calls[0] assert args[0] == iam_policy_pb2.TestIamPermissionsRequest( - resource='resource_value', + resource="resource_value", ) + def test_test_iam_permissions_use_cached_wrapped_rpc(): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call @@ -3866,12 +4530,18 @@ def test_test_iam_permissions_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods + assert ( + client._transport.test_iam_permissions in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.test_iam_permissions + ] = mock_rpc request = {} client.test_iam_permissions(request) @@ -3884,8 +4554,11 @@ def test_test_iam_permissions_use_cached_wrapped_rpc(): assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str = "grpc_asyncio"): +async def test_test_iam_permissions_async_use_cached_wrapped_rpc( + transport: str = "grpc_asyncio", +): # Clients should use _prep_wrapped_messages to create cached wrapped rpcs, # instead of constructing them on each call with mock.patch("google.api_core.gapic_v1.method_async.wrap_method") as wrapper_fn: @@ -3899,12 +4572,17 @@ async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str wrapper_fn.reset_mock() # Ensure method has been cached - assert client._client._transport.test_iam_permissions in client._client._transport._wrapped_methods + assert ( + client._client._transport.test_iam_permissions + in client._client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.AsyncMock() mock_rpc.return_value = mock.Mock() - client._client._transport._wrapped_methods[client._client._transport.test_iam_permissions] = mock_rpc + client._client._transport._wrapped_methods[ + client._client._transport.test_iam_permissions + ] = mock_rpc request = {} await client.test_iam_permissions(request) @@ -3918,8 +4596,12 @@ async def test_test_iam_permissions_async_use_cached_wrapped_rpc(transport: str assert wrapper_fn.call_count == 0 assert mock_rpc.call_count == 2 + @pytest.mark.asyncio -async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', request_type=iam_policy_pb2.TestIamPermissionsRequest): +async def test_test_iam_permissions_async( + transport: str = "grpc_asyncio", + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): client = DataPolicyServiceAsyncClient( credentials=async_anonymous_credentials(), transport=transport, @@ -3931,12 +4613,14 @@ async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', reque # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value =grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse( + permissions=["permissions_value"], + ) + ) response = await client.test_iam_permissions(request) # Establish that the underlying gRPC stub method was called. @@ -3947,13 +4631,14 @@ async def test_test_iam_permissions_async(transport: str = 'grpc_asyncio', reque # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] @pytest.mark.asyncio async def test_test_iam_permissions_async_from_dict(): await test_test_iam_permissions_async(request_type=dict) + def test_test_iam_permissions_field_headers(): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3963,12 +4648,12 @@ def test_test_iam_permissions_field_headers(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.TestIamPermissionsRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: call.return_value = iam_policy_pb2.TestIamPermissionsResponse() client.test_iam_permissions(request) @@ -3980,9 +4665,9 @@ def test_test_iam_permissions_field_headers(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] @pytest.mark.asyncio @@ -3995,13 +4680,15 @@ async def test_test_iam_permissions_field_headers_async(): # a field header. Set these to a non-empty value. request = iam_policy_pb2.TestIamPermissionsRequest() - request.resource = 'resource_value' + request.resource = "resource_value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse()) + type(client.transport.test_iam_permissions), "__call__" + ) as call: + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse() + ) await client.test_iam_permissions(request) # Establish that the underlying gRPC stub method was called. @@ -4012,9 +4699,10 @@ async def test_test_iam_permissions_field_headers_async(): # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( - 'x-goog-request-params', - 'resource=resource_value', - ) in kw['metadata'] + "x-goog-request-params", + "resource=resource_value", + ) in kw["metadata"] + def test_test_iam_permissions_from_dict_foreign(): client = DataPolicyServiceClient( @@ -4022,13 +4710,14 @@ def test_test_iam_permissions_from_dict_foreign(): ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = iam_policy_pb2.TestIamPermissionsResponse() - response = client.test_iam_permissions(request={ - 'resource': 'resource_value', - 'permissions': ['permissions_value'], + response = client.test_iam_permissions( + request={ + "resource": "resource_value", + "permissions": ["permissions_value"], } ) call.assert_called() @@ -4048,12 +4737,18 @@ def test_create_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.create_data_policy in client._transport._wrapped_methods + assert ( + client._transport.create_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.create_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.create_data_policy + ] = mock_rpc request = {} client.create_data_policy(request) @@ -4068,7 +4763,9 @@ def test_create_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateDataPolicyRequest): +def test_create_data_policy_rest_required_fields( + request_type=datapolicy.CreateDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -4076,53 +4773,56 @@ def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateD request_init["data_policy_id"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["parent"] = 'parent_value' - jsonified_request["dataPolicyId"] = 'data_policy_id_value' + jsonified_request["parent"] = "parent_value" + jsonified_request["dataPolicyId"] = "data_policy_id_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).create_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' + assert jsonified_request["parent"] == "parent_value" assert "dataPolicyId" in jsonified_request - assert jsonified_request["dataPolicyId"] == 'data_policy_id_value' + assert jsonified_request["dataPolicyId"] == "data_policy_id_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4132,24 +4832,33 @@ def test_create_data_policy_rest_required_fields(request_type=datapolicy.CreateD return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.create_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_create_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.create_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("parent", "dataPolicyId", "dataPolicy", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "parent", + "dataPolicyId", + "dataPolicy", + ) + ) + ) def test_create_data_policy_rest_flattened(): @@ -4159,18 +4868,22 @@ def test_create_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} # get truthy value for each flattened field mock_args = dict( - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) mock_args.update(sample_request) @@ -4180,7 +4893,7 @@ def test_create_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4190,10 +4903,14 @@ def test_create_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" + % client.transport._host, + args[1], + ) -def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_create_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4204,9 +4921,13 @@ def test_create_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.create_data_policy( datapolicy.CreateDataPolicyRequest(), - parent='parent_value', - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - data_policy_id='data_policy_id_value', + parent="parent_value", + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + data_policy_id="data_policy_id_value", ) @@ -4228,7 +4949,9 @@ def test_add_grantees_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.add_grantees] = mock_rpc request = {} @@ -4252,53 +4975,56 @@ def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRe request_init["grantees"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).add_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["dataPolicy"] = 'data_policy_value' - jsonified_request["grantees"] = 'grantees_value' + jsonified_request["dataPolicy"] = "data_policy_value" + jsonified_request["grantees"] = "grantees_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).add_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).add_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "dataPolicy" in jsonified_request - assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert jsonified_request["dataPolicy"] == "data_policy_value" assert "grantees" in jsonified_request - assert jsonified_request["grantees"] == 'grantees_value' + assert jsonified_request["grantees"] == "grantees_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4308,24 +5034,32 @@ def test_add_grantees_rest_required_fields(request_type=datapolicy.AddGranteesRe return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.add_grantees(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_add_grantees_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.add_grantees._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "dataPolicy", + "grantees", + ) + ) + ) def test_add_grantees_rest_flattened(): @@ -4335,17 +5069,19 @@ def test_add_grantees_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) mock_args.update(sample_request) @@ -4355,7 +5091,7 @@ def test_add_grantees_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4365,10 +5101,14 @@ def test_add_grantees_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:addGrantees" + % client.transport._host, + args[1], + ) -def test_add_grantees_rest_flattened_error(transport: str = 'rest'): +def test_add_grantees_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4379,8 +5119,8 @@ def test_add_grantees_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.add_grantees( datapolicy.AddGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) @@ -4402,7 +5142,9 @@ def test_remove_grantees_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.remove_grantees] = mock_rpc request = {} @@ -4418,7 +5160,9 @@ def test_remove_grantees_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGranteesRequest): +def test_remove_grantees_rest_required_fields( + request_type=datapolicy.RemoveGranteesRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -4426,53 +5170,56 @@ def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGran request_init["grantees"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).remove_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["dataPolicy"] = 'data_policy_value' - jsonified_request["grantees"] = 'grantees_value' + jsonified_request["dataPolicy"] = "data_policy_value" + jsonified_request["grantees"] = "grantees_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).remove_grantees._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).remove_grantees._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "dataPolicy" in jsonified_request - assert jsonified_request["dataPolicy"] == 'data_policy_value' + assert jsonified_request["dataPolicy"] == "data_policy_value" assert "grantees" in jsonified_request - assert jsonified_request["grantees"] == 'grantees_value' + assert jsonified_request["grantees"] == "grantees_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4482,24 +5229,32 @@ def test_remove_grantees_rest_required_fields(request_type=datapolicy.RemoveGran return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.remove_grantees(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_remove_grantees_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.remove_grantees._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("dataPolicy", "grantees", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "dataPolicy", + "grantees", + ) + ) + ) def test_remove_grantees_rest_flattened(): @@ -4509,17 +5264,19 @@ def test_remove_grantees_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) mock_args.update(sample_request) @@ -4529,7 +5286,7 @@ def test_remove_grantees_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4539,10 +5296,14 @@ def test_remove_grantees_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{data_policy=projects/*/locations/*/dataPolicies/*}:removeGrantees" + % client.transport._host, + args[1], + ) -def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): +def test_remove_grantees_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4553,8 +5314,8 @@ def test_remove_grantees_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.remove_grantees( datapolicy.RemoveGranteesRequest(), - data_policy='data_policy_value', - grantees=['grantees_value'], + data_policy="data_policy_value", + grantees=["grantees_value"], ) @@ -4572,12 +5333,18 @@ def test_update_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.update_data_policy in client._transport._wrapped_methods + assert ( + client._transport.update_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.update_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.update_data_policy + ] = mock_rpc request = {} client.update_data_policy(request) @@ -4592,54 +5359,59 @@ def test_update_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateDataPolicyRequest): +def test_update_data_policy_rest_required_fields( + request_type=datapolicy.UpdateDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).update_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_data_policy._get_unset_required_fields(jsonified_request) # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("update_mask", )) + assert not set(unset_fields) - set(("update_mask",)) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "patch", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -4649,24 +5421,24 @@ def test_update_data_policy_rest_required_fields(request_type=datapolicy.UpdateD return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.update_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_update_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.update_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(("updateMask", )) & set(("dataPolicy", ))) + assert set(unset_fields) == (set(("updateMask",)) & set(("dataPolicy",))) def test_update_data_policy_rest_flattened(): @@ -4676,17 +5448,25 @@ def test_update_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + sample_request = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } # get truthy value for each flattened field mock_args = dict( - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) mock_args.update(sample_request) @@ -4696,7 +5476,7 @@ def test_update_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4706,10 +5486,14 @@ def test_update_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{data_policy.name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_update_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4720,8 +5504,12 @@ def test_update_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.update_data_policy( datapolicy.UpdateDataPolicyRequest(), - data_policy=datapolicy.DataPolicy(data_masking_policy=datapolicy.DataMaskingPolicy(predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256)), - update_mask=field_mask_pb2.FieldMask(paths=['paths_value']), + data_policy=datapolicy.DataPolicy( + data_masking_policy=datapolicy.DataMaskingPolicy( + predefined_expression=datapolicy.DataMaskingPolicy.PredefinedExpression.SHA256 + ) + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), ) @@ -4739,12 +5527,18 @@ def test_delete_data_policy_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.delete_data_policy in client._transport._wrapped_methods + assert ( + client._transport.delete_data_policy in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.delete_data_policy] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.delete_data_policy + ] = mock_rpc request = {} client.delete_data_policy(request) @@ -4759,80 +5553,85 @@ def test_delete_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_delete_data_policy_rest_required_fields(request_type=datapolicy.DeleteDataPolicyRequest): +def test_delete_data_policy_rest_required_fields( + request_type=datapolicy.DeleteDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["name"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["name"] = 'name_value' + jsonified_request["name"] = "name_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).delete_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' + assert jsonified_request["name"] == "name_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = None # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "delete", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, } transcode.return_value = transcode_result response_value = Response() response_value.status_code = 200 - json_return_value = '' + json_return_value = "" - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.delete_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_delete_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.delete_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) + assert set(unset_fields) == (set(()) & set(("name",))) def test_delete_data_policy_rest_flattened(): @@ -4842,24 +5641,26 @@ def test_delete_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = None # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - name='name_value', + name="name_value", ) mock_args.update(sample_request) # Wrap the value into a proper Response obj response_value = Response() response_value.status_code = 200 - json_return_value = '' - response_value._content = json_return_value.encode('UTF-8') + json_return_value = "" + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -4869,10 +5670,14 @@ def test_delete_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_delete_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -4883,7 +5688,7 @@ def test_delete_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.delete_data_policy( datapolicy.DeleteDataPolicyRequest(), - name='name_value', + name="name_value", ) @@ -4905,7 +5710,9 @@ def test_get_data_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_data_policy] = mock_rpc request = {} @@ -4921,55 +5728,60 @@ def test_get_data_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPolicyRequest): +def test_get_data_policy_rest_required_fields( + request_type=datapolicy.GetDataPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["name"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["name"] = 'name_value' + jsonified_request["name"] = "name_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_data_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_data_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "name" in jsonified_request - assert jsonified_request["name"] == 'name_value' + assert jsonified_request["name"] == "name_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, } transcode.return_value = transcode_result @@ -4980,24 +5792,24 @@ def test_get_data_policy_rest_required_fields(request_type=datapolicy.GetDataPol return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_data_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_get_data_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.get_data_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("name", ))) + assert set(unset_fields) == (set(()) & set(("name",))) def test_get_data_policy_rest_flattened(): @@ -5007,16 +5819,18 @@ def test_get_data_policy_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy() # get arguments that satisfy an http rule for this method - sample_request = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + sample_request = { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } # get truthy value for each flattened field mock_args = dict( - name='name_value', + name="name_value", ) mock_args.update(sample_request) @@ -5026,7 +5840,7 @@ def test_get_data_policy_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -5036,10 +5850,14 @@ def test_get_data_policy_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{name=projects/*/locations/*/dataPolicies/*}" + % client.transport._host, + args[1], + ) -def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): +def test_get_data_policy_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -5050,7 +5868,7 @@ def test_get_data_policy_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.get_data_policy( datapolicy.GetDataPolicyRequest(), - name='name_value', + name="name_value", ) @@ -5068,12 +5886,18 @@ def test_list_data_policies_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.list_data_policies in client._transport._wrapped_methods + assert ( + client._transport.list_data_policies in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.list_data_policies] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.list_data_policies + ] = mock_rpc request = {} client.list_data_policies(request) @@ -5088,57 +5912,67 @@ def test_list_data_policies_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDataPoliciesRequest): +def test_list_data_policies_rest_required_fields( + request_type=datapolicy.ListDataPoliciesRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["parent"] = "" request = request_type(**request_init) pb_request = request_type.pb(request) - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_data_policies._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["parent"] = 'parent_value' + jsonified_request["parent"] = "parent_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).list_data_policies._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_data_policies._get_unset_required_fields(jsonified_request) # Check that path parameters and body parameters are not mixing in. - assert not set(unset_fields) - set(("page_size", "page_token", )) + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) + ) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "parent" in jsonified_request - assert jsonified_request["parent"] == 'parent_value' + assert jsonified_request["parent"] == "parent_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request_type.pb(request) transcode_result = { - 'uri': 'v1/sample_method', - 'method': "get", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, } transcode.return_value = transcode_result @@ -5149,24 +5983,32 @@ def