diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index c701359..b8dcb4a 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -13,5 +13,4 @@ # limitations under the License. docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:c6c965a4bf40c19011b11f87dbc801a66d3a23fbc6704102be064ef31c51f1c3 -# created: 2022-08-09T15:58:56.463048506Z + digest: sha256:993a058718e84a82fda04c3177e58f0a43281a996c7c395e0a56ccc4d6d210d7 diff --git a/.kokoro/publish-docs.sh b/.kokoro/publish-docs.sh index 8acb14e..1c4d623 100755 --- a/.kokoro/publish-docs.sh +++ b/.kokoro/publish-docs.sh @@ -21,14 +21,12 @@ export PYTHONUNBUFFERED=1 export PATH="${HOME}/.local/bin:${PATH}" # Install nox -python3 -m pip install --user --upgrade --quiet nox +python3 -m pip install --require-hashes -r .kokoro/requirements.txt python3 -m nox --version # build docs nox -s docs -python3 -m pip install --user gcp-docuploader - # create metadata python3 -m docuploader create-metadata \ --name=$(jq --raw-output '.name // empty' .repo-metadata.json) \ diff --git a/.kokoro/release.sh b/.kokoro/release.sh index c69c086..7e61697 100755 --- a/.kokoro/release.sh +++ b/.kokoro/release.sh @@ -16,12 +16,9 @@ set -eo pipefail # Start the releasetool reporter -python3 -m pip install gcp-releasetool +python3 -m pip install --require-hashes -r github/python-network-security/.kokoro/requirements.txt python3 -m releasetool publish-reporter-script > /tmp/publisher-script; source /tmp/publisher-script -# Ensure that we have the latest versions of Twine, Wheel, and Setuptools. -python3 -m pip install --upgrade twine wheel setuptools - # Disable buffering, so that the logs stream through. export PYTHONUNBUFFERED=1 diff --git a/.kokoro/requirements.in b/.kokoro/requirements.in new file mode 100644 index 0000000..7718391 --- /dev/null +++ b/.kokoro/requirements.in @@ -0,0 +1,8 @@ +gcp-docuploader +gcp-releasetool +importlib-metadata +typing-extensions +twine +wheel +setuptools +nox \ No newline at end of file diff --git a/.kokoro/requirements.txt b/.kokoro/requirements.txt new file mode 100644 index 0000000..385f2d4 --- /dev/null +++ b/.kokoro/requirements.txt @@ -0,0 +1,472 @@ +# +# This file is autogenerated by pip-compile with python 3.10 +# To update, run: +# +# pip-compile --allow-unsafe --generate-hashes requirements.in +# +argcomplete==2.0.0 \ + --hash=sha256:6372ad78c89d662035101418ae253668445b391755cfe94ea52f1b9d22425b20 \ + --hash=sha256:cffa11ea77999bb0dd27bb25ff6dc142a6796142f68d45b1a26b11f58724561e + # via nox +attrs==22.1.0 \ + --hash=sha256:29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6 \ + --hash=sha256:86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c + # via gcp-releasetool +bleach==5.0.1 \ + --hash=sha256:085f7f33c15bd408dd9b17a4ad77c577db66d76203e5984b1bd59baeee948b2a \ + --hash=sha256:0d03255c47eb9bd2f26aa9bb7f2107732e7e8fe195ca2f64709fcf3b0a4a085c + # via readme-renderer +cachetools==5.2.0 \ + --hash=sha256:6a94c6402995a99c3970cc7e4884bb60b4a8639938157eeed436098bf9831757 \ + --hash=sha256:f9f17d2aec496a9aa6b76f53e3b614c965223c061982d434d160f930c698a9db + # via google-auth +certifi==2022.6.15 \ + --hash=sha256:84c85a9078b11105f04f3036a9482ae10e4621616db313fe045dd24743a0820d \ + --hash=sha256:fe86415d55e84719d75f8b69414f6438ac3547d2078ab91b67e779ef69378412 + # via requests +cffi==1.15.1 \ + --hash=sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5 \ + --hash=sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef \ + --hash=sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104 \ + --hash=sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426 \ + --hash=sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405 \ + --hash=sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375 \ + --hash=sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a \ + --hash=sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e \ + --hash=sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc \ + --hash=sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf \ + --hash=sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185 \ + --hash=sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497 \ + --hash=sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3 \ + --hash=sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35 \ + --hash=sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c \ + --hash=sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83 \ + --hash=sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21 \ + --hash=sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca \ + --hash=sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984 \ + --hash=sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac \ + --hash=sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd \ + --hash=sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee \ + --hash=sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a \ + --hash=sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2 \ + --hash=sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192 \ + --hash=sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7 \ + --hash=sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585 \ + --hash=sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f \ + --hash=sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e \ + --hash=sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27 \ + --hash=sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b \ + --hash=sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e \ + --hash=sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e \ + --hash=sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d \ + --hash=sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c \ + --hash=sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415 \ + --hash=sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82 \ + --hash=sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02 \ + --hash=sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314 \ + --hash=sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325 \ + --hash=sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c \ + --hash=sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3 \ + --hash=sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914 \ + --hash=sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045 \ + --hash=sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d \ + --hash=sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9 \ + --hash=sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5 \ + --hash=sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2 \ + --hash=sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c \ + --hash=sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3 \ + --hash=sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2 \ + --hash=sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8 \ + --hash=sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d \ + --hash=sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d \ + --hash=sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9 \ + --hash=sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162 \ + --hash=sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76 \ + --hash=sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4 \ + --hash=sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e \ + --hash=sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9 \ + --hash=sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6 \ + --hash=sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b \ + --hash=sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01 \ + --hash=sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0 + # via cryptography +charset-normalizer==2.1.1 \ + --hash=sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845 \ + --hash=sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f + # via requests +click==8.0.4 \ + --hash=sha256:6a7a62563bbfabfda3a38f3023a1db4a35978c0abd76f6c9605ecd6554d6d9b1 \ + --hash=sha256:8458d7b1287c5fb128c90e23381cf99dcde74beaf6c7ff6384ce84d6fe090adb + # via + # gcp-docuploader + # gcp-releasetool +colorlog==6.7.0 \ + --hash=sha256:0d33ca236784a1ba3ff9c532d4964126d8a2c44f1f0cb1d2b0728196f512f662 \ + --hash=sha256:bd94bd21c1e13fac7bd3153f4bc3a7dc0eb0974b8bc2fdf1a989e474f6e582e5 + # via + # gcp-docuploader + # nox +commonmark==0.9.1 \ + --hash=sha256:452f9dc859be7f06631ddcb328b6919c67984aca654e5fefb3914d54691aed60 \ + --hash=sha256:da2f38c92590f83de410ba1a3cbceafbc74fee9def35f9251ba9a971d6d66fd9 + # via rich +cryptography==37.0.4 \ + --hash=sha256:190f82f3e87033821828f60787cfa42bff98404483577b591429ed99bed39d59 \ + --hash=sha256:2be53f9f5505673eeda5f2736bea736c40f051a739bfae2f92d18aed1eb54596 \ + --hash=sha256:30788e070800fec9bbcf9faa71ea6d8068f5136f60029759fd8c3efec3c9dcb3 \ + --hash=sha256:3d41b965b3380f10e4611dbae366f6dc3cefc7c9ac4e8842a806b9672ae9add5 \ + --hash=sha256:4c590ec31550a724ef893c50f9a97a0c14e9c851c85621c5650d699a7b88f7ab \ + --hash=sha256:549153378611c0cca1042f20fd9c5030d37a72f634c9326e225c9f666d472884 \ + --hash=sha256:63f9c17c0e2474ccbebc9302ce2f07b55b3b3fcb211ded18a42d5764f5c10a82 \ + --hash=sha256:6bc95ed67b6741b2607298f9ea4932ff157e570ef456ef7ff0ef4884a134cc4b \ + --hash=sha256:7099a8d55cd49b737ffc99c17de504f2257e3787e02abe6d1a6d136574873441 \ + --hash=sha256:75976c217f10d48a8b5a8de3d70c454c249e4b91851f6838a4e48b8f41eb71aa \ + --hash=sha256:7bc997818309f56c0038a33b8da5c0bfbb3f1f067f315f9abd6fc07ad359398d \ + --hash=sha256:80f49023dd13ba35f7c34072fa17f604d2f19bf0989f292cedf7ab5770b87a0b \ + --hash=sha256:91ce48d35f4e3d3f1d83e29ef4a9267246e6a3be51864a5b7d2247d5086fa99a \ + --hash=sha256:a958c52505c8adf0d3822703078580d2c0456dd1d27fabfb6f76fe63d2971cd6 \ + --hash=sha256:b62439d7cd1222f3da897e9a9fe53bbf5c104fff4d60893ad1355d4c14a24157 \ + --hash=sha256:b7f8dd0d4c1f21759695c05a5ec8536c12f31611541f8904083f3dc582604280 \ + --hash=sha256:d204833f3c8a33bbe11eda63a54b1aad7aa7456ed769a982f21ec599ba5fa282 \ + --hash=sha256:e007f052ed10cc316df59bc90fbb7ff7950d7e2919c9757fd42a2b8ecf8a5f67 \ + --hash=sha256:f2dcb0b3b63afb6df7fd94ec6fbddac81b5492513f7b0436210d390c14d46ee8 \ + --hash=sha256:f721d1885ecae9078c3f6bbe8a88bc0786b6e749bf32ccec1ef2b18929a05046 \ + --hash=sha256:f7a6de3e98771e183645181b3627e2563dcde3ce94a9e42a3f427d2255190327 \ + --hash=sha256:f8c0a6e9e1dd3eb0414ba320f85da6b0dcbd543126e30fcc546e7372a7fbf3b9 + # via + # gcp-releasetool + # secretstorage +distlib==0.3.6 \ + --hash=sha256:14bad2d9b04d3a36127ac97f30b12a19268f211063d8f8ee4f47108896e11b46 \ + --hash=sha256:f35c4b692542ca110de7ef0bea44d73981caeb34ca0b9b6b2e6d7790dda8f80e + # via virtualenv +docutils==0.19 \ + --hash=sha256:33995a6753c30b7f577febfc2c50411fec6aac7f7ffeb7c4cfe5991072dcf9e6 \ + --hash=sha256:5e1de4d849fee02c63b040a4a3fd567f4ab104defd8a5511fbbc24a8a017efbc + # via readme-renderer +filelock==3.8.0 \ + --hash=sha256:55447caa666f2198c5b6b13a26d2084d26fa5b115c00d065664b2124680c4edc \ + --hash=sha256:617eb4e5eedc82fc5f47b6d61e4d11cb837c56cb4544e39081099fa17ad109d4 + # via virtualenv +gcp-docuploader==0.6.3 \ + --hash=sha256:ba8c9d76b3bbac54b0311c503a373b00edc2dc02d6d54ea9507045adb8e870f7 \ + --hash=sha256:c0f5aaa82ce1854a386197e4e359b120ad6d4e57ae2c812fce42219a3288026b + # via -r requirements.in +gcp-releasetool==1.8.7 \ + --hash=sha256:3d2a67c9db39322194afb3b427e9cb0476ce8f2a04033695f0aeb63979fc2b37 \ + --hash=sha256:5e4d28f66e90780d77f3ecf1e9155852b0c3b13cbccb08ab07e66b2357c8da8d + # via -r requirements.in +google-api-core==2.8.2 \ + --hash=sha256:06f7244c640322b508b125903bb5701bebabce8832f85aba9335ec00b3d02edc \ + --hash=sha256:93c6a91ccac79079ac6bbf8b74ee75db970cc899278b97d53bc012f35908cf50 + # via + # google-cloud-core + # google-cloud-storage +google-auth==2.11.0 \ + --hash=sha256:be62acaae38d0049c21ca90f27a23847245c9f161ff54ede13af2cb6afecbac9 \ + --hash=sha256:ed65ecf9f681832298e29328e1ef0a3676e3732b2e56f41532d45f70a22de0fb + # via + # gcp-releasetool + # google-api-core + # google-cloud-core + # google-cloud-storage +google-cloud-core==2.3.2 \ + --hash=sha256:8417acf6466be2fa85123441696c4badda48db314c607cf1e5d543fa8bdc22fe \ + --hash=sha256:b9529ee7047fd8d4bf4a2182de619154240df17fbe60ead399078c1ae152af9a + # via google-cloud-storage +google-cloud-storage==2.5.0 \ + --hash=sha256:19a26c66c317ce542cea0830b7e787e8dac2588b6bfa4d3fd3b871ba16305ab0 \ + --hash=sha256:382f34b91de2212e3c2e7b40ec079d27ee2e3dbbae99b75b1bcd8c63063ce235 + # via gcp-docuploader +google-crc32c==1.3.0 \ + --hash=sha256:04e7c220798a72fd0f08242bc8d7a05986b2a08a0573396187fd32c1dcdd58b3 \ + --hash=sha256:05340b60bf05b574159e9bd940152a47d38af3fb43803ffe71f11d704b7696a6 \ + --hash=sha256:12674a4c3b56b706153a358eaa1018c4137a5a04635b92b4652440d3d7386206 \ + --hash=sha256:127f9cc3ac41b6a859bd9dc4321097b1a4f6aa7fdf71b4f9227b9e3ebffb4422 \ + --hash=sha256:13af315c3a0eec8bb8b8d80b8b128cb3fcd17d7e4edafc39647846345a3f003a \ + --hash=sha256:1926fd8de0acb9d15ee757175ce7242e235482a783cd4ec711cc999fc103c24e \ + --hash=sha256:226f2f9b8e128a6ca6a9af9b9e8384f7b53a801907425c9a292553a3a7218ce0 \ + --hash=sha256:276de6273eb074a35bc598f8efbc00c7869c5cf2e29c90748fccc8c898c244df \ + --hash=sha256:318f73f5484b5671f0c7f5f63741ab020a599504ed81d209b5c7129ee4667407 \ + --hash=sha256:3bbce1be3687bbfebe29abdb7631b83e6b25da3f4e1856a1611eb21854b689ea \ + --hash=sha256:42ae4781333e331a1743445931b08ebdad73e188fd554259e772556fc4937c48 \ + --hash=sha256:58be56ae0529c664cc04a9c76e68bb92b091e0194d6e3c50bea7e0f266f73713 \ + --hash=sha256:5da2c81575cc3ccf05d9830f9e8d3c70954819ca9a63828210498c0774fda1a3 \ + --hash=sha256:6311853aa2bba4064d0c28ca54e7b50c4d48e3de04f6770f6c60ebda1e975267 \ + --hash=sha256:650e2917660e696041ab3dcd7abac160b4121cd9a484c08406f24c5964099829 \ + --hash=sha256:6a4db36f9721fdf391646685ecffa404eb986cbe007a3289499020daf72e88a2 \ + --hash=sha256:779cbf1ce375b96111db98fca913c1f5ec11b1d870e529b1dc7354b2681a8c3a \ + --hash=sha256:7f6fe42536d9dcd3e2ffb9d3053f5d05221ae3bbcefbe472bdf2c71c793e3183 \ + --hash=sha256:891f712ce54e0d631370e1f4997b3f182f3368179198efc30d477c75d1f44942 \ + --hash=sha256:95c68a4b9b7828ba0428f8f7e3109c5d476ca44996ed9a5f8aac6269296e2d59 \ + --hash=sha256:96a8918a78d5d64e07c8ea4ed2bc44354e3f93f46a4866a40e8db934e4c0d74b \ + --hash=sha256:9c3cf890c3c0ecfe1510a452a165431b5831e24160c5fcf2071f0f85ca5a47cd \ + --hash=sha256:9f58099ad7affc0754ae42e6d87443299f15d739b0ce03c76f515153a5cda06c \ + --hash=sha256:a0b9e622c3b2b8d0ce32f77eba617ab0d6768b82836391e4f8f9e2074582bf02 \ + --hash=sha256:a7f9cbea4245ee36190f85fe1814e2d7b1e5f2186381b082f5d59f99b7f11328 \ + --hash=sha256:bab4aebd525218bab4ee615786c4581952eadc16b1ff031813a2fd51f0cc7b08 \ + --hash=sha256:c124b8c8779bf2d35d9b721e52d4adb41c9bfbde45e6a3f25f0820caa9aba73f \ + --hash=sha256:c9da0a39b53d2fab3e5467329ed50e951eb91386e9d0d5b12daf593973c3b168 \ + --hash=sha256:ca60076c388728d3b6ac3846842474f4250c91efbfe5afa872d3ffd69dd4b318 \ + --hash=sha256:cb6994fff247987c66a8a4e550ef374671c2b82e3c0d2115e689d21e511a652d \ + --hash=sha256:d1c1d6236feab51200272d79b3d3e0f12cf2cbb12b208c835b175a21efdb0a73 \ + --hash=sha256:dd7760a88a8d3d705ff562aa93f8445ead54f58fd482e4f9e2bafb7e177375d4 \ + --hash=sha256:dda4d8a3bb0b50f540f6ff4b6033f3a74e8bf0bd5320b70fab2c03e512a62812 \ + --hash=sha256:e0f1ff55dde0ebcfbef027edc21f71c205845585fffe30d4ec4979416613e9b3 \ + --hash=sha256:e7a539b9be7b9c00f11ef16b55486141bc2cdb0c54762f84e3c6fc091917436d \ + --hash=sha256:eb0b14523758e37802f27b7f8cd973f5f3d33be7613952c0df904b68c4842f0e \ + --hash=sha256:ed447680ff21c14aaceb6a9f99a5f639f583ccfe4ce1a5e1d48eb41c3d6b3217 \ + --hash=sha256:f52a4ad2568314ee713715b1e2d79ab55fab11e8b304fd1462ff5cccf4264b3e \ + --hash=sha256:fbd60c6aaa07c31d7754edbc2334aef50601b7f1ada67a96eb1eb57c7c72378f \ + --hash=sha256:fc28e0db232c62ca0c3600884933178f0825c99be4474cdd645e378a10588125 \ + --hash=sha256:fe31de3002e7b08eb20823b3735b97c86c5926dd0581c7710a680b418a8709d4 \ + --hash=sha256:fec221a051150eeddfdfcff162e6db92c65ecf46cb0f7bb1bf812a1520ec026b \ + --hash=sha256:ff71073ebf0e42258a42a0b34f2c09ec384977e7f6808999102eedd5b49920e3 + # via google-resumable-media +google-resumable-media==2.3.3 \ + --hash=sha256:27c52620bd364d1c8116eaac4ea2afcbfb81ae9139fb3199652fcac1724bfb6c \ + --hash=sha256:5b52774ea7a829a8cdaa8bd2d4c3d4bc660c91b30857ab2668d0eb830f4ea8c5 + # via google-cloud-storage +googleapis-common-protos==1.56.4 \ + --hash=sha256:8eb2cbc91b69feaf23e32452a7ae60e791e09967d81d4fcc7fc388182d1bd394 \ + --hash=sha256:c25873c47279387cfdcbdafa36149887901d36202cb645a0e4f29686bf6e4417 + # via google-api-core +idna==3.3 \ + --hash=sha256:84d9dd047ffa80596e0f246e2eab0b391788b0503584e8945f2368256d2735ff \ + --hash=sha256:9d643ff0a55b762d5cdb124b8eaa99c66322e2157b69160bc32796e824360e6d + # via requests +importlib-metadata==4.12.0 \ + --hash=sha256:637245b8bab2b6502fcbc752cc4b7a6f6243bb02b31c5c26156ad103d3d45670 \ + --hash=sha256:7401a975809ea1fdc658c3aa4f78cc2195a0e019c5cbc4c06122884e9ae80c23 + # via + # -r requirements.in + # twine +jaraco-classes==3.2.2 \ + --hash=sha256:6745f113b0b588239ceb49532aa09c3ebb947433ce311ef2f8e3ad64ebb74594 \ + --hash=sha256:e6ef6fd3fcf4579a7a019d87d1e56a883f4e4c35cfe925f86731abc58804e647 + # via keyring +jeepney==0.8.0 \ + --hash=sha256:5efe48d255973902f6badc3ce55e2aa6c5c3b3bc642059ef3a91247bcfcc5806 \ + --hash=sha256:c0a454ad016ca575060802ee4d590dd912e35c122fa04e70306de3d076cce755 + # via + # keyring + # secretstorage +jinja2==3.1.2 \ + --hash=sha256:31351a702a408a9e7595a8fc6150fc3f43bb6bf7e319770cbc0db9df9437e852 \ + --hash=sha256:6088930bfe239f0e6710546ab9c19c9ef35e29792895fed6e6e31a023a182a61 + # via gcp-releasetool +keyring==23.9.0 \ + --hash=sha256:4c32a31174faaee48f43a7e2c7e9c3216ec5e95acf22a2bebfb4a1d05056ee44 \ + --hash=sha256:98f060ec95ada2ab910c195a2d4317be6ef87936a766b239c46aa3c7aac4f0db + # via + # gcp-releasetool + # twine +markupsafe==2.1.1 \ + --hash=sha256:0212a68688482dc52b2d45013df70d169f542b7394fc744c02a57374a4207003 \ + --hash=sha256:089cf3dbf0cd6c100f02945abeb18484bd1ee57a079aefd52cffd17fba910b88 \ + --hash=sha256:10c1bfff05d95783da83491be968e8fe789263689c02724e0c691933c52994f5 \ + --hash=sha256:33b74d289bd2f5e527beadcaa3f401e0df0a89927c1559c8566c066fa4248ab7 \ + --hash=sha256:3799351e2336dc91ea70b034983ee71cf2f9533cdff7c14c90ea126bfd95d65a \ + --hash=sha256:3ce11ee3f23f79dbd06fb3d63e2f6af7b12db1d46932fe7bd8afa259a5996603 \ + --hash=sha256:421be9fbf0ffe9ffd7a378aafebbf6f4602d564d34be190fc19a193232fd12b1 \ + --hash=sha256:43093fb83d8343aac0b1baa75516da6092f58f41200907ef92448ecab8825135 \ + --hash=sha256:46d00d6cfecdde84d40e572d63735ef81423ad31184100411e6e3388d405e247 \ + --hash=sha256:4a33dea2b688b3190ee12bd7cfa29d39c9ed176bda40bfa11099a3ce5d3a7ac6 \ + --hash=sha256:4b9fe39a2ccc108a4accc2676e77da025ce383c108593d65cc909add5c3bd601 \ + --hash=sha256:56442863ed2b06d19c37f94d999035e15ee982988920e12a5b4ba29b62ad1f77 \ + --hash=sha256:671cd1187ed5e62818414afe79ed29da836dde67166a9fac6d435873c44fdd02 \ + --hash=sha256:694deca8d702d5db21ec83983ce0bb4b26a578e71fbdbd4fdcd387daa90e4d5e \ + --hash=sha256:6a074d34ee7a5ce3effbc526b7083ec9731bb3cbf921bbe1d3005d4d2bdb3a63 \ + --hash=sha256:6d0072fea50feec76a4c418096652f2c3238eaa014b2f94aeb1d56a66b41403f \ + --hash=sha256:6fbf47b5d3728c6aea2abb0589b5d30459e369baa772e0f37a0320185e87c980 \ + --hash=sha256:7f91197cc9e48f989d12e4e6fbc46495c446636dfc81b9ccf50bb0ec74b91d4b \ + --hash=sha256:86b1f75c4e7c2ac2ccdaec2b9022845dbb81880ca318bb7a0a01fbf7813e3812 \ + --hash=sha256:8dc1c72a69aa7e082593c4a203dcf94ddb74bb5c8a731e4e1eb68d031e8498ff \ + --hash=sha256:8e3dcf21f367459434c18e71b2a9532d96547aef8a871872a5bd69a715c15f96 \ + --hash=sha256:8e576a51ad59e4bfaac456023a78f6b5e6e7651dcd383bcc3e18d06f9b55d6d1 \ + --hash=sha256:96e37a3dc86e80bf81758c152fe66dbf60ed5eca3d26305edf01892257049925 \ + --hash=sha256:97a68e6ada378df82bc9f16b800ab77cbf4b2fada0081794318520138c088e4a \ + --hash=sha256:99a2a507ed3ac881b975a2976d59f38c19386d128e7a9a18b7df6fff1fd4c1d6 \ + --hash=sha256:a49907dd8420c5685cfa064a1335b6754b74541bbb3706c259c02ed65b644b3e \ + --hash=sha256:b09bf97215625a311f669476f44b8b318b075847b49316d3e28c08e41a7a573f \ + --hash=sha256:b7bd98b796e2b6553da7225aeb61f447f80a1ca64f41d83612e6139ca5213aa4 \ + --hash=sha256:b87db4360013327109564f0e591bd2a3b318547bcef31b468a92ee504d07ae4f \ + --hash=sha256:bcb3ed405ed3222f9904899563d6fc492ff75cce56cba05e32eff40e6acbeaa3 \ + --hash=sha256:d4306c36ca495956b6d568d276ac11fdd9c30a36f1b6eb928070dc5360b22e1c \ + --hash=sha256:d5ee4f386140395a2c818d149221149c54849dfcfcb9f1debfe07a8b8bd63f9a \ + --hash=sha256:dda30ba7e87fbbb7eab1ec9f58678558fd9a6b8b853530e176eabd064da81417 \ + --hash=sha256:e04e26803c9c3851c931eac40c695602c6295b8d432cbe78609649ad9bd2da8a \ + --hash=sha256:e1c0b87e09fa55a220f058d1d49d3fb8df88fbfab58558f1198e08c1e1de842a \ + --hash=sha256:e72591e9ecd94d7feb70c1cbd7be7b3ebea3f548870aa91e2732960fa4d57a37 \ + --hash=sha256:e8c843bbcda3a2f1e3c2ab25913c80a3c5376cd00c6e8c4a86a89a28c8dc5452 \ + --hash=sha256:efc1913fd2ca4f334418481c7e595c00aad186563bbc1ec76067848c7ca0a933 \ + --hash=sha256:f121a1420d4e173a5d96e47e9a0c0dcff965afdf1626d28de1460815f7c4ee7a \ + --hash=sha256:fc7b548b17d238737688817ab67deebb30e8073c95749d55538ed473130ec0c7 + # via jinja2 +more-itertools==8.14.0 \ + --hash=sha256:1bc4f91ee5b1b31ac7ceacc17c09befe6a40a503907baf9c839c229b5095cfd2 \ + --hash=sha256:c09443cd3d5438b8dafccd867a6bc1cb0894389e90cb53d227456b0b0bccb750 + # via jaraco-classes +nox==2022.8.7 \ + --hash=sha256:1b894940551dc5c389f9271d197ca5d655d40bdc6ccf93ed6880e4042760a34b \ + --hash=sha256:96cca88779e08282a699d672258ec01eb7c792d35bbbf538c723172bce23212c + # via -r requirements.in +packaging==21.3 \ + --hash=sha256:dd47c42927d89ab911e606518907cc2d3a1f38bbd026385970643f9c5b8ecfeb \ + --hash=sha256:ef103e05f519cdc783ae24ea4e2e0f508a9c99b2d4969652eed6a2e1ea5bd522 + # via + # gcp-releasetool + # nox +pkginfo==1.8.3 \ + --hash=sha256:848865108ec99d4901b2f7e84058b6e7660aae8ae10164e015a6dcf5b242a594 \ + --hash=sha256:a84da4318dd86f870a9447a8c98340aa06216bfc6f2b7bdc4b8766984ae1867c + # via twine +platformdirs==2.5.2 \ + --hash=sha256:027d8e83a2d7de06bbac4e5ef7e023c02b863d7ea5d079477e722bb41ab25788 \ + --hash=sha256:58c8abb07dcb441e6ee4b11d8df0ac856038f944ab98b7be6b27b2a3c7feef19 + # via virtualenv +protobuf==3.20.1 \ + --hash=sha256:06059eb6953ff01e56a25cd02cca1a9649a75a7e65397b5b9b4e929ed71d10cf \ + --hash=sha256:097c5d8a9808302fb0da7e20edf0b8d4703274d140fd25c5edabddcde43e081f \ + --hash=sha256:284f86a6207c897542d7e956eb243a36bb8f9564c1742b253462386e96c6b78f \ + --hash=sha256:32ca378605b41fd180dfe4e14d3226386d8d1b002ab31c969c366549e66a2bb7 \ + --hash=sha256:3cc797c9d15d7689ed507b165cd05913acb992d78b379f6014e013f9ecb20996 \ + --hash=sha256:62f1b5c4cd6c5402b4e2d63804ba49a327e0c386c99b1675c8a0fefda23b2067 \ + --hash=sha256:69ccfdf3657ba59569c64295b7d51325f91af586f8d5793b734260dfe2e94e2c \ + --hash=sha256:6f50601512a3d23625d8a85b1638d914a0970f17920ff39cec63aaef80a93fb7 \ + --hash=sha256:7403941f6d0992d40161aa8bb23e12575637008a5a02283a930addc0508982f9 \ + --hash=sha256:755f3aee41354ae395e104d62119cb223339a8f3276a0cd009ffabfcdd46bb0c \ + --hash=sha256:77053d28427a29987ca9caf7b72ccafee011257561259faba8dd308fda9a8739 \ + --hash=sha256:7e371f10abe57cee5021797126c93479f59fccc9693dafd6bd5633ab67808a91 \ + --hash=sha256:9016d01c91e8e625141d24ec1b20fed584703e527d28512aa8c8707f105a683c \ + --hash=sha256:9be73ad47579abc26c12024239d3540e6b765182a91dbc88e23658ab71767153 \ + --hash=sha256:adc31566d027f45efe3f44eeb5b1f329da43891634d61c75a5944e9be6dd42c9 \ + --hash=sha256:adfc6cf69c7f8c50fd24c793964eef18f0ac321315439d94945820612849c388 \ + --hash=sha256:af0ebadc74e281a517141daad9d0f2c5d93ab78e9d455113719a45a49da9db4e \ + --hash=sha256:cb29edb9eab15742d791e1025dd7b6a8f6fcb53802ad2f6e3adcb102051063ab \ + --hash=sha256:cd68be2559e2a3b84f517fb029ee611546f7812b1fdd0aa2ecc9bc6ec0e4fdde \ + --hash=sha256:cdee09140e1cd184ba9324ec1df410e7147242b94b5f8b0c64fc89e38a8ba531 \ + --hash=sha256:db977c4ca738dd9ce508557d4fce0f5aebd105e158c725beec86feb1f6bc20d8 \ + --hash=sha256:dd5789b2948ca702c17027c84c2accb552fc30f4622a98ab5c51fcfe8c50d3e7 \ + --hash=sha256:e250a42f15bf9d5b09fe1b293bdba2801cd520a9f5ea2d7fb7536d4441811d20 \ + --hash=sha256:ff8d8fa42675249bb456f5db06c00de6c2f4c27a065955917b28c4f15978b9c3 + # via + # gcp-docuploader + # gcp-releasetool + # google-api-core +py==1.11.0 \ + --hash=sha256:51c75c4126074b472f746a24399ad32f6053d1b34b68d2fa41e558e6f4a98719 \ + --hash=sha256:607c53218732647dff4acdfcd50cb62615cedf612e72d1724fb1a0cc6405b378 + # via nox +pyasn1==0.4.8 \ + --hash=sha256:39c7e2ec30515947ff4e87fb6f456dfc6e84857d34be479c9d4a4ba4bf46aa5d \ + --hash=sha256:aef77c9fb94a3ac588e87841208bdec464471d9871bd5050a287cc9a475cd0ba + # via + # pyasn1-modules + # rsa +pyasn1-modules==0.2.8 \ + --hash=sha256:905f84c712230b2c592c19470d3ca8d552de726050d1d1716282a1f6146be65e \ + --hash=sha256:a50b808ffeb97cb3601dd25981f6b016cbb3d31fbf57a8b8a87428e6158d0c74 + # via google-auth +pycparser==2.21 \ + --hash=sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9 \ + --hash=sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206 + # via cffi +pygments==2.13.0 \ + --hash=sha256:56a8508ae95f98e2b9bdf93a6be5ae3f7d8af858b43e02c5a2ff083726be40c1 \ + --hash=sha256:f643f331ab57ba3c9d89212ee4a2dabc6e94f117cf4eefde99a0574720d14c42 + # via + # readme-renderer + # rich +pyjwt==2.4.0 \ + --hash=sha256:72d1d253f32dbd4f5c88eaf1fdc62f3a19f676ccbadb9dbc5d07e951b2b26daf \ + --hash=sha256:d42908208c699b3b973cbeb01a969ba6a96c821eefb1c5bfe4c390c01d67abba + # via gcp-releasetool +pyparsing==3.0.9 \ + --hash=sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb \ + --hash=sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc + # via packaging +pyperclip==1.8.2 \ + --hash=sha256:105254a8b04934f0bc84e9c24eb360a591aaf6535c9def5f29d92af107a9bf57 + # via gcp-releasetool +python-dateutil==2.8.2 \ + --hash=sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86 \ + --hash=sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9 + # via gcp-releasetool +readme-renderer==37.0 \ + --hash=sha256:07b7ea234e03e58f77cc222e206e6abb8f4c0435becce5104794ee591f9301c5 \ + --hash=sha256:9fa416704703e509eeb900696751c908ddeb2011319d93700d8f18baff887a69 + # via twine +requests==2.28.1 \ + --hash=sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983 \ + --hash=sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349 + # via + # gcp-releasetool + # google-api-core + # google-cloud-storage + # requests-toolbelt + # twine +requests-toolbelt==0.9.1 \ + --hash=sha256:380606e1d10dc85c3bd47bf5a6095f815ec007be7a8b69c878507068df059e6f \ + --hash=sha256:968089d4584ad4ad7c171454f0a5c6dac23971e9472521ea3b6d49d610aa6fc0 + # via twine +rfc3986==2.0.0 \ + --hash=sha256:50b1502b60e289cb37883f3dfd34532b8873c7de9f49bb546641ce9cbd256ebd \ + --hash=sha256:97aacf9dbd4bfd829baad6e6309fa6573aaf1be3f6fa735c8ab05e46cecb261c + # via twine +rich==12.5.1 \ + --hash=sha256:2eb4e6894cde1e017976d2975ac210ef515d7548bc595ba20e195fb9628acdeb \ + --hash=sha256:63a5c5ce3673d3d5fbbf23cd87e11ab84b6b451436f1b7f19ec54b6bc36ed7ca + # via twine +rsa==4.9 \ + --hash=sha256:90260d9058e514786967344d0ef75fa8727eed8a7d2e43ce9f4bcf1b536174f7 \ + --hash=sha256:e38464a49c6c85d7f1351b0126661487a7e0a14a50f1675ec50eb34d4f20ef21 + # via google-auth +secretstorage==3.3.3 \ + --hash=sha256:2403533ef369eca6d2ba81718576c5e0f564d5cca1b58f73a8b23e7d4eeebd77 \ + --hash=sha256:f356e6628222568e3af06f2eba8df495efa13b3b63081dafd4f7d9a7b7bc9f99 + # via keyring +six==1.16.0 \ + --hash=sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926 \ + --hash=sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254 + # via + # bleach + # gcp-docuploader + # google-auth + # python-dateutil +twine==4.0.1 \ + --hash=sha256:42026c18e394eac3e06693ee52010baa5313e4811d5a11050e7d48436cf41b9e \ + --hash=sha256:96b1cf12f7ae611a4a40b6ae8e9570215daff0611828f5fe1f37a16255ab24a0 + # via -r requirements.in +typing-extensions==4.3.0 \ + --hash=sha256:25642c956049920a5aa49edcdd6ab1e06d7e5d467fc00e0506c44ac86fbfca02 \ + --hash=sha256:e6d2677a32f47fc7eb2795db1dd15c1f34eff616bcaf2cfb5e997f854fa1c4a6 + # via -r requirements.in +urllib3==1.26.12 \ + --hash=sha256:3fa96cf423e6987997fc326ae8df396db2a8b7c667747d47ddd8ecba91f4a74e \ + --hash=sha256:b930dd878d5a8afb066a637fbb35144fe7901e3b209d1cd4f524bd0e9deee997 + # via + # requests + # twine +virtualenv==20.16.4 \ + --hash=sha256:014f766e4134d0008dcaa1f95bafa0fb0f575795d07cae50b1bee514185d6782 \ + --hash=sha256:035ed57acce4ac35c82c9d8802202b0e71adac011a511ff650cbcf9635006a22 + # via nox +webencodings==0.5.1 \ + --hash=sha256:a0af1213f3c2226497a97e2b3aa01a7e4bee4f403f95be16fc9acd2947514a78 \ + --hash=sha256:b36a1c245f2d304965eb4e0a82848379241dc04b865afcc4aab16748587e1923 + # via bleach +wheel==0.37.1 \ + --hash=sha256:4bdcd7d840138086126cd09254dc6195fb4fc6f01c050a1d7236f2630db1d22a \ + --hash=sha256:e9a504e793efbca1b8e0e9cb979a249cf4a0a7b5b8c9e8b65a5e39d49529c1c4 + # via -r requirements.in +zipp==3.8.1 \ + --hash=sha256:05b45f1ee8f807d0cc928485ca40a07cb491cf092ff587c0df9cb1fd154848d2 \ + --hash=sha256:47c40d7fe183a6f21403a199b3e4192cca5774656965b0a4988ad2f8feb5f009 + # via importlib-metadata + +# The following packages are considered to be unsafe in a requirements file: +setuptools==65.2.0 \ + --hash=sha256:7f4bc85450898a09f76ebf28b72fa25bc7111f6c7d665d514a60bba9c75ef2a9 \ + --hash=sha256:a3ca5857c89f82f5c9410e8508cb32f4872a3bafd4aa7ae122a24ca33bccc750 + # via -r requirements.in diff --git a/CHANGELOG.md b/CHANGELOG.md index 9a6ea3f..4c6f5cb 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,18 @@ # Changelog +## [0.7.0](https://github.com/googleapis/python-network-security/compare/v0.6.1...v0.7.0) (2022-09-16) + + +### Features + +* Add support for REST transport ([#136](https://github.com/googleapis/python-network-security/issues/136)) ([e17eff4](https://github.com/googleapis/python-network-security/commit/e17eff464aeb9504ed1f493eebd23f11df6655c4)) + + +### Bug Fixes + +* **deps:** require google-api-core>=1.33.1,>=2.8.0 ([e17eff4](https://github.com/googleapis/python-network-security/commit/e17eff464aeb9504ed1f493eebd23f11df6655c4)) +* **deps:** require protobuf >= 3.20.1 ([e17eff4](https://github.com/googleapis/python-network-security/commit/e17eff464aeb9504ed1f493eebd23f11df6655c4)) + ## [0.6.1](https://github.com/googleapis/python-network-security/compare/v0.6.0...v0.6.1) (2022-08-15) diff --git a/google/cloud/network_security_v1/gapic_metadata.json b/google/cloud/network_security_v1/gapic_metadata.json index 51d7920..edaaf2f 100644 --- a/google/cloud/network_security_v1/gapic_metadata.json +++ b/google/cloud/network_security_v1/gapic_metadata.json @@ -166,6 +166,86 @@ ] } } + }, + "rest": { + "libraryClient": "NetworkSecurityClient", + "rpcs": { + "CreateAuthorizationPolicy": { + "methods": [ + "create_authorization_policy" + ] + }, + "CreateClientTlsPolicy": { + "methods": [ + "create_client_tls_policy" + ] + }, + "CreateServerTlsPolicy": { + "methods": [ + "create_server_tls_policy" + ] + }, + "DeleteAuthorizationPolicy": { + "methods": [ + "delete_authorization_policy" + ] + }, + "DeleteClientTlsPolicy": { + "methods": [ + "delete_client_tls_policy" + ] + }, + "DeleteServerTlsPolicy": { + "methods": [ + "delete_server_tls_policy" + ] + }, + "GetAuthorizationPolicy": { + "methods": [ + "get_authorization_policy" + ] + }, + "GetClientTlsPolicy": { + "methods": [ + "get_client_tls_policy" + ] + }, + "GetServerTlsPolicy": { + "methods": [ + "get_server_tls_policy" + ] + }, + "ListAuthorizationPolicies": { + "methods": [ + "list_authorization_policies" + ] + }, + "ListClientTlsPolicies": { + "methods": [ + "list_client_tls_policies" + ] + }, + "ListServerTlsPolicies": { + "methods": [ + "list_server_tls_policies" + ] + }, + "UpdateAuthorizationPolicy": { + "methods": [ + "update_authorization_policy" + ] + }, + "UpdateClientTlsPolicy": { + "methods": [ + "update_client_tls_policy" + ] + }, + "UpdateServerTlsPolicy": { + "methods": [ + "update_server_tls_policy" + ] + } + } } } } diff --git a/google/cloud/network_security_v1/services/network_security/async_client.py b/google/cloud/network_security_v1/services/network_security/async_client.py index 0a9f354..4f8c76f 100644 --- a/google/cloud/network_security_v1/services/network_security/async_client.py +++ b/google/cloud/network_security_v1/services/network_security/async_client.py @@ -253,6 +253,13 @@ async def list_authorization_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_list_authorization_policies(): @@ -362,6 +369,13 @@ async def get_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_get_authorization_policy(): @@ -468,6 +482,13 @@ async def create_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_create_authorization_policy(): @@ -614,6 +635,13 @@ async def update_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_update_authorization_policy(): @@ -748,6 +776,13 @@ async def delete_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_delete_authorization_policy(): @@ -867,6 +902,13 @@ async def list_server_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_list_server_tls_policies(): @@ -976,6 +1018,13 @@ async def get_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_get_server_tls_policy(): @@ -1080,6 +1129,13 @@ async def create_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_create_server_tls_policy(): @@ -1220,6 +1276,13 @@ async def update_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_update_server_tls_policy(): @@ -1351,6 +1414,13 @@ async def delete_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_delete_server_tls_policy(): @@ -1470,6 +1540,13 @@ async def list_client_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_list_client_tls_policies(): @@ -1579,6 +1656,13 @@ async def get_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_get_client_tls_policy(): @@ -1682,6 +1766,13 @@ async def create_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_create_client_tls_policy(): @@ -1821,6 +1912,13 @@ async def update_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_update_client_tls_policy(): @@ -1951,6 +2049,13 @@ async def delete_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 async def sample_delete_client_tls_policy(): diff --git a/google/cloud/network_security_v1/services/network_security/client.py b/google/cloud/network_security_v1/services/network_security/client.py index 0de0527..b71eea8 100644 --- a/google/cloud/network_security_v1/services/network_security/client.py +++ b/google/cloud/network_security_v1/services/network_security/client.py @@ -59,6 +59,7 @@ from .transports.base import DEFAULT_CLIENT_INFO, NetworkSecurityTransport from .transports.grpc import NetworkSecurityGrpcTransport from .transports.grpc_asyncio import NetworkSecurityGrpcAsyncIOTransport +from .transports.rest import NetworkSecurityRestTransport class NetworkSecurityClientMeta(type): @@ -74,6 +75,7 @@ class NetworkSecurityClientMeta(type): ) # type: Dict[str, Type[NetworkSecurityTransport]] _transport_registry["grpc"] = NetworkSecurityGrpcTransport _transport_registry["grpc_asyncio"] = NetworkSecurityGrpcAsyncIOTransport + _transport_registry["rest"] = NetworkSecurityRestTransport def get_transport_class( cls, @@ -414,6 +416,9 @@ def __init__( transport (Union[str, NetworkSecurityTransport]): The transport to use. If set to None, a transport is chosen automatically. + NOTE: "rest" transport functionality is currently in a + beta state (preview). We welcome your feedback via an + issue in this library's source repository. client_options (google.api_core.client_options.ClientOptions): Custom options for the client. It won't take effect if a ``transport`` instance is provided. (1) The ``api_endpoint`` property can be used to override the @@ -510,6 +515,13 @@ def list_authorization_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_list_authorization_policies(): @@ -623,6 +635,13 @@ def get_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_get_authorization_policy(): @@ -729,6 +748,13 @@ def create_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_create_authorization_policy(): @@ -879,6 +905,13 @@ def update_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_update_authorization_policy(): @@ -1017,6 +1050,13 @@ def delete_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_delete_authorization_policy(): @@ -1140,6 +1180,13 @@ def list_server_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_list_server_tls_policies(): @@ -1249,6 +1296,13 @@ def get_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_get_server_tls_policy(): @@ -1353,6 +1407,13 @@ def create_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_create_server_tls_policy(): @@ -1493,6 +1554,13 @@ def update_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_update_server_tls_policy(): @@ -1624,6 +1692,13 @@ def delete_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_delete_server_tls_policy(): @@ -1743,6 +1818,13 @@ def list_client_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_list_client_tls_policies(): @@ -1852,6 +1934,13 @@ def get_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_get_client_tls_policy(): @@ -1955,6 +2044,13 @@ def create_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_create_client_tls_policy(): @@ -2094,6 +2190,13 @@ def update_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_update_client_tls_policy(): @@ -2224,6 +2327,13 @@ def delete_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 def sample_delete_client_tls_policy(): diff --git a/google/cloud/network_security_v1/services/network_security/transports/__init__.py b/google/cloud/network_security_v1/services/network_security/transports/__init__.py index e6f7341..4814e0c 100644 --- a/google/cloud/network_security_v1/services/network_security/transports/__init__.py +++ b/google/cloud/network_security_v1/services/network_security/transports/__init__.py @@ -19,14 +19,18 @@ from .base import NetworkSecurityTransport from .grpc import NetworkSecurityGrpcTransport from .grpc_asyncio import NetworkSecurityGrpcAsyncIOTransport +from .rest import NetworkSecurityRestInterceptor, NetworkSecurityRestTransport # Compile a registry of transports. _transport_registry = OrderedDict() # type: Dict[str, Type[NetworkSecurityTransport]] _transport_registry["grpc"] = NetworkSecurityGrpcTransport _transport_registry["grpc_asyncio"] = NetworkSecurityGrpcAsyncIOTransport +_transport_registry["rest"] = NetworkSecurityRestTransport __all__ = ( "NetworkSecurityTransport", "NetworkSecurityGrpcTransport", "NetworkSecurityGrpcAsyncIOTransport", + "NetworkSecurityRestTransport", + "NetworkSecurityRestInterceptor", ) diff --git a/google/cloud/network_security_v1/services/network_security/transports/rest.py b/google/cloud/network_security_v1/services/network_security/transports/rest.py new file mode 100644 index 0000000..3d53262 --- /dev/null +++ b/google/cloud/network_security_v1/services/network_security/transports/rest.py @@ -0,0 +1,2294 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +import dataclasses +import json # type: ignore +import re +from typing import Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + +from google.api_core import ( + gapic_v1, + operations_v1, + path_template, + rest_helpers, + rest_streaming, +) +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.protobuf import json_format +import grpc # type: ignore +from requests import __version__ as requests_version + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore + + +from google.longrunning import operations_pb2 # type: ignore + +from google.cloud.network_security_v1.types import ( + authorization_policy as gcn_authorization_policy, +) +from google.cloud.network_security_v1.types import ( + client_tls_policy as gcn_client_tls_policy, +) +from google.cloud.network_security_v1.types import ( + server_tls_policy as gcn_server_tls_policy, +) +from google.cloud.network_security_v1.types import authorization_policy +from google.cloud.network_security_v1.types import client_tls_policy +from google.cloud.network_security_v1.types import server_tls_policy + +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO +from .base import NetworkSecurityTransport + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=requests_version, +) + + +class NetworkSecurityRestInterceptor: + """Interceptor for NetworkSecurity. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the NetworkSecurityRestTransport. + + .. code-block:: python + class MyCustomNetworkSecurityInterceptor(NetworkSecurityRestInterceptor): + def pre_create_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_create_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_create_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_list_authorization_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_authorization_policies(response): + logging.log(f"Received response: {response}") + + def pre_list_client_tls_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_client_tls_policies(response): + logging.log(f"Received response: {response}") + + def pre_list_server_tls_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_server_tls_policies(response): + logging.log(f"Received response: {response}") + + def pre_update_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_update_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_update_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_server_tls_policy(response): + logging.log(f"Received response: {response}") + + transport = NetworkSecurityRestTransport(interceptor=MyCustomNetworkSecurityInterceptor()) + client = NetworkSecurityClient(transport=transport) + + + """ + + def pre_create_authorization_policy( + self, + request: gcn_authorization_policy.CreateAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_authorization_policy.CreateAuthorizationPolicyRequest, + Sequence[Tuple[str, str]], + ]: + """Pre-rpc interceptor for create_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_create_client_tls_policy( + self, + request: gcn_client_tls_policy.CreateClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_client_tls_policy.CreateClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for create_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_create_server_tls_policy( + self, + request: gcn_server_tls_policy.CreateServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_server_tls_policy.CreateServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for create_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_authorization_policy( + self, + request: authorization_policy.DeleteAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.DeleteAuthorizationPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_client_tls_policy( + self, + request: client_tls_policy.DeleteClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + client_tls_policy.DeleteClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_server_tls_policy( + self, + request: server_tls_policy.DeleteServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + server_tls_policy.DeleteServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_authorization_policy( + self, + request: authorization_policy.GetAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.GetAuthorizationPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for get_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_authorization_policy( + self, response: authorization_policy.AuthorizationPolicy + ) -> authorization_policy.AuthorizationPolicy: + """Post-rpc interceptor for get_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_client_tls_policy( + self, + request: client_tls_policy.GetClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[client_tls_policy.GetClientTlsPolicyRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for get_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_client_tls_policy( + self, response: client_tls_policy.ClientTlsPolicy + ) -> client_tls_policy.ClientTlsPolicy: + """Post-rpc interceptor for get_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_server_tls_policy( + self, + request: server_tls_policy.GetServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[server_tls_policy.GetServerTlsPolicyRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for get_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_server_tls_policy( + self, response: server_tls_policy.ServerTlsPolicy + ) -> server_tls_policy.ServerTlsPolicy: + """Post-rpc interceptor for get_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_authorization_policies( + self, + request: authorization_policy.ListAuthorizationPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.ListAuthorizationPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_authorization_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_authorization_policies( + self, response: authorization_policy.ListAuthorizationPoliciesResponse + ) -> authorization_policy.ListAuthorizationPoliciesResponse: + """Post-rpc interceptor for list_authorization_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_client_tls_policies( + self, + request: client_tls_policy.ListClientTlsPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + client_tls_policy.ListClientTlsPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_client_tls_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_client_tls_policies( + self, response: client_tls_policy.ListClientTlsPoliciesResponse + ) -> client_tls_policy.ListClientTlsPoliciesResponse: + """Post-rpc interceptor for list_client_tls_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_server_tls_policies( + self, + request: server_tls_policy.ListServerTlsPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + server_tls_policy.ListServerTlsPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_server_tls_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_server_tls_policies( + self, response: server_tls_policy.ListServerTlsPoliciesResponse + ) -> server_tls_policy.ListServerTlsPoliciesResponse: + """Post-rpc interceptor for list_server_tls_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_authorization_policy( + self, + request: gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + Sequence[Tuple[str, str]], + ]: + """Pre-rpc interceptor for update_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_client_tls_policy( + self, + request: gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_client_tls_policy.UpdateClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for update_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_server_tls_policy( + self, + request: gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_server_tls_policy.UpdateServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for update_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + +@dataclasses.dataclass +class NetworkSecurityRestStub: + _session: AuthorizedSession + _host: str + _interceptor: NetworkSecurityRestInterceptor + + +class NetworkSecurityRestTransport(NetworkSecurityTransport): + """REST backend transport for NetworkSecurity. + + Network Security API provides resources to configure + authentication and authorization policies. Refer to per API + resource documentation for more information. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + + NOTE: This REST transport functionality is currently in a beta + state (preview). We welcome your feedback via an issue in this + library's source repository. Thank you! + """ + + def __init__( + self, + *, + host: str = "networksecurity.googleapis.com", + credentials: ga_credentials.Credentials = None, + credentials_file: str = None, + scopes: Sequence[str] = None, + client_cert_source_for_mtls: Callable[[], Tuple[bytes, bytes]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[NetworkSecurityRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + NOTE: This REST transport functionality is currently in a beta + state (preview). We welcome your feedback via a GitHub issue in + this library's repository. Thank you! + + Args: + host (Optional[str]): + The hostname to connect to. + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST + ) + self._operations_client: Optional[operations_v1.AbstractOperationsClient] = None + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or NetworkSecurityRestInterceptor() + self._prep_wrapped_messages(client_info) + + @property + def operations_client(self) -> operations_v1.AbstractOperationsClient: + """Create the client designed to process long-running operations. + + This property caches on the instance; repeated calls return the same + client. + """ + # Only create a new client if we do not already have one. + if self._operations_client is None: + http_options: Dict[str, List[Dict[str, str]]] = {} + + rest_transport = operations_v1.OperationsRestTransport( + host=self._host, + # use the credentials which are saved + credentials=self._credentials, + scopes=self._scopes, + http_options=http_options, + ) + + self._operations_client = operations_v1.AbstractOperationsClient( + transport=rest_transport + ) + + # Return the client from cache. + return self._operations_client + + class _CreateAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "authorizationPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_authorization_policy.CreateAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create authorization + policy method over HTTP. + + Args: + request (~.gcn_authorization_policy.CreateAuthorizationPolicyRequest): + The request object. Request used by the + CreateAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1/{parent=projects/*/locations/*}/authorizationPolicies", + "body": "authorization_policy", + }, + ] + request, metadata = self._interceptor.pre_create_authorization_policy( + request, metadata + ) + pb_request = gcn_authorization_policy.CreateAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_authorization_policy(resp) + return resp + + class _CreateClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "clientTlsPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_client_tls_policy.CreateClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create client tls policy method over HTTP. + + Args: + request (~.gcn_client_tls_policy.CreateClientTlsPolicyRequest): + The request object. Request used by the + CreateClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1/{parent=projects/*/locations/*}/clientTlsPolicies", + "body": "client_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_create_client_tls_policy( + request, metadata + ) + pb_request = gcn_client_tls_policy.CreateClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_client_tls_policy(resp) + return resp + + class _CreateServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "serverTlsPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_server_tls_policy.CreateServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create server tls policy method over HTTP. + + Args: + request (~.gcn_server_tls_policy.CreateServerTlsPolicyRequest): + The request object. Request used by the + CreateServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1/{parent=projects/*/locations/*}/serverTlsPolicies", + "body": "server_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_create_server_tls_policy( + request, metadata + ) + pb_request = gcn_server_tls_policy.CreateServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_server_tls_policy(resp) + return resp + + class _DeleteAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.DeleteAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete authorization + policy method over HTTP. + + Args: + request (~.authorization_policy.DeleteAuthorizationPolicyRequest): + The request object. Request used by the + DeleteAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1/{name=projects/*/locations/*/authorizationPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_authorization_policy( + request, metadata + ) + pb_request = authorization_policy.DeleteAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_authorization_policy(resp) + return resp + + class _DeleteClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.DeleteClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete client tls policy method over HTTP. + + Args: + request (~.client_tls_policy.DeleteClientTlsPolicyRequest): + The request object. Request used by the + DeleteClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1/{name=projects/*/locations/*/clientTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_client_tls_policy( + request, metadata + ) + pb_request = client_tls_policy.DeleteClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_client_tls_policy(resp) + return resp + + class _DeleteServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.DeleteServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete server tls policy method over HTTP. + + Args: + request (~.server_tls_policy.DeleteServerTlsPolicyRequest): + The request object. Request used by the + DeleteServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1/{name=projects/*/locations/*/serverTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_server_tls_policy( + request, metadata + ) + pb_request = server_tls_policy.DeleteServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_server_tls_policy(resp) + return resp + + class _GetAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.GetAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> authorization_policy.AuthorizationPolicy: + r"""Call the get authorization policy method over HTTP. + + Args: + request (~.authorization_policy.GetAuthorizationPolicyRequest): + The request object. Request used by the + GetAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.authorization_policy.AuthorizationPolicy: + AuthorizationPolicy is a resource + that specifies how a server should + authorize incoming connections. This + resource in itself does not change the + configuration unless it's attached to a + target https proxy or endpoint config + selector resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=projects/*/locations/*/authorizationPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_authorization_policy( + request, metadata + ) + pb_request = authorization_policy.GetAuthorizationPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = authorization_policy.AuthorizationPolicy() + pb_resp = authorization_policy.AuthorizationPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_authorization_policy(resp) + return resp + + class _GetClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.GetClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> client_tls_policy.ClientTlsPolicy: + r"""Call the get client tls policy method over HTTP. + + Args: + request (~.client_tls_policy.GetClientTlsPolicyRequest): + The request object. Request used by the + GetClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.client_tls_policy.ClientTlsPolicy: + ClientTlsPolicy is a resource that + specifies how a client should + authenticate connections to backends of + a service. This resource itself does not + affect configuration unless it is + attached to a backend service resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=projects/*/locations/*/clientTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_client_tls_policy( + request, metadata + ) + pb_request = client_tls_policy.GetClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = client_tls_policy.ClientTlsPolicy() + pb_resp = client_tls_policy.ClientTlsPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_client_tls_policy(resp) + return resp + + class _GetServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.GetServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> server_tls_policy.ServerTlsPolicy: + r"""Call the get server tls policy method over HTTP. + + Args: + request (~.server_tls_policy.GetServerTlsPolicyRequest): + The request object. Request used by the + GetServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.server_tls_policy.ServerTlsPolicy: + ServerTlsPolicy is a resource that + specifies how a server should + authenticate incoming requests. This + resource itself does not affect + configuration unless it is attached to a + target https proxy or endpoint config + selector resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=projects/*/locations/*/serverTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_server_tls_policy( + request, metadata + ) + pb_request = server_tls_policy.GetServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = server_tls_policy.ServerTlsPolicy() + pb_resp = server_tls_policy.ServerTlsPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_server_tls_policy(resp) + return resp + + class _ListAuthorizationPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListAuthorizationPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.ListAuthorizationPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> authorization_policy.ListAuthorizationPoliciesResponse: + r"""Call the list authorization + policies method over HTTP. + + Args: + request (~.authorization_policy.ListAuthorizationPoliciesRequest): + The request object. Request used with the + ListAuthorizationPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.authorization_policy.ListAuthorizationPoliciesResponse: + Response returned