test_list_data_policies_rest_required_fields(request_type=datapolicy.ListDat return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.list_data_policies(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_list_data_policies_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.list_data_policies._get_unset_required_fields({}) - assert set(unset_fields) == (set(("pageSize", "pageToken", )) & set(("parent", ))) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) def test_list_data_policies_rest_flattened(): @@ -5176,16 +6018,16 @@ def test_list_data_policies_rest_flattened(): ) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse() # get arguments that satisfy an http rule for this method - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} # get truthy value for each flattened field mock_args = dict( - parent='parent_value', + parent="parent_value", ) mock_args.update(sample_request) @@ -5195,7 +6037,7 @@ def test_list_data_policies_rest_flattened(): # Convert return value to protobuf type return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} @@ -5205,10 +6047,14 @@ def test_list_data_policies_rest_flattened(): # request object values. assert len(req.mock_calls) == 1 _, args, _ = req.mock_calls[0] - assert path_template.validate("%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" % client.transport._host, args[1]) + assert path_template.validate( + "%s/v2beta1/{parent=projects/*/locations/*}/dataPolicies" + % client.transport._host, + args[1], + ) -def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): +def test_list_data_policies_rest_flattened_error(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, @@ -5219,20 +6065,20 @@ def test_list_data_policies_rest_flattened_error(transport: str = 'rest'): with pytest.raises(ValueError): client.list_data_policies( datapolicy.ListDataPoliciesRequest(), - parent='parent_value', + parent="parent_value", ) -def test_list_data_policies_rest_pager(transport: str = 'rest'): +def test_list_data_policies_rest_pager(transport: str = "rest"): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # TODO(kbandes): remove this mock unless there's a good reason for it. - #with mock.patch.object(path_template, 'transcode') as transcode: + # with mock.patch.object(path_template, 'transcode') as transcode: # Set the response as a series of pages response = ( datapolicy.ListDataPoliciesResponse( @@ -5241,17 +6087,17 @@ def test_list_data_policies_rest_pager(transport: str = 'rest'): datapolicy.DataPolicy(), datapolicy.DataPolicy(), ], - next_page_token='abc', + next_page_token="abc", ), datapolicy.ListDataPoliciesResponse( data_policies=[], - next_page_token='def', + next_page_token="def", ), datapolicy.ListDataPoliciesResponse( data_policies=[ datapolicy.DataPolicy(), ], - next_page_token='ghi', + next_page_token="ghi", ), datapolicy.ListDataPoliciesResponse( data_policies=[ @@ -5264,24 +6110,25 @@ def test_list_data_policies_rest_pager(transport: str = 'rest'): response = response + response # Wrap the values into proper Response objs - response = tuple(datapolicy.ListDataPoliciesResponse.to_json(x) for x in response) + response = tuple( + datapolicy.ListDataPoliciesResponse.to_json(x) for x in response + ) return_values = tuple(Response() for i in response) for return_val, response_val in zip(return_values, response): - return_val._content = response_val.encode('UTF-8') + return_val._content = response_val.encode("UTF-8") return_val.status_code = 200 req.side_effect = return_values - sample_request = {'parent': 'projects/sample1/locations/sample2'} + sample_request = {"parent": "projects/sample1/locations/sample2"} pager = client.list_data_policies(request=sample_request) results = list(pager) assert len(results) == 6 - assert all(isinstance(i, datapolicy.DataPolicy) - for i in results) + assert all(isinstance(i, datapolicy.DataPolicy) for i in results) pages = list(client.list_data_policies(request=sample_request).pages) - for page_, token in zip(pages, ['abc','def','ghi', '']): + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): assert page_.raw_page.next_page_token == token @@ -5303,7 +6150,9 @@ def test_get_iam_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.get_iam_policy] = mock_rpc request = {} @@ -5319,57 +6168,62 @@ def test_get_iam_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamPolicyRequest): +def test_get_iam_policy_rest_required_fields( + request_type=iam_policy_pb2.GetIamPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["resource"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' + jsonified_request["resource"] = "resource_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).get_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5377,24 +6231,24 @@ def test_get_iam_policy_rest_required_fields(request_type=iam_policy_pb2.GetIamP json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_iam_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_get_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.get_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", ))) + assert set(unset_fields) == (set(()) & set(("resource",))) def test_set_iam_policy_rest_use_cached_wrapped_rpc(): @@ -5415,7 +6269,9 @@ def test_set_iam_policy_rest_use_cached_wrapped_rpc(): # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) client._transport._wrapped_methods[client._transport.set_iam_policy] = mock_rpc request = {} @@ -5431,57 +6287,62 @@ def test_set_iam_policy_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamPolicyRequest): +def test_set_iam_policy_rest_required_fields( + request_type=iam_policy_pb2.SetIamPolicyRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} request_init["resource"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).set_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' + jsonified_request["resource"] = "resource_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).set_iam_policy._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).set_iam_policy._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5489,24 +6350,32 @@ def test_set_iam_policy_rest_required_fields(request_type=iam_policy_pb2.SetIamP json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.set_iam_policy(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_set_iam_policy_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.set_iam_policy._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "policy", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "resource", + "policy", + ) + ) + ) def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): @@ -5523,12 +6392,18 @@ def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): wrapper_fn.reset_mock() # Ensure method has been cached - assert client._transport.test_iam_permissions in client._transport._wrapped_methods + assert ( + client._transport.test_iam_permissions in client._transport._wrapped_methods + ) # Replace cached wrapped function with mock mock_rpc = mock.Mock() - mock_rpc.return_value.name = "foo" # operation_request.operation in compute client(s) expect a string. - client._transport._wrapped_methods[client._transport.test_iam_permissions] = mock_rpc + mock_rpc.return_value.name = ( + "foo" # operation_request.operation in compute client(s) expect a string. + ) + client._transport._wrapped_methods[ + client._transport.test_iam_permissions + ] = mock_rpc request = {} client.test_iam_permissions(request) @@ -5543,7 +6418,9 @@ def test_test_iam_permissions_rest_use_cached_wrapped_rpc(): assert mock_rpc.call_count == 2 -def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.TestIamPermissionsRequest): +def test_test_iam_permissions_rest_required_fields( + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): transport_class = transports.DataPolicyServiceRestTransport request_init = {} @@ -5551,53 +6428,56 @@ def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.T request_init["permissions"] = "" request = request_type(**request_init) pb_request = request - jsonified_request = json.loads(json_format.MessageToJson( - pb_request, - use_integers_for_enums=False - )) + jsonified_request = json.loads( + json_format.MessageToJson(pb_request, use_integers_for_enums=False) + ) # verify fields with default values are dropped - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).test_iam_permissions._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with default values are now present - jsonified_request["resource"] = 'resource_value' - jsonified_request["permissions"] = 'permissions_value' + jsonified_request["resource"] = "resource_value" + jsonified_request["permissions"] = "permissions_value" - unset_fields = transport_class(credentials=ga_credentials.AnonymousCredentials()).test_iam_permissions._get_unset_required_fields(jsonified_request) + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).test_iam_permissions._get_unset_required_fields(jsonified_request) jsonified_request.update(unset_fields) # verify required fields with non-default values are left alone assert "resource" in jsonified_request - assert jsonified_request["resource"] == 'resource_value' + assert jsonified_request["resource"] == "resource_value" assert "permissions" in jsonified_request - assert jsonified_request["permissions"] == 'permissions_value' + assert jsonified_request["permissions"] == "permissions_value" client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - transport='rest', + transport="rest", ) request = request_type(**request_init) # Designate an appropriate value for the returned response. return_value = iam_policy_pb2.TestIamPermissionsResponse() # Mock the http request call within the method and fake a response. - with mock.patch.object(Session, 'request') as req: + with mock.patch.object(Session, "request") as req: # We need to mock transcode() because providing default values # for required fields will fail the real version if the http_options # expect actual values for those fields. - with mock.patch.object(path_template, 'transcode') as transcode: + with mock.patch.object(path_template, "transcode") as transcode: # A uri without fields and an empty body will force all the # request fields to show up in the query_params. pb_request = request transcode_result = { - 'uri': 'v1/sample_method', - 'method': "post", - 'query_params': pb_request, + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, } - transcode_result['body'] = pb_request + transcode_result["body"] = pb_request transcode.return_value = transcode_result response_value = Response() @@ -5605,24 +6485,32 @@ def test_test_iam_permissions_rest_required_fields(request_type=iam_policy_pb2.T json_return_value = json_format.MessageToJson(return_value) - response_value._content = json_return_value.encode('UTF-8') + response_value._content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.test_iam_permissions(request) - expected_params = [ - ('$alt', 'json;enum-encoding=int') - ] - actual_params = req.call_args.kwargs['params'] + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] assert expected_params == actual_params def test_test_iam_permissions_rest_unset_required_fields(): - transport = transports.DataPolicyServiceRestTransport(credentials=ga_credentials.AnonymousCredentials) + transport = transports.DataPolicyServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) unset_fields = transport.test_iam_permissions._get_unset_required_fields({}) - assert set(unset_fields) == (set(()) & set(("resource", "permissions", ))) + assert set(unset_fields) == ( + set(()) + & set( + ( + "resource", + "permissions", + ) + ) + ) def test_credentials_transport_error(): @@ -5663,8 +6551,7 @@ def test_credentials_transport_error(): options.api_key = "api_key" with pytest.raises(ValueError): client = DataPolicyServiceClient( - client_options=options, - credentials=ga_credentials.AnonymousCredentials() + client_options=options, credentials=ga_credentials.AnonymousCredentials() ) # It is an error to provide scopes and a transport instance. @@ -5686,6 +6573,7 @@ def test_transport_instance(): client = DataPolicyServiceClient(transport=transport) assert client.transport is transport + def test_transport_get_channel(): # A client may be instantiated with a custom transport instance. transport = transports.DataPolicyServiceGrpcTransport( @@ -5700,18 +6588,23 @@ def test_transport_get_channel(): channel = transport.grpc_channel assert channel -@pytest.mark.parametrize("transport_class", [ - transports.DataPolicyServiceGrpcTransport, - transports.DataPolicyServiceGrpcAsyncIOTransport, - transports.DataPolicyServiceRestTransport, -]) + +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + transports.DataPolicyServiceRestTransport, + ], +) def test_transport_adc(transport_class): # Test default credentials are used if not provided. - with mock.patch.object(google.auth, 'default') as adc: + with mock.patch.object(google.auth, "default") as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport_class() adc.assert_called_once() + def test_transport_kind_grpc(): transport = DataPolicyServiceClient.get_transport_class("grpc")( credentials=ga_credentials.AnonymousCredentials() @@ -5721,8 +6614,7 @@ def test_transport_kind_grpc(): def test_initialize_client_w_grpc(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" + credentials=ga_credentials.AnonymousCredentials(), transport="grpc" ) assert client is not None @@ -5737,8 +6629,8 @@ def test_create_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.create_data_policy(request=None) @@ -5759,9 +6651,7 @@ def test_add_grantees_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.add_grantees(request=None) @@ -5782,9 +6672,7 @@ def test_remove_grantees_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.remove_grantees(request=None) @@ -5806,8 +6694,8 @@ def test_update_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: call.return_value = datapolicy.DataPolicy() client.update_data_policy(request=None) @@ -5829,8 +6717,8 @@ def test_delete_data_policy_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: call.return_value = None client.delete_data_policy(request=None) @@ -5851,9 +6739,7 @@ def test_get_data_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: call.return_value = datapolicy.DataPolicy() client.get_data_policy(request=None) @@ -5875,8 +6761,8 @@ def test_list_data_policies_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: call.return_value = datapolicy.ListDataPoliciesResponse() client.list_data_policies(request=None) @@ -5897,9 +6783,7 @@ def test_get_iam_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.get_iam_policy(request=None) @@ -5920,9 +6804,7 @@ def test_set_iam_policy_empty_call_grpc(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: call.return_value = policy_pb2.Policy() client.set_iam_policy(request=None) @@ -5944,8 +6826,8 @@ def test_test_iam_permissions_empty_call_grpc(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: call.return_value = iam_policy_pb2.TestIamPermissionsResponse() client.test_iam_permissions(request=None) @@ -5966,8 +6848,7 @@ def test_transport_kind_grpc_asyncio(): def test_initialize_client_w_grpc_asyncio(): client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" + credentials=async_anonymous_credentials(), transport="grpc_asyncio" ) assert client is not None @@ -5983,18 +6864,20 @@ async def test_create_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.create_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6015,19 +6898,19 @@ async def test_add_grantees_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.add_grantees(request=None) # Establish that the underlying stub method was called. @@ -6048,19 +6931,19 @@ async def test_remove_grantees_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.remove_grantees(request=None) # Establish that the underlying stub method was called. @@ -6082,18 +6965,20 @@ async def test_update_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.update_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6115,8 +7000,8 @@ async def test_delete_data_policy_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: # Designate an appropriate return value for the call. call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(None) await client.delete_data_policy(request=None) @@ -6139,19 +7024,19 @@ async def test_get_data_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.DataPolicy( + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, + ) + ) await client.get_data_policy(request=None) # Establish that the underlying stub method was called. @@ -6173,12 +7058,14 @@ async def test_list_data_policies_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + datapolicy.ListDataPoliciesResponse( + next_page_token="next_page_token_value", + ) + ) await client.list_data_policies(request=None) # Establish that the underlying stub method was called. @@ -6199,14 +7086,14 @@ async def test_get_iam_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) await client.get_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -6227,14 +7114,14 @@ async def test_set_iam_policy_empty_call_grpc_asyncio(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(policy_pb2.Policy( - version=774, - etag=b'etag_blob', - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + policy_pb2.Policy( + version=774, + etag=b"etag_blob", + ) + ) await client.set_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -6256,12 +7143,14 @@ async def test_test_iam_permissions_empty_call_grpc_asyncio(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: # Designate an appropriate return value for the call. - call.return_value = grpc_helpers_async.FakeUnaryUnaryCall(iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], - )) + call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( + iam_policy_pb2.TestIamPermissionsResponse( + permissions=["permissions_value"], + ) + ) await client.test_iam_permissions(request=None) # Establish that the underlying stub method was called. @@ -6279,20 +7168,23 @@ def test_transport_kind_rest(): assert transport.kind == "rest" -def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataPolicyRequest): +def test_create_data_policy_rest_bad_request( + request_type=datapolicy.CreateDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6301,31 +7193,33 @@ def test_create_data_policy_rest_bad_request(request_type=datapolicy.CreateDataP client.create_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.CreateDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.CreateDataPolicyRequest, + dict, + ], +) def test_create_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6335,19 +7229,22 @@ def test_create_data_policy_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.create_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6355,19 +7252,30 @@ def test_create_data_policy_rest_call_success(request_type): def test_create_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_create_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_create_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_create_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_create_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.CreateDataPolicyRequest.pb(datapolicy.CreateDataPolicyRequest()) + pb_message = datapolicy.CreateDataPolicyRequest.pb( + datapolicy.CreateDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6382,7 +7290,7 @@ def test_create_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.CreateDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6390,7 +7298,13 @@ def test_create_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.create_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.create_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() @@ -6399,18 +7313,21 @@ def test_create_data_policy_rest_interceptors(null_interceptor): def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesRequest): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6419,31 +7336,35 @@ def test_add_grantees_rest_bad_request(request_type=datapolicy.AddGranteesReques client.add_grantees(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.AddGranteesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.AddGranteesRequest, + dict, + ], +) def test_add_grantees_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6453,19 +7374,22 @@ def test_add_grantees_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.add_grantees(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6473,15 +7397,23 @@ def test_add_grantees_rest_call_success(request_type): def test_add_grantees_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_add_grantees") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_add_grantees" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_add_grantees_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_add_grantees" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -6500,7 +7432,7 @@ def test_add_grantees_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.AddGranteesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6508,27 +7440,38 @@ def test_add_grantees_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.add_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.add_grantees( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGranteesRequest): +def test_remove_grantees_rest_bad_request( + request_type=datapolicy.RemoveGranteesRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6537,31 +7480,35 @@ def test_remove_grantees_rest_bad_request(request_type=datapolicy.RemoveGrantees client.remove_grantees(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.RemoveGranteesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.RemoveGranteesRequest, + dict, + ], +) def test_remove_grantees_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "data_policy": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6571,19 +7518,22 @@ def test_remove_grantees_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.remove_grantees(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6591,19 +7541,30 @@ def test_remove_grantees_rest_call_success(request_type): def test_remove_grantees_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_remove_grantees_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_remove_grantees" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_remove_grantees_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_remove_grantees" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.RemoveGranteesRequest.pb(datapolicy.RemoveGranteesRequest()) + pb_message = datapolicy.RemoveGranteesRequest.pb( + datapolicy.RemoveGranteesRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6618,7 +7579,7 @@ def test_remove_grantees_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.RemoveGranteesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6626,27 +7587,40 @@ def test_remove_grantees_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.remove_grantees(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.remove_grantees( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataPolicyRequest): +def test_update_data_policy_rest_bad_request( + request_type=datapolicy.UpdateDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} + request_init = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6655,19 +7629,34 @@ def test_update_data_policy_rest_bad_request(request_type=datapolicy.UpdateDataP client.update_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.UpdateDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.UpdateDataPolicyRequest, + dict, + ], +) def test_update_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'data_policy': {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'}} - request_init["data_policy"] = {'data_masking_policy': {'predefined_expression': 1}, 'name': 'projects/sample1/locations/sample2/dataPolicies/sample3', 'data_policy_id': 'data_policy_id_value', 'etag': 'etag_value', 'data_policy_type': 1, 'policy_tag': 'policy_tag_value', 'grantees': ['grantees_value1', 'grantees_value2'], 'version': 1} + request_init = { + "data_policy": { + "name": "projects/sample1/locations/sample2/dataPolicies/sample3" + } + } + request_init["data_policy"] = { + "data_masking_policy": {"predefined_expression": 1}, + "name": "projects/sample1/locations/sample2/dataPolicies/sample3", + "data_policy_id": "data_policy_id_value", + "etag": "etag_value", + "data_policy_type": 1, + "policy_tag": "policy_tag_value", + "grantees": ["grantees_value1", "grantees_value2"], + "version": 1, + } # The version of a generated dependency at test runtime may differ from the version used during generation. # Delete any fields which are not present in the current runtime dependency # See https://github.com/googleapis/gapic-generator-python/issues/1748 @@ -6687,7 +7676,7 @@ def get_message_fields(field): if is_field_type_proto_plus_type: message_fields = field.message.meta.fields.values() # Add `# pragma: NO COVER` because there may not be any `*_pb2` field types - else: # pragma: NO COVER + else: # pragma: NO COVER message_fields = field.message.DESCRIPTOR.fields return message_fields @@ -6701,7 +7690,7 @@ def get_message_fields(field): # For each item in the sample request, create a list of sub fields which are not present at runtime # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for field, value in request_init["data_policy"].items(): # pragma: NO COVER + for field, value in request_init["data_policy"].items(): # pragma: NO COVER result = None is_repeated = False # For repeated fields @@ -6716,12 +7705,16 @@ def get_message_fields(field): for subfield in result.keys(): if (field, subfield) not in runtime_nested_fields: subfields_not_in_runtime.append( - {"field": field, "subfield": subfield, "is_repeated": is_repeated} + { + "field": field, + "subfield": subfield, + "is_repeated": is_repeated, + } ) # Remove fields from the sample request which are not present in the runtime version of the dependency # Add `# pragma: NO COVER` because this test code will not run if all subfields are present at runtime - for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER + for subfield_to_delete in subfields_not_in_runtime: # pragma: NO COVER field = subfield_to_delete.get("field") field_repeated = subfield_to_delete.get("is_repeated") subfield = subfield_to_delete.get("subfield") @@ -6734,16 +7727,16 @@ def get_message_fields(field): request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6753,19 +7746,22 @@ def get_message_fields(field): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.update_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6773,19 +7769,30 @@ def get_message_fields(field): def test_update_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_update_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_update_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_update_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_update_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.UpdateDataPolicyRequest.pb(datapolicy.UpdateDataPolicyRequest()) + pb_message = datapolicy.UpdateDataPolicyRequest.pb( + datapolicy.UpdateDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6800,7 +7807,7 @@ def test_update_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.UpdateDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -6808,27 +7815,36 @@ def test_update_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.update_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.update_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataPolicyRequest): +def test_delete_data_policy_rest_bad_request( + request_type=datapolicy.DeleteDataPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6837,30 +7853,32 @@ def test_delete_data_policy_rest_bad_request(request_type=datapolicy.DeleteDataP client.delete_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.DeleteDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.DeleteDataPolicyRequest, + dict, + ], +) def test_delete_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = None # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 - json_return_value = '' - response_value.content = json_return_value.encode('UTF-8') + json_return_value = "" + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.delete_data_policy(request) @@ -6873,15 +7891,23 @@ def test_delete_data_policy_rest_call_success(request_type): def test_delete_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_delete_data_policy" + ) as pre: pre.assert_not_called() - pb_message = datapolicy.DeleteDataPolicyRequest.pb(datapolicy.DeleteDataPolicyRequest()) + pb_message = datapolicy.DeleteDataPolicyRequest.pb( + datapolicy.DeleteDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -6894,31 +7920,38 @@ def test_delete_data_policy_rest_interceptors(null_interceptor): req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} request = datapolicy.DeleteDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata - client.delete_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.delete_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyRequest): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -6927,31 +7960,33 @@ def test_get_data_policy_rest_bad_request(request_type=datapolicy.GetDataPolicyR client.get_data_policy(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.GetDataPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.GetDataPolicyRequest, + dict, + ], +) def test_get_data_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'name': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = {"name": "projects/sample1/locations/sample2/dataPolicies/sample3"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.DataPolicy( - name='name_value', - data_policy_id='data_policy_id_value', - etag='etag_value', - data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, - policy_tag='policy_tag_value', - grantees=['grantees_value'], - version=datapolicy.DataPolicy.Version.V1, + name="name_value", + data_policy_id="data_policy_id_value", + etag="etag_value", + data_policy_type=datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY, + policy_tag="policy_tag_value", + grantees=["grantees_value"], + version=datapolicy.DataPolicy.Version.V1, ) # Wrap the value into a proper Response obj @@ -6961,19 +7996,22 @@ def test_get_data_policy_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.DataPolicy.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_data_policy(request) # Establish that the response is the type that we expect. assert isinstance(response, datapolicy.DataPolicy) - assert response.name == 'name_value' - assert response.data_policy_id == 'data_policy_id_value' - assert response.etag == 'etag_value' - assert response.data_policy_type == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY - assert response.policy_tag == 'policy_tag_value' - assert response.grantees == ['grantees_value'] + assert response.name == "name_value" + assert response.data_policy_id == "data_policy_id_value" + assert response.etag == "etag_value" + assert ( + response.data_policy_type + == datapolicy.DataPolicy.DataPolicyType.DATA_MASKING_POLICY + ) + assert response.policy_tag == "policy_tag_value" + assert response.grantees == ["grantees_value"] assert response.version == datapolicy.DataPolicy.Version.V1 @@ -6981,19 +8019,30 @@ def test_get_data_policy_rest_call_success(request_type): def test_get_data_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_data_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_data_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_get_data_policy_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_get_data_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.GetDataPolicyRequest.pb(datapolicy.GetDataPolicyRequest()) + pb_message = datapolicy.GetDataPolicyRequest.pb( + datapolicy.GetDataPolicyRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -7008,7 +8057,7 @@ def test_get_data_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = datapolicy.GetDataPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7016,27 +8065,36 @@ def test_get_data_policy_rest_interceptors(null_interceptor): post.return_value = datapolicy.DataPolicy() post_with_metadata.return_value = datapolicy.DataPolicy(), metadata - client.get_data_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.get_data_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPoliciesRequest): +def test_list_data_policies_rest_bad_request( + request_type=datapolicy.ListDataPoliciesRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7045,25 +8103,27 @@ def test_list_data_policies_rest_bad_request(request_type=datapolicy.ListDataPol client.list_data_policies(request) -@pytest.mark.parametrize("request_type", [ - datapolicy.ListDataPoliciesRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + datapolicy.ListDataPoliciesRequest, + dict, + ], +) def test_list_data_policies_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'parent': 'projects/sample1/locations/sample2'} + request_init = {"parent": "projects/sample1/locations/sample2"} request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = datapolicy.ListDataPoliciesResponse( - next_page_token='next_page_token_value', + next_page_token="next_page_token_value", ) # Wrap the value into a proper Response obj @@ -7073,33 +8133,44 @@ def test_list_data_policies_rest_call_success(request_type): # Convert return value to protobuf type return_value = datapolicy.ListDataPoliciesResponse.pb(return_value) json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.list_data_policies(request) # Establish that