by the + ListAuthorizationPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{parent=projects/*/locations/*}/authorizationPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_authorization_policies( + request, metadata + ) + pb_request = authorization_policy.ListAuthorizationPoliciesRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = authorization_policy.ListAuthorizationPoliciesResponse() + pb_resp = authorization_policy.ListAuthorizationPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_authorization_policies(resp) + return resp + + class _ListClientTlsPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListClientTlsPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.ListClientTlsPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> client_tls_policy.ListClientTlsPoliciesResponse: + r"""Call the list client tls policies method over HTTP. + + Args: + request (~.client_tls_policy.ListClientTlsPoliciesRequest): + The request object. Request used by the + ListClientTlsPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.client_tls_policy.ListClientTlsPoliciesResponse: + Response returned by the + ListClientTlsPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{parent=projects/*/locations/*}/clientTlsPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_client_tls_policies( + request, metadata + ) + pb_request = client_tls_policy.ListClientTlsPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = client_tls_policy.ListClientTlsPoliciesResponse() + pb_resp = client_tls_policy.ListClientTlsPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_client_tls_policies(resp) + return resp + + class _ListServerTlsPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListServerTlsPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.ListServerTlsPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> server_tls_policy.ListServerTlsPoliciesResponse: + r"""Call the list server tls policies method over HTTP. + + Args: + request (~.server_tls_policy.ListServerTlsPoliciesRequest): + The request object. Request used by the + ListServerTlsPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.server_tls_policy.ListServerTlsPoliciesResponse: + Response returned by the + ListServerTlsPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{parent=projects/*/locations/*}/serverTlsPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_server_tls_policies( + request, metadata + ) + pb_request = server_tls_policy.ListServerTlsPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = server_tls_policy.ListServerTlsPoliciesResponse() + pb_resp = server_tls_policy.ListServerTlsPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_server_tls_policies(resp) + return resp + + class _UpdateAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update authorization + policy method over HTTP. + + Args: + request (~.gcn_authorization_policy.UpdateAuthorizationPolicyRequest): + The request object. Request used by the + UpdateAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1/{authorization_policy.name=projects/*/locations/*/authorizationPolicies/*}", + "body": "authorization_policy", + }, + ] + request, metadata = self._interceptor.pre_update_authorization_policy( + request, metadata + ) + pb_request = gcn_authorization_policy.UpdateAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_authorization_policy(resp) + return resp + + class _UpdateClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update client tls policy method over HTTP. + + Args: + request (~.gcn_client_tls_policy.UpdateClientTlsPolicyRequest): + The request object. Request used by UpdateClientTlsPolicy + method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1/{client_tls_policy.name=projects/*/locations/*/clientTlsPolicies/*}", + "body": "client_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_update_client_tls_policy( + request, metadata + ) + pb_request = gcn_client_tls_policy.UpdateClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_client_tls_policy(resp) + return resp + + class _UpdateServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update server tls policy method over HTTP. + + Args: + request (~.gcn_server_tls_policy.UpdateServerTlsPolicyRequest): + The request object. Request used by UpdateServerTlsPolicy + method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1/{server_tls_policy.name=projects/*/locations/*/serverTlsPolicies/*}", + "body": "server_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_update_server_tls_policy( + request, metadata + ) + pb_request = gcn_server_tls_policy.UpdateServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_server_tls_policy(resp) + return resp + + @property + def create_authorization_policy( + self, + ) -> Callable[ + [gcn_authorization_policy.CreateAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_client_tls_policy( + self, + ) -> Callable[ + [gcn_client_tls_policy.CreateClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_server_tls_policy( + self, + ) -> Callable[ + [gcn_server_tls_policy.CreateServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_authorization_policy( + self, + ) -> Callable[ + [authorization_policy.DeleteAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_client_tls_policy( + self, + ) -> Callable[ + [client_tls_policy.DeleteClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_server_tls_policy( + self, + ) -> Callable[ + [server_tls_policy.DeleteServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_authorization_policy( + self, + ) -> Callable[ + [authorization_policy.GetAuthorizationPolicyRequest], + authorization_policy.AuthorizationPolicy, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_client_tls_policy( + self, + ) -> Callable[ + [client_tls_policy.GetClientTlsPolicyRequest], client_tls_policy.ClientTlsPolicy + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_server_tls_policy( + self, + ) -> Callable[ + [server_tls_policy.GetServerTlsPolicyRequest], server_tls_policy.ServerTlsPolicy + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_authorization_policies( + self, + ) -> Callable[ + [authorization_policy.ListAuthorizationPoliciesRequest], + authorization_policy.ListAuthorizationPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListAuthorizationPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_client_tls_policies( + self, + ) -> Callable[ + [client_tls_policy.ListClientTlsPoliciesRequest], + client_tls_policy.ListClientTlsPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListClientTlsPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_server_tls_policies( + self, + ) -> Callable[ + [server_tls_policy.ListServerTlsPoliciesRequest], + server_tls_policy.ListServerTlsPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListServerTlsPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_authorization_policy( + self, + ) -> Callable[ + [gcn_authorization_policy.UpdateAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_client_tls_policy( + self, + ) -> Callable[ + [gcn_client_tls_policy.UpdateClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_server_tls_policy( + self, + ) -> Callable[ + [gcn_server_tls_policy.UpdateServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__ = ("NetworkSecurityRestTransport",) diff --git a/google/cloud/network_security_v1beta1/gapic_metadata.json b/google/cloud/network_security_v1beta1/gapic_metadata.json index 8bf9dac..9b081e3 100644 --- a/google/cloud/network_security_v1beta1/gapic_metadata.json +++ b/google/cloud/network_security_v1beta1/gapic_metadata.json @@ -166,6 +166,86 @@ ] } } + }, + "rest": { + "libraryClient": "NetworkSecurityClient", + "rpcs": { + "CreateAuthorizationPolicy": { + "methods": [ + "create_authorization_policy" + ] + }, + "CreateClientTlsPolicy": { + "methods": [ + "create_client_tls_policy" + ] + }, + "CreateServerTlsPolicy": { + "methods": [ + "create_server_tls_policy" + ] + }, + "DeleteAuthorizationPolicy": { + "methods": [ + "delete_authorization_policy" + ] + }, + "DeleteClientTlsPolicy": { + "methods": [ + "delete_client_tls_policy" + ] + }, + "DeleteServerTlsPolicy": { + "methods": [ + "delete_server_tls_policy" + ] + }, + "GetAuthorizationPolicy": { + "methods": [ + "get_authorization_policy" + ] + }, + "GetClientTlsPolicy": { + "methods": [ + "get_client_tls_policy" + ] + }, + "GetServerTlsPolicy": { + "methods": [ + "get_server_tls_policy" + ] + }, + "ListAuthorizationPolicies": { + "methods": [ + "list_authorization_policies" + ] + }, + "ListClientTlsPolicies": { + "methods": [ + "list_client_tls_policies" + ] + }, + "ListServerTlsPolicies": { + "methods": [ + "list_server_tls_policies" + ] + }, + "UpdateAuthorizationPolicy": { + "methods": [ + "update_authorization_policy" + ] + }, + "UpdateClientTlsPolicy": { + "methods": [ + "update_client_tls_policy" + ] + }, + "UpdateServerTlsPolicy": { + "methods": [ + "update_server_tls_policy" + ] + } + } } } } diff --git a/google/cloud/network_security_v1beta1/services/network_security/async_client.py b/google/cloud/network_security_v1beta1/services/network_security/async_client.py index 0cad640..cae78d1 100644 --- a/google/cloud/network_security_v1beta1/services/network_security/async_client.py +++ b/google/cloud/network_security_v1beta1/services/network_security/async_client.py @@ -257,6 +257,13 @@ async def list_authorization_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_list_authorization_policies(): @@ -366,6 +373,13 @@ async def get_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_get_authorization_policy(): @@ -472,6 +486,13 @@ async def create_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_create_authorization_policy(): @@ -618,6 +639,13 @@ async def update_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_update_authorization_policy(): @@ -752,6 +780,13 @@ async def delete_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_delete_authorization_policy(): @@ -871,6 +906,13 @@ async def list_server_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_list_server_tls_policies(): @@ -980,6 +1022,13 @@ async def get_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_get_server_tls_policy(): @@ -1084,6 +1133,13 @@ async def create_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_create_server_tls_policy(): @@ -1224,6 +1280,13 @@ async def update_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_update_server_tls_policy(): @@ -1355,6 +1418,13 @@ async def delete_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_delete_server_tls_policy(): @@ -1474,6 +1544,13 @@ async def list_client_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_list_client_tls_policies(): @@ -1583,6 +1660,13 @@ async def get_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_get_client_tls_policy(): @@ -1686,6 +1770,13 @@ async def create_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_create_client_tls_policy(): @@ -1825,6 +1916,13 @@ async def update_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_update_client_tls_policy(): @@ -1955,6 +2053,13 @@ async def delete_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 async def sample_delete_client_tls_policy(): diff --git a/google/cloud/network_security_v1beta1/services/network_security/client.py b/google/cloud/network_security_v1beta1/services/network_security/client.py index 8c0ef13..71b3083 100644 --- a/google/cloud/network_security_v1beta1/services/network_security/client.py +++ b/google/cloud/network_security_v1beta1/services/network_security/client.py @@ -63,6 +63,7 @@ from .transports.base import DEFAULT_CLIENT_INFO, NetworkSecurityTransport from .transports.grpc import NetworkSecurityGrpcTransport from .transports.grpc_asyncio import NetworkSecurityGrpcAsyncIOTransport +from .transports.rest import NetworkSecurityRestTransport class NetworkSecurityClientMeta(type): @@ -78,6 +79,7 @@ class NetworkSecurityClientMeta(type): ) # type: Dict[str, Type[NetworkSecurityTransport]] _transport_registry["grpc"] = NetworkSecurityGrpcTransport _transport_registry["grpc_asyncio"] = NetworkSecurityGrpcAsyncIOTransport + _transport_registry["rest"] = NetworkSecurityRestTransport def get_transport_class( cls, @@ -418,6 +420,9 @@ def __init__( transport (Union[str, NetworkSecurityTransport]): The transport to use. If set to None, a transport is chosen automatically. + NOTE: "rest" transport functionality is currently in a + beta state (preview). We welcome your feedback via an + issue in this library's source repository. client_options (google.api_core.client_options.ClientOptions): Custom options for the client. It won't take effect if a ``transport`` instance is provided. (1) The ``api_endpoint`` property can be used to override the @@ -514,6 +519,13 @@ def list_authorization_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_list_authorization_policies(): @@ -627,6 +639,13 @@ def get_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_get_authorization_policy(): @@ -733,6 +752,13 @@ def create_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_create_authorization_policy(): @@ -883,6 +909,13 @@ def update_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_update_authorization_policy(): @@ -1021,6 +1054,13 @@ def delete_authorization_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_delete_authorization_policy(): @@ -1144,6 +1184,13 @@ def list_server_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_list_server_tls_policies(): @@ -1253,6 +1300,13 @@ def get_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_get_server_tls_policy(): @@ -1357,6 +1411,13 @@ def create_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_create_server_tls_policy(): @@ -1497,6 +1558,13 @@ def update_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_update_server_tls_policy(): @@ -1628,6 +1696,13 @@ def delete_server_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_delete_server_tls_policy(): @@ -1747,6 +1822,13 @@ def list_client_tls_policies( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_list_client_tls_policies(): @@ -1856,6 +1938,13 @@ def get_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_get_client_tls_policy(): @@ -1959,6 +2048,13 @@ def create_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_create_client_tls_policy(): @@ -2098,6 +2194,13 @@ def update_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_update_client_tls_policy(): @@ -2228,6 +2331,13 @@ def delete_client_tls_policy( .. code-block:: python + # This snippet has been automatically generated and should be regarded as a + # code template only. + # It will require modifications to work: + # - It may require correct/in-range values for request initialization. + # - It may require specifying regional endpoints when creating the service + # client as shown in: + # https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 def sample_delete_client_tls_policy(): diff --git a/google/cloud/network_security_v1beta1/services/network_security/transports/__init__.py b/google/cloud/network_security_v1beta1/services/network_security/transports/__init__.py index e6f7341..4814e0c 100644 --- a/google/cloud/network_security_v1beta1/services/network_security/transports/__init__.py +++ b/google/cloud/network_security_v1beta1/services/network_security/transports/__init__.py @@ -19,14 +19,18 @@ from .base import NetworkSecurityTransport from .grpc import NetworkSecurityGrpcTransport from .grpc_asyncio import NetworkSecurityGrpcAsyncIOTransport +from .rest import NetworkSecurityRestInterceptor, NetworkSecurityRestTransport # Compile a registry of transports. _transport_registry = OrderedDict() # type: Dict[str, Type[NetworkSecurityTransport]] _transport_registry["grpc"] = NetworkSecurityGrpcTransport _transport_registry["grpc_asyncio"] = NetworkSecurityGrpcAsyncIOTransport +_transport_registry["rest"] = NetworkSecurityRestTransport __all__ = ( "NetworkSecurityTransport", "NetworkSecurityGrpcTransport", "NetworkSecurityGrpcAsyncIOTransport", + "NetworkSecurityRestTransport", + "NetworkSecurityRestInterceptor", ) diff --git a/google/cloud/network_security_v1beta1/services/network_security/transports/rest.py b/google/cloud/network_security_v1beta1/services/network_security/transports/rest.py new file mode 100644 index 0000000..9c3b7a4 --- /dev/null +++ b/google/cloud/network_security_v1beta1/services/network_security/transports/rest.py @@ -0,0 +1,3165 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +import dataclasses +import json # type: ignore +import re +from typing import Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + +from google.api_core import ( + gapic_v1, + operations_v1, + path_template, + rest_helpers, + rest_streaming, +) +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.cloud.location import locations_pb2 # type: ignore +from google.iam.v1 import iam_policy_pb2 # type: ignore +from google.iam.v1 import policy_pb2 # type: ignore +from google.longrunning import operations_pb2 +from google.protobuf import json_format +import grpc # type: ignore +from requests import __version__ as requests_version + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore + + +from google.longrunning import operations_pb2 # type: ignore + +from google.cloud.network_security_v1beta1.types import ( + authorization_policy as gcn_authorization_policy, +) +from google.cloud.network_security_v1beta1.types import ( + client_tls_policy as gcn_client_tls_policy, +) +from google.cloud.network_security_v1beta1.types import ( + server_tls_policy as gcn_server_tls_policy, +) +from google.cloud.network_security_v1beta1.types import authorization_policy +from google.cloud.network_security_v1beta1.types import client_tls_policy +from google.cloud.network_security_v1beta1.types import server_tls_policy + +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO +from .base import NetworkSecurityTransport + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=requests_version, +) + + +class NetworkSecurityRestInterceptor: + """Interceptor for NetworkSecurity. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the NetworkSecurityRestTransport. + + .. code-block:: python + class MyCustomNetworkSecurityInterceptor(NetworkSecurityRestInterceptor): + def pre_create_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_create_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_create_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_delete_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_delete_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_get_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_server_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_list_authorization_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_authorization_policies(response): + logging.log(f"Received response: {response}") + + def pre_list_client_tls_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_client_tls_policies(response): + logging.log(f"Received response: {response}") + + def pre_list_server_tls_policies(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_server_tls_policies(response): + logging.log(f"Received response: {response}") + + def pre_update_authorization_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_authorization_policy(response): + logging.log(f"Received response: {response}") + + def pre_update_client_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_client_tls_policy(response): + logging.log(f"Received response: {response}") + + def pre_update_server_tls_policy(request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_server_tls_policy(response): + logging.log(f"Received response: {response}") + + transport = NetworkSecurityRestTransport(interceptor=MyCustomNetworkSecurityInterceptor()) + client = NetworkSecurityClient(transport=transport) + + + """ + + def pre_create_authorization_policy( + self, + request: gcn_authorization_policy.CreateAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_authorization_policy.CreateAuthorizationPolicyRequest, + Sequence[Tuple[str, str]], + ]: + """Pre-rpc interceptor for create_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_create_client_tls_policy( + self, + request: gcn_client_tls_policy.CreateClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_client_tls_policy.CreateClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for create_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_create_server_tls_policy( + self, + request: gcn_server_tls_policy.CreateServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_server_tls_policy.CreateServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for create_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_create_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_authorization_policy( + self, + request: authorization_policy.DeleteAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.DeleteAuthorizationPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_client_tls_policy( + self, + request: client_tls_policy.DeleteClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + client_tls_policy.DeleteClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_server_tls_policy( + self, + request: server_tls_policy.DeleteServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + server_tls_policy.DeleteServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for delete_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for delete_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_authorization_policy( + self, + request: authorization_policy.GetAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.GetAuthorizationPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for get_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_authorization_policy( + self, response: authorization_policy.AuthorizationPolicy + ) -> authorization_policy.AuthorizationPolicy: + """Post-rpc interceptor for get_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_client_tls_policy( + self, + request: client_tls_policy.GetClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[client_tls_policy.GetClientTlsPolicyRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for get_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_client_tls_policy( + self, response: client_tls_policy.ClientTlsPolicy + ) -> client_tls_policy.ClientTlsPolicy: + """Post-rpc interceptor for get_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_server_tls_policy( + self, + request: server_tls_policy.GetServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[server_tls_policy.GetServerTlsPolicyRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for get_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_server_tls_policy( + self, response: server_tls_policy.ServerTlsPolicy + ) -> server_tls_policy.ServerTlsPolicy: + """Post-rpc interceptor for get_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_authorization_policies( + self, + request: authorization_policy.ListAuthorizationPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + authorization_policy.ListAuthorizationPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_authorization_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_authorization_policies( + self, response: authorization_policy.ListAuthorizationPoliciesResponse + ) -> authorization_policy.ListAuthorizationPoliciesResponse: + """Post-rpc interceptor for list_authorization_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_client_tls_policies( + self, + request: client_tls_policy.ListClientTlsPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + client_tls_policy.ListClientTlsPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_client_tls_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_client_tls_policies( + self, response: client_tls_policy.ListClientTlsPoliciesResponse + ) -> client_tls_policy.ListClientTlsPoliciesResponse: + """Post-rpc interceptor for list_client_tls_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_server_tls_policies( + self, + request: server_tls_policy.ListServerTlsPoliciesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + server_tls_policy.ListServerTlsPoliciesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for list_server_tls_policies + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_server_tls_policies( + self, response: server_tls_policy.ListServerTlsPoliciesResponse + ) -> server_tls_policy.ListServerTlsPoliciesResponse: + """Post-rpc interceptor for list_server_tls_policies + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_authorization_policy( + self, + request: gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + Sequence[Tuple[str, str]], + ]: + """Pre-rpc interceptor for update_authorization_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_authorization_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_authorization_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_client_tls_policy( + self, + request: gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_client_tls_policy.UpdateClientTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for update_client_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_client_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_client_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_update_server_tls_policy( + self, + request: gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + gcn_server_tls_policy.UpdateServerTlsPolicyRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for update_server_tls_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_update_server_tls_policy( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for update_server_tls_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_location( + self, + request: locations_pb2.GetLocationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> locations_pb2.Location: + """Pre-rpc interceptor for get_location + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_location( + self, response: locations_pb2.GetLocationRequest + ) -> locations_pb2.Location: + """Post-rpc interceptor for get_location + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_locations( + self, + request: locations_pb2.ListLocationsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> locations_pb2.ListLocationsResponse: + """Pre-rpc interceptor for list_locations + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_locations( + self, response: locations_pb2.ListLocationsRequest + ) -> locations_pb2.ListLocationsResponse: + """Post-rpc interceptor for list_locations + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_iam_policy( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> policy_pb2.Policy: + """Pre-rpc interceptor for get_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_iam_policy( + self, response: iam_policy_pb2.GetIamPolicyRequest + ) -> policy_pb2.Policy: + """Post-rpc interceptor for get_iam_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_set_iam_policy( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + metadata: Sequence[Tuple[str, str]], + ) -> policy_pb2.Policy: + """Pre-rpc interceptor for set_iam_policy + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_set_iam_policy( + self, response: iam_policy_pb2.SetIamPolicyRequest + ) -> policy_pb2.Policy: + """Post-rpc interceptor for set_iam_policy + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_test_iam_permissions( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> iam_policy_pb2.TestIamPermissionsResponse: + """Pre-rpc interceptor for test_iam_permissions + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_test_iam_permissions( + self, response: iam_policy_pb2.TestIamPermissionsRequest + ) -> iam_policy_pb2.TestIamPermissionsResponse: + """Post-rpc interceptor for test_iam_permissions + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_cancel_operation( + self, + request: operations_pb2.CancelOperationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> None: + """Pre-rpc interceptor for cancel_operation + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_cancel_operation( + self, response: operations_pb2.CancelOperationRequest + ) -> None: + """Post-rpc interceptor for cancel_operation + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_delete_operation( + self, + request: operations_pb2.DeleteOperationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> None: + """Pre-rpc interceptor for delete_operation + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_delete_operation( + self, response: operations_pb2.DeleteOperationRequest + ) -> None: + """Post-rpc interceptor for delete_operation + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_get_operation( + self, + request: operations_pb2.GetOperationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.Operation: + """Pre-rpc interceptor for get_operation + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_get_operation( + self, response: operations_pb2.GetOperationRequest + ) -> operations_pb2.Operation: + """Post-rpc interceptor for get_operation + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + def pre_list_operations( + self, + request: operations_pb2.ListOperationsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.ListOperationsResponse: + """Pre-rpc interceptor for list_operations + + Override in a subclass to manipulate the request or metadata + before they are sent to the NetworkSecurity server. + """ + return request, metadata + + def post_list_operations( + self, response: operations_pb2.ListOperationsRequest + ) -> operations_pb2.ListOperationsResponse: + """Post-rpc interceptor for list_operations + + Override in a subclass to manipulate the response + after it is returned by the NetworkSecurity server but before + it is returned to user code. + """ + return response + + +@dataclasses.dataclass +class NetworkSecurityRestStub: + _session: AuthorizedSession + _host: str + _interceptor: NetworkSecurityRestInterceptor + + +class NetworkSecurityRestTransport(NetworkSecurityTransport): + """REST backend transport for NetworkSecurity. + + Network Security API provides resources to configure + authentication and authorization policies. Refer to per API + resource documentation for more information. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + + NOTE: This REST transport functionality is currently in a beta + state (preview). We welcome your feedback via an issue in this + library's source repository. Thank you! + """ + + def __init__( + self, + *, + host: str = "networksecurity.googleapis.com", + credentials: ga_credentials.Credentials = None, + credentials_file: str = None, + scopes: Sequence[str] = None, + client_cert_source_for_mtls: Callable[[], Tuple[bytes, bytes]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[NetworkSecurityRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + NOTE: This REST transport functionality is currently in a beta + state (preview). We welcome your feedback via a GitHub issue in + this library's repository. Thank you! + + Args: + host (Optional[str]): + The hostname to connect to. + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST + ) + self._operations_client: Optional[operations_v1.AbstractOperationsClient] = None + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or NetworkSecurityRestInterceptor() + self._prep_wrapped_messages(client_info) + + @property + def operations_client(self) -> operations_v1.AbstractOperationsClient: + """Create the client designed to process long-running operations. + + This property caches on the instance; repeated calls return the same + client. + """ + # Only create a new client if we do not already have one. + if self._operations_client is None: + http_options: Dict[str, List[Dict[str, str]]] = { + "google.longrunning.Operations.CancelOperation": [ + { + "method": "post", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}:cancel", + "body": "*", + }, + ], + "google.longrunning.Operations.DeleteOperation": [ + { + "method": "delete", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}", + }, + ], + "google.longrunning.Operations.GetOperation": [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}", + }, + ], + "google.longrunning.Operations.ListOperations": [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*}/operations", + }, + ], + } + + rest_transport = operations_v1.OperationsRestTransport( + host=self._host, + # use the credentials which are saved + credentials=self._credentials, + scopes=self._scopes, + http_options=http_options, + ) + + self._operations_client = operations_v1.AbstractOperationsClient( + transport=rest_transport + ) + + # Return the client from cache. + return self._operations_client + + class _CreateAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "authorizationPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_authorization_policy.CreateAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create authorization + policy method over HTTP. + + Args: + request (~.gcn_authorization_policy.CreateAuthorizationPolicyRequest): + The request object. Request used by the + CreateAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{parent=projects/*/locations/*}/authorizationPolicies", + "body": "authorization_policy", + }, + ] + request, metadata = self._interceptor.pre_create_authorization_policy( + request, metadata + ) + pb_request = gcn_authorization_policy.CreateAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_authorization_policy(resp) + return resp + + class _CreateClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "clientTlsPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_client_tls_policy.CreateClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create client tls policy method over HTTP. + + Args: + request (~.gcn_client_tls_policy.CreateClientTlsPolicyRequest): + The request object. Request used by the + CreateClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{parent=projects/*/locations/*}/clientTlsPolicies", + "body": "client_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_create_client_tls_policy( + request, metadata + ) + pb_request = gcn_client_tls_policy.CreateClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_client_tls_policy(resp) + return resp + + class _CreateServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("CreateServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "serverTlsPolicyId": "", + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_server_tls_policy.CreateServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create server tls policy method over HTTP. + + Args: + request (~.gcn_server_tls_policy.CreateServerTlsPolicyRequest): + The request object. Request used by the + CreateServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{parent=projects/*/locations/*}/serverTlsPolicies", + "body": "server_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_create_server_tls_policy( + request, metadata + ) + pb_request = gcn_server_tls_policy.CreateServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_server_tls_policy(resp) + return resp + + class _DeleteAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.DeleteAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete authorization + policy method over HTTP. + + Args: + request (~.authorization_policy.DeleteAuthorizationPolicyRequest): + The request object. Request used by the + DeleteAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1beta1/{name=projects/*/locations/*/authorizationPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_authorization_policy( + request, metadata + ) + pb_request = authorization_policy.DeleteAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_authorization_policy(resp) + return resp + + class _DeleteClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.DeleteClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete client tls policy method over HTTP. + + Args: + request (~.client_tls_policy.DeleteClientTlsPolicyRequest): + The request object. Request used by the + DeleteClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1beta1/{name=projects/*/locations/*/clientTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_client_tls_policy( + request, metadata + ) + pb_request = client_tls_policy.DeleteClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_client_tls_policy(resp) + return resp + + class _DeleteServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("DeleteServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.DeleteServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the delete server tls policy method over HTTP. + + Args: + request (~.server_tls_policy.DeleteServerTlsPolicyRequest): + The request object. Request used by the + DeleteServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1beta1/{name=projects/*/locations/*/serverTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_server_tls_policy( + request, metadata + ) + pb_request = server_tls_policy.DeleteServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_delete_server_tls_policy(resp) + return resp + + class _GetAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.GetAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> authorization_policy.AuthorizationPolicy: + r"""Call the get authorization policy method over HTTP. + + Args: + request (~.authorization_policy.GetAuthorizationPolicyRequest): + The request object. Request used by the + GetAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.authorization_policy.AuthorizationPolicy: + AuthorizationPolicy is a resource + that specifies how a server should + authorize incoming connections. This + resource in itself does not change the + configuration unless it's attached to a + target https proxy or endpoint config + selector resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*/authorizationPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_authorization_policy( + request, metadata + ) + pb_request = authorization_policy.GetAuthorizationPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = authorization_policy.AuthorizationPolicy() + pb_resp = authorization_policy.AuthorizationPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_authorization_policy(resp) + return resp + + class _GetClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.GetClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> client_tls_policy.ClientTlsPolicy: + r"""Call the get client tls policy method over HTTP. + + Args: + request (~.client_tls_policy.GetClientTlsPolicyRequest): + The request object. Request used by the + GetClientTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.client_tls_policy.ClientTlsPolicy: + ClientTlsPolicy is a resource that + specifies how a client should + authenticate connections to backends of + a service. This resource itself does not + affect configuration unless it is + attached to a backend service resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*/clientTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_client_tls_policy( + request, metadata + ) + pb_request = client_tls_policy.GetClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = client_tls_policy.ClientTlsPolicy() + pb_resp = client_tls_policy.ClientTlsPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_client_tls_policy(resp) + return resp + + class _GetServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("GetServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.GetServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> server_tls_policy.ServerTlsPolicy: + r"""Call the get server tls policy method over HTTP. + + Args: + request (~.server_tls_policy.GetServerTlsPolicyRequest): + The request object. Request used by the + GetServerTlsPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.server_tls_policy.ServerTlsPolicy: + ServerTlsPolicy is a resource that + specifies how a server should + authenticate incoming requests. This + resource itself does not affect + configuration unless it is attached to a + target https proxy or endpoint config + selector resource. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*/serverTlsPolicies/*}", + }, + ] + request, metadata = self._interceptor.pre_get_server_tls_policy( + request, metadata + ) + pb_request = server_tls_policy.GetServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = server_tls_policy.ServerTlsPolicy() + pb_resp = server_tls_policy.ServerTlsPolicy.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_server_tls_policy(resp) + return resp + + class _ListAuthorizationPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListAuthorizationPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: authorization_policy.ListAuthorizationPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> authorization_policy.ListAuthorizationPoliciesResponse: + r"""Call the list authorization + policies method over HTTP. + + Args: + request (~.authorization_policy.ListAuthorizationPoliciesRequest): + The request object. Request used with the + ListAuthorizationPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.authorization_policy.ListAuthorizationPoliciesResponse: + Response returned by the + ListAuthorizationPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{parent=projects/*/locations/*}/authorizationPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_authorization_policies( + request, metadata + ) + pb_request = authorization_policy.ListAuthorizationPoliciesRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = authorization_policy.ListAuthorizationPoliciesResponse() + pb_resp = authorization_policy.ListAuthorizationPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_authorization_policies(resp) + return resp + + class _ListClientTlsPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListClientTlsPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: client_tls_policy.ListClientTlsPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> client_tls_policy.ListClientTlsPoliciesResponse: + r"""Call the list client tls policies method over HTTP. + + Args: + request (~.client_tls_policy.ListClientTlsPoliciesRequest): + The request object. Request used by the + ListClientTlsPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.client_tls_policy.ListClientTlsPoliciesResponse: + Response returned by the + ListClientTlsPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{parent=projects/*/locations/*}/clientTlsPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_client_tls_policies( + request, metadata + ) + pb_request = client_tls_policy.ListClientTlsPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = client_tls_policy.ListClientTlsPoliciesResponse() + pb_resp = client_tls_policy.ListClientTlsPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_client_tls_policies(resp) + return resp + + class _ListServerTlsPolicies(NetworkSecurityRestStub): + def __hash__(self): + return hash("ListServerTlsPolicies") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: server_tls_policy.ListServerTlsPoliciesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> server_tls_policy.ListServerTlsPoliciesResponse: + r"""Call the list server tls policies method over HTTP. + + Args: + request (~.server_tls_policy.ListServerTlsPoliciesRequest): + The request object. Request used by the + ListServerTlsPolicies method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.server_tls_policy.ListServerTlsPoliciesResponse: + Response returned by the + ListServerTlsPolicies method. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{parent=projects/*/locations/*}/serverTlsPolicies", + }, + ] + request, metadata = self._interceptor.pre_list_server_tls_policies( + request, metadata + ) + pb_request = server_tls_policy.ListServerTlsPoliciesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = server_tls_policy.ListServerTlsPoliciesResponse() + pb_resp = server_tls_policy.ListServerTlsPoliciesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_server_tls_policies(resp) + return resp + + class _UpdateAuthorizationPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateAuthorizationPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update authorization + policy method over HTTP. + + Args: + request (~.gcn_authorization_policy.UpdateAuthorizationPolicyRequest): + The request object. Request used by the + UpdateAuthorizationPolicy method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1beta1/{authorization_policy.name=projects/*/locations/*/authorizationPolicies/*}", + "body": "authorization_policy", + }, + ] + request, metadata = self._interceptor.pre_update_authorization_policy( + request, metadata + ) + pb_request = gcn_authorization_policy.UpdateAuthorizationPolicyRequest.pb( + request + ) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_authorization_policy(resp) + return resp + + class _UpdateClientTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateClientTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update client tls policy method over HTTP. + + Args: + request (~.gcn_client_tls_policy.UpdateClientTlsPolicyRequest): + The request object. Request used by UpdateClientTlsPolicy + method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1beta1/{client_tls_policy.name=projects/*/locations/*/clientTlsPolicies/*}", + "body": "client_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_update_client_tls_policy( + request, metadata + ) + pb_request = gcn_client_tls_policy.UpdateClientTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_client_tls_policy(resp) + return resp + + class _UpdateServerTlsPolicy(NetworkSecurityRestStub): + def __hash__(self): + return hash("UpdateServerTlsPolicy") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the update server tls policy method over HTTP. + + Args: + request (~.gcn_server_tls_policy.UpdateServerTlsPolicyRequest): + The request object. Request used by UpdateServerTlsPolicy + method. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1beta1/{server_tls_policy.name=projects/*/locations/*/serverTlsPolicies/*}", + "body": "server_tls_policy", + }, + ] + request, metadata = self._interceptor.pre_update_server_tls_policy( + request, metadata + ) + pb_request = gcn_server_tls_policy.UpdateServerTlsPolicyRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_server_tls_policy(resp) + return resp + + @property + def create_authorization_policy( + self, + ) -> Callable[ + [gcn_authorization_policy.CreateAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_client_tls_policy( + self, + ) -> Callable[ + [gcn_client_tls_policy.CreateClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_server_tls_policy( + self, + ) -> Callable[ + [gcn_server_tls_policy.CreateServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_authorization_policy( + self, + ) -> Callable[ + [authorization_policy.DeleteAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_client_tls_policy( + self, + ) -> Callable[ + [client_tls_policy.DeleteClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_server_tls_policy( + self, + ) -> Callable[ + [server_tls_policy.DeleteServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_authorization_policy( + self, + ) -> Callable[ + [authorization_policy.GetAuthorizationPolicyRequest], + authorization_policy.AuthorizationPolicy, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_client_tls_policy( + self, + ) -> Callable[ + [client_tls_policy.GetClientTlsPolicyRequest], client_tls_policy.ClientTlsPolicy + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_server_tls_policy( + self, + ) -> Callable[ + [server_tls_policy.GetServerTlsPolicyRequest], server_tls_policy.ServerTlsPolicy + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_authorization_policies( + self, + ) -> Callable[ + [authorization_policy.ListAuthorizationPoliciesRequest], + authorization_policy.ListAuthorizationPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListAuthorizationPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_client_tls_policies( + self, + ) -> Callable[ + [client_tls_policy.ListClientTlsPoliciesRequest], + client_tls_policy.ListClientTlsPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListClientTlsPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_server_tls_policies( + self, + ) -> Callable[ + [server_tls_policy.ListServerTlsPoliciesRequest], + server_tls_policy.ListServerTlsPoliciesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListServerTlsPolicies(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_authorization_policy( + self, + ) -> Callable[ + [gcn_authorization_policy.UpdateAuthorizationPolicyRequest], + operations_pb2.Operation, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateAuthorizationPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_client_tls_policy( + self, + ) -> Callable[ + [gcn_client_tls_policy.UpdateClientTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateClientTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_server_tls_policy( + self, + ) -> Callable[ + [gcn_server_tls_policy.UpdateServerTlsPolicyRequest], operations_pb2.Operation + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateServerTlsPolicy(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_location(self): + return self._GetLocation(self._session, self._host, self._interceptor) # type: ignore + + class _GetLocation(NetworkSecurityRestStub): + def __call__( + self, + request: locations_pb2.GetLocationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> locations_pb2.Location: + + r"""Call the get location method over HTTP. + + Args: + request (locations_pb2.GetLocationRequest): + The request object for GetLocation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + locations_pb2.Location: Response from GetLocation method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*}", + }, + ] + + request, metadata = self._interceptor.pre_get_location(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = locations_pb2.Location() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_get_location(resp) + return resp + + @property + def list_locations(self): + return self._ListLocations(self._session, self._host, self._interceptor) # type: ignore + + class _ListLocations(NetworkSecurityRestStub): + def __call__( + self, + request: locations_pb2.ListLocationsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> locations_pb2.ListLocationsResponse: + + r"""Call the list locations method over HTTP. + + Args: + request (locations_pb2.ListLocationsRequest): + The request object for ListLocations method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + locations_pb2.ListLocationsResponse: Response from ListLocations method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*}/locations", + }, + ] + + request, metadata = self._interceptor.pre_list_locations(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = locations_pb2.ListLocationsResponse() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_list_locations(resp) + return resp + + @property + def get_iam_policy(self): + return self._GetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + class _GetIamPolicy(NetworkSecurityRestStub): + def __call__( + self, + request: iam_policy_pb2.GetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> policy_pb2.Policy: + + r"""Call the get iam policy method over HTTP. + + Args: + request (iam_policy_pb2.GetIamPolicyRequest): + The request object for GetIamPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + policy_pb2.Policy: Response from GetIamPolicy method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{resource=projects/*/locations/*/authorizationPolicies/*}:getIamPolicy", + }, + { + "method": "get", + "uri": "/v1beta1/{resource=projects/*/locations/*/serverTlsPolicies/*}:getIamPolicy", + }, + { + "method": "get", + "uri": "/v1beta1/{resource=projects/*/locations/*/clientTlsPolicies/*}:getIamPolicy", + }, + ] + + request, metadata = self._interceptor.pre_get_iam_policy(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = policy_pb2.Policy() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_get_iam_policy(resp) + return resp + + @property + def set_iam_policy(self): + return self._SetIamPolicy(self._session, self._host, self._interceptor) # type: ignore + + class _SetIamPolicy(NetworkSecurityRestStub): + def __call__( + self, + request: iam_policy_pb2.SetIamPolicyRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> policy_pb2.Policy: + + r"""Call the set iam policy method over HTTP. + + Args: + request (iam_policy_pb2.SetIamPolicyRequest): + The request object for SetIamPolicy method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + policy_pb2.Policy: Response from SetIamPolicy method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/authorizationPolicies/*}:setIamPolicy", + "body": "*", + }, + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/serverTlsPolicies/*}:setIamPolicy", + "body": "*", + }, + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/clientTlsPolicies/*}:setIamPolicy", + "body": "*", + }, + ] + + request, metadata = self._interceptor.pre_set_iam_policy(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + body = json.loads(json.dumps(transcoded_request["body"])) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = policy_pb2.Policy() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_set_iam_policy(resp) + return resp + + @property + def test_iam_permissions(self): + return self._TestIamPermissions(self._session, self._host, self._interceptor) # type: ignore + + class _TestIamPermissions(NetworkSecurityRestStub): + def __call__( + self, + request: iam_policy_pb2.TestIamPermissionsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> iam_policy_pb2.TestIamPermissionsResponse: + + r"""Call the test iam permissions method over HTTP. + + Args: + request (iam_policy_pb2.TestIamPermissionsRequest): + The request object for TestIamPermissions method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + iam_policy_pb2.TestIamPermissionsResponse: Response from TestIamPermissions method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/authorizationPolicies/*}:testIamPermissions", + "body": "*", + }, + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/serverTlsPolicies/*}:testIamPermissions", + "body": "*", + }, + { + "method": "post", + "uri": "/v1beta1/{resource=projects/*/locations/*/clientTlsPolicies/*}:testIamPermissions", + "body": "*", + }, + ] + + request, metadata = self._interceptor.pre_test_iam_permissions( + request, metadata + ) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + body = json.loads(json.dumps(transcoded_request["body"])) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = iam_policy_pb2.TestIamPermissionsResponse() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_test_iam_permissions(resp) + return resp + + @property + def cancel_operation(self): + return self._CancelOperation(self._session, self._host, self._interceptor) # type: ignore + + class _CancelOperation(NetworkSecurityRestStub): + def __call__( + self, + request: operations_pb2.CancelOperationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> None: + + r"""Call the cancel operation method over HTTP. + + Args: + request (operations_pb2.CancelOperationRequest): + The request object for CancelOperation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}:cancel", + "body": "*", + }, + ] + + request, metadata = self._interceptor.pre_cancel_operation( + request, metadata + ) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + body = json.loads(json.dumps(transcoded_request["body"])) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + return self._interceptor.post_cancel_operation(None) + + @property + def delete_operation(self): + return self._DeleteOperation(self._session, self._host, self._interceptor) # type: ignore + + class _DeleteOperation(NetworkSecurityRestStub): + def __call__( + self, + request: operations_pb2.DeleteOperationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> None: + + r"""Call the delete operation method over HTTP. + + Args: + request (operations_pb2.DeleteOperationRequest): + The request object for DeleteOperation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}", + }, + ] + + request, metadata = self._interceptor.pre_delete_operation( + request, metadata + ) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + return self._interceptor.post_delete_operation(None) + + @property + def get_operation(self): + return self._GetOperation(self._session, self._host, self._interceptor) # type: ignore + + class _GetOperation(NetworkSecurityRestStub): + def __call__( + self, + request: operations_pb2.GetOperationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + + r"""Call the get operation method over HTTP. + + Args: + request (operations_pb2.GetOperationRequest): + The request object for GetOperation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.Operation: Response from GetOperation method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*/operations/*}", + }, + ] + + request, metadata = self._interceptor.pre_get_operation(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.Operation() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_get_operation(resp) + return resp + + @property + def list_operations(self): + return self._ListOperations(self._session, self._host, self._interceptor) # type: ignore + + class _ListOperations(NetworkSecurityRestStub): + def __call__( + self, + request: operations_pb2.ListOperationsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: float = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.ListOperationsResponse: + + r"""Call the list operations method over HTTP. + + Args: + request (operations_pb2.ListOperationsRequest): + The request object for ListOperations method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.ListOperationsResponse: Response from ListOperations method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=projects/*/locations/*}/operations", + }, + ] + + request, metadata = self._interceptor.pre_list_operations(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.ListOperationsResponse() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_list_operations(resp) + return resp + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__ = ("NetworkSecurityRestTransport",) diff --git a/mypy.ini b/mypy.ini index 4505b48..574c5ae 100644 --- a/mypy.ini +++ b/mypy.ini @@ -1,3 +1,3 @@ [mypy] -python_version = 3.6 +python_version = 3.7 namespace_packages = True diff --git a/noxfile.py b/noxfile.py index cc39f3b..ffe9f35 100644 --- a/noxfile.py +++ b/noxfile.py @@ -189,7 +189,9 @@ def unit(session): def install_systemtest_dependencies(session, *constraints): # Use pre-release gRPC for system tests. - session.install("--pre", "grpcio") + # Exclude version 1.49.0rc1 which has a known issue. + # See https://github.com/grpc/grpc/pull/30642 + session.install("--pre", "grpcio!