the response is the type that we expect. assert isinstance(response, pagers.ListDataPoliciesPager) - assert response.next_page_token == 'next_page_token_value' + assert response.next_page_token == "next_page_token_value" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_list_data_policies_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_list_data_policies_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_list_data_policies" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_list_data_policies_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_list_data_policies" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() - pb_message = datapolicy.ListDataPoliciesRequest.pb(datapolicy.ListDataPoliciesRequest()) + pb_message = datapolicy.ListDataPoliciesRequest.pb( + datapolicy.ListDataPoliciesRequest() + ) transcode.return_value = { "method": "post", "uri": "my_uri", @@ -7110,39 +8181,55 @@ def test_list_data_policies_rest_interceptors(null_interceptor): req.return_value = mock.Mock() req.return_value.status_code = 200 req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = datapolicy.ListDataPoliciesResponse.to_json(datapolicy.ListDataPoliciesResponse()) + return_value = datapolicy.ListDataPoliciesResponse.to_json( + datapolicy.ListDataPoliciesResponse() + ) req.return_value.content = return_value request = datapolicy.ListDataPoliciesRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata post.return_value = datapolicy.ListDataPoliciesResponse() - post_with_metadata.return_value = datapolicy.ListDataPoliciesResponse(), metadata + post_with_metadata.return_value = ( + datapolicy.ListDataPoliciesResponse(), + metadata, + ) - client.list_data_policies(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.list_data_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolicyRequest): +def test_get_iam_policy_rest_bad_request( + request_type=iam_policy_pb2.GetIamPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7151,33 +8238,37 @@ def test_get_iam_policy_rest_bad_request(request_type=iam_policy_pb2.GetIamPolic client.get_iam_policy(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.GetIamPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.GetIamPolicyRequest, + dict, + ], +) def test_get_iam_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', + version=774, + etag=b"etag_blob", ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.get_iam_policy(request) @@ -7185,22 +8276,30 @@ def test_get_iam_policy_rest_call_success(request_type): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_get_iam_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_get_iam_policy_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_get_iam_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7219,7 +8318,7 @@ def test_get_iam_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = iam_policy_pb2.GetIamPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7227,27 +8326,38 @@ def test_get_iam_policy_rest_interceptors(null_interceptor): post.return_value = policy_pb2.Policy() post_with_metadata.return_value = policy_pb2.Policy(), metadata - client.get_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.get_iam_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolicyRequest): +def test_set_iam_policy_rest_bad_request( + request_type=iam_policy_pb2.SetIamPolicyRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7256,33 +8366,37 @@ def test_set_iam_policy_rest_bad_request(request_type=iam_policy_pb2.SetIamPolic client.set_iam_policy(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.SetIamPolicyRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.SetIamPolicyRequest, + dict, + ], +) def test_set_iam_policy_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = policy_pb2.Policy( - version=774, - etag=b'etag_blob', + version=774, + etag=b"etag_blob", ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.set_iam_policy(request) @@ -7290,22 +8404,30 @@ def test_set_iam_policy_rest_call_success(request_type): # Establish that the response is the type that we expect. assert isinstance(response, policy_pb2.Policy) assert response.version == 774 - assert response.etag == b'etag_blob' + assert response.etag == b"etag_blob" @pytest.mark.parametrize("null_interceptor", [True, False]) def test_set_iam_policy_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_set_iam_policy_with_metadata" + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_set_iam_policy" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7324,7 +8446,7 @@ def test_set_iam_policy_rest_interceptors(null_interceptor): req.return_value.content = return_value request = iam_policy_pb2.SetIamPolicyRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] @@ -7332,27 +8454,38 @@ def test_set_iam_policy_rest_interceptors(null_interceptor): post.return_value = policy_pb2.Policy() post_with_metadata.return_value = policy_pb2.Policy(), metadata - client.set_iam_policy(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.set_iam_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() -def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestIamPermissionsRequest): +def test_test_iam_permissions_rest_bad_request( + request_type=iam_policy_pb2.TestIamPermissionsRequest, +): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a BadRequest error. - with mock.patch.object(Session, 'request') as req, pytest.raises(core_exceptions.BadRequest): + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): # Wrap the value into a proper Response obj response_value = mock.Mock() - json_return_value = '' + json_return_value = "" response_value.json = mock.Mock(return_value={}) response_value.status_code = 400 response_value.request = mock.Mock() @@ -7361,54 +8494,67 @@ def test_test_iam_permissions_rest_bad_request(request_type=iam_policy_pb2.TestI client.test_iam_permissions(request) -@pytest.mark.parametrize("request_type", [ - iam_policy_pb2.TestIamPermissionsRequest, - dict, -]) +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, + ], +) def test_test_iam_permissions_rest_call_success(request_type): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) # send a request that will satisfy transcoding - request_init = {'resource': 'projects/sample1/locations/sample2/dataPolicies/sample3'} + request_init = { + "resource": "projects/sample1/locations/sample2/dataPolicies/sample3" + } request = request_type(**request_init) # Mock the http request call within the method and fake a response. - with mock.patch.object(type(client.transport._session), 'request') as req: + with mock.patch.object(type(client.transport._session), "request") as req: # Designate an appropriate value for the returned response. return_value = iam_policy_pb2.TestIamPermissionsResponse( - permissions=['permissions_value'], + permissions=["permissions_value"], ) # Wrap the value into a proper Response obj response_value = mock.Mock() response_value.status_code = 200 json_return_value = json_format.MessageToJson(return_value) - response_value.content = json_return_value.encode('UTF-8') + response_value.content = json_return_value.encode("UTF-8") req.return_value = response_value req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} response = client.test_iam_permissions(request) # Establish that the response is the type that we expect. assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) - assert response.permissions == ['permissions_value'] + assert response.permissions == ["permissions_value"] @pytest.mark.parametrize("null_interceptor", [True, False]) def test_test_iam_permissions_rest_interceptors(null_interceptor): transport = transports.DataPolicyServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), - interceptor=None if null_interceptor else transports.DataPolicyServiceRestInterceptor(), - ) + interceptor=None + if null_interceptor + else transports.DataPolicyServiceRestInterceptor(), + ) client = DataPolicyServiceClient(transport=transport) - with mock.patch.object(type(client.transport._session), "request") as req, \ - mock.patch.object(path_template, "transcode") as transcode, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions") as post, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions_with_metadata") as post_with_metadata, \ - mock.patch.object(transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions") as pre: + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "post_test_iam_permissions" + ) as post, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, + "post_test_iam_permissions_with_metadata", + ) as post_with_metadata, mock.patch.object( + transports.DataPolicyServiceRestInterceptor, "pre_test_iam_permissions" + ) as pre: pre.assert_not_called() post.assert_not_called() post_with_metadata.assert_not_called() @@ -7423,28 +8569,39 @@ def test_test_iam_permissions_rest_interceptors(null_interceptor): req.return_value = mock.Mock() req.return_value.status_code = 200 req.return_value.headers = {"header-1": "value-1", "header-2": "value-2"} - return_value = json_format.MessageToJson(iam_policy_pb2.TestIamPermissionsResponse()) + return_value = json_format.MessageToJson( + iam_policy_pb2.TestIamPermissionsResponse() + ) req.return_value.content = return_value request = iam_policy_pb2.TestIamPermissionsRequest() - metadata =[ + metadata = [ ("key", "val"), ("cephalopod", "squid"), ] pre.return_value = request, metadata post.return_value = iam_policy_pb2.TestIamPermissionsResponse() - post_with_metadata.return_value = iam_policy_pb2.TestIamPermissionsResponse(), metadata + post_with_metadata.return_value = ( + iam_policy_pb2.TestIamPermissionsResponse(), + metadata, + ) - client.test_iam_permissions(request, metadata=[("key", "val"), ("cephalopod", "squid"),]) + client.test_iam_permissions( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) pre.assert_called_once() post.assert_called_once() post_with_metadata.assert_called_once() + def test_initialize_client_w_rest(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) assert client is not None @@ -7459,8 +8616,8 @@ def test_create_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.create_data_policy), - '__call__') as call: + type(client.transport.create_data_policy), "__call__" + ) as call: client.create_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7480,9 +8637,7 @@ def test_add_grantees_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.add_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.add_grantees), "__call__") as call: client.add_grantees(request=None) # Establish that the underlying stub method was called. @@ -7502,9 +8657,7 @@ def test_remove_grantees_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.remove_grantees), - '__call__') as call: + with mock.patch.object(type(client.transport.remove_grantees), "__call__") as call: client.remove_grantees(request=None) # Establish that the underlying stub method was called. @@ -7525,8 +8678,8 @@ def test_update_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.update_data_policy), - '__call__') as call: + type(client.transport.update_data_policy), "__call__" + ) as call: client.update_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7547,8 +8700,8 @@ def test_delete_data_policy_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.delete_data_policy), - '__call__') as call: + type(client.transport.delete_data_policy), "__call__" + ) as call: client.delete_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7568,9 +8721,7 @@ def test_get_data_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_data_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_data_policy), "__call__") as call: client.get_data_policy(request=None) # Establish that the underlying stub method was called. @@ -7591,8 +8742,8 @@ def test_list_data_policies_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.list_data_policies), - '__call__') as call: + type(client.transport.list_data_policies), "__call__" + ) as call: client.list_data_policies(request=None) # Establish that the underlying stub method was called. @@ -7612,9 +8763,7 @@ def test_get_iam_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.get_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.get_iam_policy), "__call__") as call: client.get_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -7634,9 +8783,7 @@ def test_set_iam_policy_empty_call_rest(): ) # Mock the actual call, and fake the request. - with mock.patch.object( - type(client.transport.set_iam_policy), - '__call__') as call: + with mock.patch.object(type(client.transport.set_iam_policy), "__call__") as call: client.set_iam_policy(request=None) # Establish that the underlying stub method was called. @@ -7657,8 +8804,8 @@ def test_test_iam_permissions_empty_call_rest(): # Mock the actual call, and fake the request. with mock.patch.object( - type(client.transport.test_iam_permissions), - '__call__') as call: + type(client.transport.test_iam_permissions), "__call__" + ) as call: client.test_iam_permissions(request=None) # Establish that the underlying stub method was called. @@ -7679,18 +8826,21 @@ def test_transport_grpc_default(): transports.DataPolicyServiceGrpcTransport, ) + def test_data_policy_service_base_transport_error(): # Passing both a credentials object and credentials_file should raise an error with pytest.raises(core_exceptions.DuplicateCredentialArgs): transport = transports.DataPolicyServiceTransport( credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json" + credentials_file="credentials.json", ) def test_data_policy_service_base_transport(): # Instantiate the base transport. - with mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__') as Transport: + with mock.patch( + "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport.__init__" + ) as Transport: Transport.return_value = None transport = transports.DataPolicyServiceTransport( credentials=ga_credentials.AnonymousCredentials(), @@ -7699,16 +8849,16 @@ def test_data_policy_service_base_transport(): # Every method on the transport should just blindly # raise NotImplementedError. methods = ( - 'create_data_policy', - 'add_grantees', - 'remove_grantees', - 'update_data_policy', - 'delete_data_policy', - 'get_data_policy', - 'list_data_policies', - 'get_iam_policy', - 'set_iam_policy', - 'test_iam_permissions', + "create_data_policy", + "add_grantees", + "remove_grantees", + "update_data_policy", + "delete_data_policy", + "get_data_policy", + "list_data_policies", + "get_iam_policy", + "set_iam_policy", + "test_iam_permissions", ) for method in methods: with pytest.raises(NotImplementedError): @@ -7719,7 +8869,7 @@ def test_data_policy_service_base_transport(): # Catch all for all remaining methods and properties remainder = [ - 'kind', + "kind", ] for r in remainder: with pytest.raises(NotImplementedError): @@ -7728,26 +8878,33 @@ def test_data_policy_service_base_transport(): def test_data_policy_service_base_transport_with_credentials_file(): # Instantiate the base transport with a credentials file - with mock.patch.object(google.auth, 'load_credentials_from_file', autospec=True) as load_creds, mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch( + "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages" + ) as Transport: Transport.return_value = None load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) transport = transports.DataPolicyServiceTransport( credentials_file="credentials.json", quota_project_id="octopus", ) - load_creds.assert_called_once_with("credentials.json", + load_creds.assert_called_once_with( + "credentials.json", scopes=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id="octopus", ) def test_data_policy_service_base_transport_with_adc(): # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, 'default', autospec=True) as adc, mock.patch('google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages') as Transport: + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( + "google.cloud.bigquery_datapolicies_v2beta1.services.data_policy_service.transports.DataPolicyServiceTransport._prep_wrapped_messages" + ) as Transport: Transport.return_value = None adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport = transports.DataPolicyServiceTransport() @@ -7756,15 +8913,15 @@ def test_data_policy_service_base_transport_with_adc(): def test_data_policy_service_auth_adc(): # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) DataPolicyServiceClient() adc.assert_called_once_with( scopes=None, default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id=None, ) @@ -7779,12 +8936,15 @@ def test_data_policy_service_auth_adc(): def test_data_policy_service_transport_auth_adc(transport_class): # If credentials and host are not provided, the transport class should use # ADC credentials. - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: adc.return_value = (ga_credentials.AnonymousCredentials(), None) transport_class(quota_project_id="octopus", scopes=["1", "2"]) adc.assert_called_once_with( scopes=["1", "2"], - default_scopes=( 'https://www.googleapis.com/auth/bigquery', 'https://www.googleapis.com/auth/cloud-platform',), + default_scopes=( + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), quota_project_id="octopus", ) @@ -7798,39 +8958,38 @@ def test_data_policy_service_transport_auth_adc(transport_class): ], ) def test_data_policy_service_transport_auth_gdch_credentials(transport_class): - host = 'https://language.com' - api_audience_tests = [None, 'https://language2.com'] - api_audience_expect = [host, 'https://language2.com'] + host = "https://language.com" + api_audience_tests = [None, "https://language2.com"] + api_audience_expect = [host, "https://language2.com"] for t, e in zip(api_audience_tests, api_audience_expect): - with mock.patch.object(google.auth, 'default', autospec=True) as adc: + with mock.patch.object(google.auth, "default", autospec=True) as adc: gdch_mock = mock.MagicMock() - type(gdch_mock).with_gdch_audience = mock.PropertyMock(return_value=gdch_mock) + type(gdch_mock).with_gdch_audience = mock.PropertyMock( + return_value=gdch_mock + ) adc.return_value = (gdch_mock, None) transport_class(host=host, api_audience=t) - gdch_mock.with_gdch_audience.assert_called_once_with( - e - ) + gdch_mock.with_gdch_audience.assert_called_once_with(e) @pytest.mark.parametrize( "transport_class,grpc_helpers", [ (transports.DataPolicyServiceGrpcTransport, grpc_helpers), - (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async) + (transports.DataPolicyServiceGrpcAsyncIOTransport, grpc_helpers_async), ], ) def test_data_policy_service_transport_create_channel(transport_class, grpc_helpers): # If credentials and host are not provided, the transport class should use # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch.object( + with mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( grpc_helpers, "create_channel", autospec=True ) as create_channel: creds = ga_credentials.AnonymousCredentials() adc.return_value = (creds, None) - transport_class( - quota_project_id="octopus", - scopes=["1", "2"] - ) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) create_channel.assert_called_with( "bigquerydatapolicy.googleapis.com:443", @@ -7838,9 +8997,9 @@ def test_data_policy_service_transport_create_channel(transport_class, grpc_help credentials_file=None, quota_project_id="octopus", default_scopes=( - 'https://www.googleapis.com/auth/bigquery', - 'https://www.googleapis.com/auth/cloud-platform', -), + "https://www.googleapis.com/auth/bigquery", + "https://www.googleapis.com/auth/cloud-platform", + ), scopes=["1", "2"], default_host="bigquerydatapolicy.googleapis.com", ssl_credentials=None, @@ -7851,9 +9010,15 @@ def test_data_policy_service_transport_create_channel(transport_class, grpc_help ) -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( - transport_class + transport_class, ): cred = ga_credentials.AnonymousCredentials() @@ -7863,7 +9028,7 @@ def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( transport_class( host="squid.clam.whelk", credentials=cred, - ssl_channel_credentials=mock_ssl_channel_creds + ssl_channel_credentials=mock_ssl_channel_creds, ) mock_create_channel.assert_called_once_with( "squid.clam.whelk:443", @@ -7884,61 +9049,77 @@ def test_data_policy_service_grpc_transport_client_cert_source_for_mtls( with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: transport_class( credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback + client_cert_source_for_mtls=client_cert_source_callback, ) expected_cert, expected_key = client_cert_source_callback() mock_ssl_cred.assert_called_once_with( - certificate_chain=expected_cert, - private_key=expected_key + certificate_chain=expected_cert, private_key=expected_key ) + def test_data_policy_service_http_transport_client_cert_source_for_mtls(): cred = ga_credentials.AnonymousCredentials() - with mock.patch("google.auth.transport.requests.AuthorizedSession.configure_mtls_channel") as mock_configure_mtls_channel: - transports.DataPolicyServiceRestTransport ( - credentials=cred, - client_cert_source_for_mtls=client_cert_source_callback + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.DataPolicyServiceRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback ) mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) def test_data_policy_service_host_no_port(transport_name): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com'), - transport=transport_name, + client_options=client_options.ClientOptions( + api_endpoint="bigquerydatapolicy.googleapis.com" + ), + transport=transport_name, ) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:443' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com' + "bigquerydatapolicy.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com" ) -@pytest.mark.parametrize("transport_name", [ - "grpc", - "grpc_asyncio", - "rest", -]) + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) def test_data_policy_service_host_with_port(transport_name): client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions(api_endpoint='bigquerydatapolicy.googleapis.com:8000'), + client_options=client_options.ClientOptions( + api_endpoint="bigquerydatapolicy.googleapis.com:8000" + ), transport=transport_name, ) assert client.transport._host == ( - 'bigquerydatapolicy.googleapis.com:8000' - if transport_name in ['grpc', 'grpc_asyncio'] - else 'https://bigquerydatapolicy.googleapis.com:8000' + "bigquerydatapolicy.