=1.49.0rc1") session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) @@ -369,7 +371,8 @@ def prerelease_deps(session): # dependency of grpc "six", "googleapis-common-protos", - "grpcio", + # Exclude version 1.49.0rc1 which has a known issue. See https://github.com/grpc/grpc/pull/30642 + "grpcio!=1.49.0rc1", "grpcio-status", "google-api-core", "proto-plus", diff --git a/renovate.json b/renovate.json index c21036d..39b2a0e 100644 --- a/renovate.json +++ b/renovate.json @@ -5,7 +5,7 @@ ":preserveSemverRanges", ":disableDependencyDashboard" ], - "ignorePaths": [".pre-commit-config.yaml"], + "ignorePaths": [".pre-commit-config.yaml", ".kokoro/requirements.txt", "setup.py"], "pip_requirements": { "fileMatch": ["requirements-test.txt", "samples/[\\S/]*constraints.txt", "samples/[\\S/]*constraints-test.txt"] } diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_async.py index 672cb47..9ba74e2 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_50c6f504.py similarity index 80% rename from samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_50c6f504.py index c57d95e..5343871 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_50c6f504.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_50c6f504] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -52,4 +59,4 @@ def sample_create_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_50c6f504] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_92eec257.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_92eec257.py new file mode 100644 index 0000000..93b9b4b --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_authorization_policy_sync_92eec257.py @@ -0,0 +1,62 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_92eec257] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_create_authorization_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + authorization_policy = network_security_v1.AuthorizationPolicy() + authorization_policy.name = "name_value" + authorization_policy.action = "DENY" + + request = network_security_v1.CreateAuthorizationPolicyRequest( + parent="parent_value", + authorization_policy_id="authorization_policy_id_value", + authorization_policy=authorization_policy, + ) + + # Make the request + operation = client.create_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_92eec257] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_async.py index 94cac01..1e233aa 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_55e9e16f.py similarity index 80% rename from samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_55e9e16f.py index 9447825..be32d05 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_55e9e16f.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_55e9e16f] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -51,4 +58,4 @@ def sample_create_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_55e9e16f] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_d41c0b2f.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_d41c0b2f.py new file mode 100644 index 0000000..7df5ba2 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_client_tls_policy_sync_d41c0b2f.py @@ -0,0 +1,61 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_d41c0b2f] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_create_client_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + client_tls_policy = network_security_v1.ClientTlsPolicy() + client_tls_policy.name = "name_value" + + request = network_security_v1.CreateClientTlsPolicyRequest( + parent="parent_value", + client_tls_policy_id="client_tls_policy_id_value", + client_tls_policy=client_tls_policy, + ) + + # Make the request + operation = client.create_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_d41c0b2f] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_async.py index d8db6df..bcff69a 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_5f6bfcb1.py similarity index 80% rename from samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_5f6bfcb1.py index 2c0b73c..0524fdd 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_5f6bfcb1.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_5f6bfcb1] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -51,4 +58,4 @@ def sample_create_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_5f6bfcb1] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_9455b0b7.py b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_9455b0b7.py new file mode 100644 index 0000000..cd633c4 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_create_server_tls_policy_sync_9455b0b7.py @@ -0,0 +1,61 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_9455b0b7] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_create_server_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + server_tls_policy = network_security_v1.ServerTlsPolicy() + server_tls_policy.name = "name_value" + + request = network_security_v1.CreateServerTlsPolicyRequest( + parent="parent_value", + server_tls_policy_id="server_tls_policy_id_value", + server_tls_policy=server_tls_policy, + ) + + # Make the request + operation = client.create_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_9455b0b7] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_async.py index ffcff04..8773d6f 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_ae73c9c7.py similarity index 78% rename from samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_ae73c9c7.py index df77969..477a826 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_ae73c9c7.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_ae73c9c7] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -46,4 +53,4 @@ def sample_delete_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_ae73c9c7] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_b3435b7b.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_b3435b7b.py new file mode 100644 index 0000000..825b88c --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_authorization_policy_sync_b3435b7b.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_b3435b7b] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_delete_authorization_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.DeleteAuthorizationPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_b3435b7b] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py index 67db41a..2ce2878 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_3b1913a0.py similarity index 78% rename from samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_3b1913a0.py index ab77f65..e50b744 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_3b1913a0.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_3b1913a0] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -46,4 +53,4 @@ def sample_delete_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_3b1913a0] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_edd5ff26.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_edd5ff26.py new file mode 100644 index 0000000..f0e5e7a --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_edd5ff26.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_edd5ff26] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_delete_client_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.DeleteClientTlsPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_edd5ff26] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py index 2a687a2..009b9b1 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_38190956.py similarity index 78% rename from samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_38190956.py index 3c114ee..ea4bf7f 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_38190956.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_38190956] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -46,4 +53,4 @@ def sample_delete_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_38190956] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_ad303fbb.py b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_ad303fbb.py new file mode 100644 index 0000000..4c8a869 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_ad303fbb.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_ad303fbb] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_delete_server_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.DeleteServerTlsPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_ad303fbb] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_async.py index a630169..1f0f9b7 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_1a5f98be.py similarity index 77% rename from samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_1a5f98be.py index 3f1a734..1ce1e9c 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_1a5f98be.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_1a5f98be] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -42,4 +49,4 @@ def sample_get_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_1a5f98be] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_cfc76a54.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_cfc76a54.py new file mode 100644 index 0000000..df5c674 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_authorization_policy_sync_cfc76a54.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_cfc76a54] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_get_authorization_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.GetAuthorizationPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_authorization_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_cfc76a54] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_async.py index e1fa0b4..cd9835b 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_9aed6c48.py similarity index 77% rename from samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_9aed6c48.py index 050fd5d..69d7d89 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_9aed6c48.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync_9aed6c48] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -42,4 +49,4 @@ def sample_get_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync_9aed6c48] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_e21f794a.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_e21f794a.py new file mode 100644 index 0000000..f7b567d --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_client_tls_policy_sync_e21f794a.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync_e21f794a] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_get_client_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.GetClientTlsPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_client_tls_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync_e21f794a] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_async.py index d203dbd..2139312 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_031e2ebd.py similarity index 77% rename from samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_031e2ebd.py index 9ddb080..005b9e7 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_031e2ebd.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync_031e2ebd] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -42,4 +49,4 @@ def sample_get_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync_031e2ebd] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_c5e8bf0a.py b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_c5e8bf0a.py new file mode 100644 index 0000000..7669da7 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_get_server_tls_policy_sync_c5e8bf0a.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync_c5e8bf0a] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_get_server_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.GetServerTlsPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_server_tls_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync_c5e8bf0a] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_async.py index 55f690c..a5f0053 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_a367cb24.py similarity index 77% rename from samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_a367cb24.py index c6c078d..2fd813a 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_a367cb24.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync] +# [START networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_a367cb24] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -43,4 +50,4 @@ def sample_list_authorization_policies(): for response in page_result: print(response) -# [END networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync] +# [END networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_a367cb24] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_bcd1f7f2.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_bcd1f7f2.py new file mode 100644 index 0000000..e9ffc6a --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_authorization_policies_sync_bcd1f7f2.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListAuthorizationPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_bcd1f7f2] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_list_authorization_policies(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.ListAuthorizationPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_authorization_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_bcd1f7f2] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_async.py index b9dda7b..dcbb96e 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9d256917.py similarity index 78% rename from samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9d256917.py index 3ee630a..16ebeb6 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9d256917.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync] +# [START networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9d256917] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -43,4 +50,4 @@ def sample_list_client_tls_policies(): for response in page_result: print(response) -# [END networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync] +# [END networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9d256917] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9f9532a9.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9f9532a9.py new file mode 100644 index 0000000..c48b64e --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9f9532a9.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListClientTlsPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9f9532a9] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_list_client_tls_policies(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.ListClientTlsPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_client_tls_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9f9532a9] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_async.py index fc27048..1edbe4f 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_5b72b482.py similarity index 78% rename from samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_5b72b482.py index 402bafd..a96a1dc 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_5b72b482.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync] +# [START networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync_5b72b482] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -43,4 +50,4 @@ def sample_list_server_tls_policies(): for response in page_result: print(response) -# [END networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync] +# [END networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync_5b72b482] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_91e492c0.py b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_91e492c0.py new file mode 100644 index 0000000..71def16 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_list_server_tls_policies_sync_91e492c0.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListServerTlsPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync_91e492c0] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_list_server_tls_policies(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1.ListServerTlsPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_server_tls_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync_91e492c0] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_async.py index 616ec8c..dbaccc2 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_62d4e07b.py similarity index 80% rename from samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_62d4e07b.py index dc2c564..ef6425f 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_62d4e07b.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_62d4e07b] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -50,4 +57,4 @@ def sample_update_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_62d4e07b] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_64ee237c.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_64ee237c.py new file mode 100644 index 0000000..9ebab07 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_authorization_policy_sync_64ee237c.py @@ -0,0 +1,60 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_64ee237c] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_update_authorization_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + authorization_policy = network_security_v1.AuthorizationPolicy() + authorization_policy.name = "name_value" + authorization_policy.action = "DENY" + + request = network_security_v1.UpdateAuthorizationPolicyRequest( + authorization_policy=authorization_policy, + ) + + # Make the request + operation = client.update_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_64ee237c] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_async.py index 5b1d2c9..5140f4f 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_2de403cb.py similarity index 79% rename from samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_2de403cb.py index ba70fad..f72fd31 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_2de403cb.