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://bigquerydatapolicy.googleapis.com:8000" ) -@pytest.mark.parametrize("transport_name", [ - "rest", -]) + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) def test_data_policy_service_client_transport_session_collision(transport_name): creds1 = ga_credentials.AnonymousCredentials() creds2 = ga_credentials.AnonymousCredentials() @@ -7980,8 +9161,10 @@ def test_data_policy_service_client_transport_session_collision(transport_name): session1 = client1.transport.test_iam_permissions._session session2 = client2.transport.test_iam_permissions._session assert session1 != session2 + + def test_data_policy_service_grpc_transport_channel(): - channel = grpc.secure_channel('http://localhost/', grpc.local_channel_credentials()) + channel = grpc.secure_channel("http://localhost/", grpc.local_channel_credentials()) # Check that channel is used if provided. transport = transports.DataPolicyServiceGrpcTransport( @@ -7994,7 +9177,7 @@ def test_data_policy_service_grpc_transport_channel(): def test_data_policy_service_grpc_asyncio_transport_channel(): - channel = aio.secure_channel('http://localhost/', grpc.local_channel_credentials()) + channel = aio.secure_channel("http://localhost/", grpc.local_channel_credentials()) # Check that channel is used if provided. transport = transports.DataPolicyServiceGrpcAsyncIOTransport( @@ -8008,12 +9191,22 @@ def test_data_policy_service_grpc_asyncio_transport_channel(): # Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are # removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) def test_data_policy_service_transport_channel_mtls_with_client_cert_source( - transport_class + transport_class, ): - with mock.patch("grpc.ssl_channel_credentials", autospec=True) as grpc_ssl_channel_cred: - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + with mock.patch( + "grpc.ssl_channel_credentials", autospec=True + ) as grpc_ssl_channel_cred: + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: mock_ssl_cred = mock.Mock() grpc_ssl_channel_cred.return_value = mock_ssl_cred @@ -8022,7 +9215,7 @@ def test_data_policy_service_transport_channel_mtls_with_client_cert_source( cred = ga_credentials.AnonymousCredentials() with pytest.warns(DeprecationWarning): - with mock.patch.object(google.auth, 'default') as adc: + with mock.patch.object(google.auth, "default") as adc: adc.return_value = (cred, None) transport = transport_class( host="squid.clam.whelk", @@ -8052,17 +9245,23 @@ def test_data_policy_service_transport_channel_mtls_with_client_cert_source( # Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are # removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize("transport_class", [transports.DataPolicyServiceGrpcTransport, transports.DataPolicyServiceGrpcAsyncIOTransport]) -def test_data_policy_service_transport_channel_mtls_with_adc( - transport_class -): +@pytest.mark.parametrize( + "transport_class", + [ + transports.DataPolicyServiceGrpcTransport, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ], +) +def test_data_policy_service_transport_channel_mtls_with_adc(transport_class): mock_ssl_cred = mock.Mock() with mock.patch.multiple( "google.auth.transport.grpc.SslCredentials", __init__=mock.Mock(return_value=None), ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), ): - with mock.patch.object(transport_class, "create_channel") as grpc_create_channel: + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: mock_grpc_channel = mock.Mock() grpc_create_channel.return_value = mock_grpc_channel mock_cred = mock.Mock() @@ -8094,7 +9293,13 @@ def test_data_policy_path(): project = "squid" location = "clam" data_policy = "whelk" - expected = "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format(project=project, location=location, data_policy=data_policy, ) + expected = ( + "projects/{project}/locations/{location}/dataPolicies/{data_policy}".format( + project=project, + location=location, + data_policy=data_policy, + ) + ) actual = DataPolicyServiceClient.data_policy_path(project, location, data_policy) assert expected == actual @@ -8111,13 +9316,21 @@ def test_parse_data_policy_path(): actual = DataPolicyServiceClient.parse_data_policy_path(path) assert expected == actual + def test_policy_tag_path(): project = "cuttlefish" location = "mussel" taxonomy = "winkle" policy_tag = "nautilus" - expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format(project=project, location=location, taxonomy=taxonomy, policy_tag=policy_tag, ) - actual = DataPolicyServiceClient.policy_tag_path(project, location, taxonomy, policy_tag) + expected = "projects/{project}/locations/{location}/taxonomies/{taxonomy}/policyTags/{policy_tag}".format( + project=project, + location=location, + taxonomy=taxonomy, + policy_tag=policy_tag, + ) + actual = DataPolicyServiceClient.policy_tag_path( + project, location, taxonomy, policy_tag + ) assert expected == actual @@ -8134,9 +9347,12 @@ def test_parse_policy_tag_path(): actual = DataPolicyServiceClient.parse_policy_tag_path(path) assert expected == actual + def test_common_billing_account_path(): billing_account = "whelk" - expected = "billingAccounts/{billing_account}".format(billing_account=billing_account, ) + expected = "billingAccounts/{billing_account}".format( + billing_account=billing_account, + ) actual = DataPolicyServiceClient.common_billing_account_path(billing_account) assert expected == actual @@ -8151,9 +9367,12 @@ def test_parse_common_billing_account_path(): actual = DataPolicyServiceClient.parse_common_billing_account_path(path) assert expected == actual + def test_common_folder_path(): folder = "oyster" - expected = "folders/{folder}".format(folder=folder, ) + expected = "folders/{folder}".format( + folder=folder, + ) actual = DataPolicyServiceClient.common_folder_path(folder) assert expected == actual @@ -8168,9 +9387,12 @@ def test_parse_common_folder_path(): actual = DataPolicyServiceClient.parse_common_folder_path(path) assert expected == actual + def test_common_organization_path(): organization = "cuttlefish" - expected = "organizations/{organization}".format(organization=organization, ) + expected = "organizations/{organization}".format( + organization=organization, + ) actual = DataPolicyServiceClient.common_organization_path(organization) assert expected == actual @@ -8185,9 +9407,12 @@ def test_parse_common_organization_path(): actual = DataPolicyServiceClient.parse_common_organization_path(path) assert expected == actual + def test_common_project_path(): project = "winkle" - expected = "projects/{project}".format(project=project, ) + expected = "projects/{project}".format( + project=project, + ) actual = DataPolicyServiceClient.common_project_path(project) assert expected == actual @@ -8202,10 +9427,14 @@ def test_parse_common_project_path(): actual = DataPolicyServiceClient.parse_common_project_path(path) assert expected == actual + def test_common_location_path(): project = "scallop" location = "abalone" - expected = "projects/{project}/locations/{location}".format(project=project, location=location, ) + expected = "projects/{project}/locations/{location}".format( + project=project, + location=location, + ) actual = DataPolicyServiceClient.common_location_path(project, location) assert expected == actual @@ -8225,14 +9454,18 @@ def test_parse_common_location_path(): def test_client_with_default_client_info(): client_info = gapic_v1.client_info.ClientInfo() - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + with mock.patch.object( + transports.DataPolicyServiceTransport, "_prep_wrapped_messages" + ) as prep: client = DataPolicyServiceClient( credentials=ga_credentials.AnonymousCredentials(), client_info=client_info, ) prep.assert_called_once_with(client_info) - with mock.patch.object(transports.DataPolicyServiceTransport, '_prep_wrapped_messages') as prep: + with mock.patch.object( + transports.DataPolicyServiceTransport, "_prep_wrapped_messages" + ) as prep: transport_class = DataPolicyServiceClient.get_transport_class() transport = transport_class( credentials=ga_credentials.AnonymousCredentials(), @@ -8243,10 +9476,11 @@ def test_client_with_default_client_info(): def test_transport_close_grpc(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="grpc" + credentials=ga_credentials.AnonymousCredentials(), transport="grpc" ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_grpc_channel")), "close" + ) as close: with client: close.assert_not_called() close.assert_called_once() @@ -8255,10 +9489,11 @@ def test_transport_close_grpc(): @pytest.mark.asyncio async def test_transport_close_grpc_asyncio(): client = DataPolicyServiceAsyncClient( - credentials=async_anonymous_credentials(), - transport="grpc_asyncio" + credentials=async_anonymous_credentials(), transport="grpc_asyncio" ) - with mock.patch.object(type(getattr(client.transport, "_grpc_channel")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_grpc_channel")), "close" + ) as close: async with client: close.assert_not_called() close.assert_called_once() @@ -8266,10 +9501,11 @@ async def test_transport_close_grpc_asyncio(): def test_transport_close_rest(): client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport="rest" + credentials=ga_credentials.AnonymousCredentials(), transport="rest" ) - with mock.patch.object(type(getattr(client.transport, "_session")), "close") as close: + with mock.patch.object( + type(getattr(client.transport, "_session")), "close" + ) as close: with client: close.assert_not_called() close.assert_called_once() @@ -8277,13 +9513,12 @@ def test_transport_close_rest(): def test_client_ctx(): transports = [ - 'rest', - 'grpc', + "rest", + "grpc", ] for transport in transports: client = DataPolicyServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport + credentials=ga_credentials.AnonymousCredentials(), transport=transport ) # Test client calls underlying transport. with mock.patch.object(type(client.transport), "close") as close: @@ -8292,10 +9527,17 @@ def test_client_ctx(): pass close.assert_called() -@pytest.mark.parametrize("client_class,transport_class", [ - (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), - (DataPolicyServiceAsyncClient, transports.DataPolicyServiceGrpcAsyncIOTransport), -]) + +@pytest.mark.parametrize( + "client_class,transport_class", + [ + (DataPolicyServiceClient, transports.DataPolicyServiceGrpcTransport), + ( + DataPolicyServiceAsyncClient, + transports.DataPolicyServiceGrpcAsyncIOTransport, + ), + ], +) def test_api_key_credentials(client_class, transport_class): with mock.patch.object( google.auth._default, "get_api_key_credentials", create=True @@ -8310,7 +9552,9 @@ def test_api_key_credentials(client_class, transport_class): patched.assert_called_once_with( credentials=mock_cred, credentials_file=None, - host=client._DEFAULT_ENDPOINT_TEMPLATE.format(UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE), + host=client._DEFAULT_ENDPOINT_TEMPLATE.format( + UNIVERSE_DOMAIN=client._DEFAULT_UNIVERSE + ), scopes=None, client_cert_source_for_mtls=None, quota_project_id=None,