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_2de403cb] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -49,4 +56,4 @@ def sample_update_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_2de403cb] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_5ea17e64.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_5ea17e64.py new file mode 100644 index 0000000..a104ff9 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_client_tls_policy_sync_5ea17e64.py @@ -0,0 +1,59 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_5ea17e64] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_update_client_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + client_tls_policy = network_security_v1.ClientTlsPolicy() + client_tls_policy.name = "name_value" + + request = network_security_v1.UpdateClientTlsPolicyRequest( + client_tls_policy=client_tls_policy, + ) + + # Make the request + operation = client.update_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_5ea17e64] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_async.py index 39300ef..36c5b35 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_7c28be0a.py similarity index 79% rename from samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_7c28be0a.py index d757ae1..e207887 100644 --- a/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_7c28be0a.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync] +# [START networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_7c28be0a] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1 @@ -49,4 +56,4 @@ def sample_update_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync] +# [END networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_7c28be0a] diff --git a/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_9618030c.py b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_9618030c.py new file mode 100644 index 0000000..806ddd3 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1_generated_network_security_update_server_tls_policy_sync_9618030c.py @@ -0,0 +1,59 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_9618030c] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1 + + +def sample_update_server_tls_policy(): + # Create a client + client = network_security_v1.NetworkSecurityClient() + + # Initialize request argument(s) + server_tls_policy = network_security_v1.ServerTlsPolicy() + server_tls_policy.name = "name_value" + + request = network_security_v1.UpdateServerTlsPolicyRequest( + server_tls_policy=server_tls_policy, + ) + + # Make the request + operation = client.update_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_9618030c] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_async.py index 31faf06..9f20c4e 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_13ddae3f.py similarity index 80% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_13ddae3f.py index cd9883c..4fc55d6 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_13ddae3f.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_13ddae3f] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -52,4 +59,4 @@ def sample_create_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_13ddae3f] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_6f94e042.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_6f94e042.py new file mode 100644 index 0000000..ff7f44b --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_6f94e042.py @@ -0,0 +1,62 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_6f94e042] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_create_authorization_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + authorization_policy = network_security_v1beta1.AuthorizationPolicy() + authorization_policy.name = "name_value" + authorization_policy.action = "DENY" + + request = network_security_v1beta1.CreateAuthorizationPolicyRequest( + parent="parent_value", + authorization_policy_id="authorization_policy_id_value", + authorization_policy=authorization_policy, + ) + + # Make the request + operation = client.create_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync_6f94e042] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py index 0291fab..7fed669 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_643210df.py similarity index 80% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_643210df.py index cc68e9e..c1fe007 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_643210df.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_643210df] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -51,4 +58,4 @@ def sample_create_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_643210df] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_a5505082.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_a5505082.py new file mode 100644 index 0000000..e075340 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_a5505082.py @@ -0,0 +1,61 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_a5505082] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_create_client_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + client_tls_policy = network_security_v1beta1.ClientTlsPolicy() + client_tls_policy.name = "name_value" + + request = network_security_v1beta1.CreateClientTlsPolicyRequest( + parent="parent_value", + client_tls_policy_id="client_tls_policy_id_value", + client_tls_policy=client_tls_policy, + ) + + # Make the request + operation = client.create_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync_a5505082] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py index 6de103a..43d7d53 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_1282e690.py similarity index 80% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_1282e690.py index 4d06f6e..9dbf3af 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_1282e690.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_1282e690] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -51,4 +58,4 @@ def sample_create_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_1282e690] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_de2ac4f1.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_de2ac4f1.py new file mode 100644 index 0000000..263af1c --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_de2ac4f1.py @@ -0,0 +1,61 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_de2ac4f1] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_create_server_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + server_tls_policy = network_security_v1beta1.ServerTlsPolicy() + server_tls_policy.name = "name_value" + + request = network_security_v1beta1.CreateServerTlsPolicyRequest( + parent="parent_value", + server_tls_policy_id="server_tls_policy_id_value", + server_tls_policy=server_tls_policy, + ) + + # Make the request + operation = client.create_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync_de2ac4f1] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py index be0187a..189a649 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_54c7505b.py similarity index 78% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_54c7505b.py index 606f6c5..e6cbe7c 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_54c7505b.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_54c7505b] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -46,4 +53,4 @@ def sample_delete_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_54c7505b] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_8a6154f2.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_8a6154f2.py new file mode 100644 index 0000000..cb6cef2 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_8a6154f2.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_8a6154f2] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_delete_authorization_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.DeleteAuthorizationPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync_8a6154f2] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py index 015479c..3cdfb5a 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_14da4cb2.py similarity index 78% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_14da4cb2.py index 8543c18..2ddf318 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_14da4cb2.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_14da4cb2] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -46,4 +53,4 @@ def sample_delete_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_14da4cb2] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_9826ab79.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_9826ab79.py new file mode 100644 index 0000000..79040a4 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_9826ab79.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_9826ab79] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_delete_client_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.DeleteClientTlsPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync_9826ab79] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py index ff0f489..61639a6 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_36381cf6.py similarity index 78% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_36381cf6.py index b32f177..adb07f5 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_36381cf6.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_36381cf6] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -46,4 +53,4 @@ def sample_delete_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_36381cf6] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_ff4f924d.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_ff4f924d.py new file mode 100644 index 0000000..dc63e2b --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_ff4f924d.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_ff4f924d] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_delete_server_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.DeleteServerTlsPolicyRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync_ff4f924d] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py index 6f24103..532ec5c 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_7ee872b4.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_7ee872b4.py index 2050b4e..c301fbc 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_7ee872b4.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_7ee872b4] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -42,4 +49,4 @@ def sample_get_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_7ee872b4] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_818c2154.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_818c2154.py new file mode 100644 index 0000000..0760768 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_818c2154.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_818c2154] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_get_authorization_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.GetAuthorizationPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_authorization_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync_818c2154] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py index 26f2ded..19c9ac4 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_0290a278.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_0290a278.py index ef6cfdf..599a75a 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_0290a278.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync_0290a278] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -42,4 +49,4 @@ def sample_get_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync_0290a278] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_fecc2055.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_fecc2055.py new file mode 100644 index 0000000..421e33b --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_fecc2055.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync_fecc2055] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_get_client_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.GetClientTlsPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_client_tls_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync_fecc2055] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py index 4755169..4f32d90 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_1847c7b1.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_1847c7b1.py index da08dd7..79d5831 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_1847c7b1.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync_1847c7b1] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -42,4 +49,4 @@ def sample_get_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync_1847c7b1] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_b46a1e40.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_b46a1e40.py new file mode 100644 index 0000000..030af94 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_b46a1e40.py @@ -0,0 +1,52 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync_b46a1e40] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_get_server_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.GetServerTlsPolicyRequest( + name="name_value", + ) + + # Make the request + response = client.get_server_tls_policy(request=request) + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync_b46a1e40] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py index c5ad42c..7d900be 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_09e30708.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_09e30708.py index 29ec127..4b44772 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_09e30708.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_09e30708] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -43,4 +50,4 @@ def sample_list_authorization_policies(): for response in page_result: print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_09e30708] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_b5fb2abc.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_b5fb2abc.py new file mode 100644 index 0000000..561c94f --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_b5fb2abc.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListAuthorizationPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_b5fb2abc] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_list_authorization_policies(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.ListAuthorizationPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_authorization_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync_b5fb2abc] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py index 14ecd4b..b8f8ff7 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_0342d9d6.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_0342d9d6.py index 6a25e00..585e6b9 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_0342d9d6.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync_0342d9d6] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -43,4 +50,4 @@ def sample_list_client_tls_policies(): for response in page_result: print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync_0342d9d6] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_9487a287.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_9487a287.py new file mode 100644 index 0000000..91f2f26 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_9487a287.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListClientTlsPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9487a287] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_list_client_tls_policies(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.ListClientTlsPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_client_tls_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync_9487a287] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py index 4d9a512..1c71134 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_78fe0b44.py similarity index 77% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_78fe0b44.py index 3f60b5a..4e4b26c 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_78fe0b44.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync_78fe0b44] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -43,4 +50,4 @@ def sample_list_server_tls_policies(): for response in page_result: print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync_78fe0b44] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_a5724e77.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_a5724e77.py new file mode 100644 index 0000000..3b47fe1 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_a5724e77.py @@ -0,0 +1,53 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListServerTlsPolicies +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync_a5724e77] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_list_server_tls_policies(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + request = network_security_v1beta1.ListServerTlsPoliciesRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_server_tls_policies(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync_a5724e77] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py index 29d4ec3..dbade0b 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_0de1ac9e.py similarity index 79% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_0de1ac9e.py index cd9b488..4427c9c 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_0de1ac9e.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_0de1ac9e] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -50,4 +57,4 @@ def sample_update_authorization_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_0de1ac9e] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_5b932ff2.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_5b932ff2.py new file mode 100644 index 0000000..241b554 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_5b932ff2.py @@ -0,0 +1,60 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateAuthorizationPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_5b932ff2] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_update_authorization_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + authorization_policy = network_security_v1beta1.AuthorizationPolicy() + authorization_policy.name = "name_value" + authorization_policy.action = "DENY" + + request = network_security_v1beta1.UpdateAuthorizationPolicyRequest( + authorization_policy=authorization_policy, + ) + + # Make the request + operation = client.update_authorization_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync_5b932ff2] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py index be26aa9..d622fe2 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_77288157.py similarity index 79% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_77288157.py index a8c2cdf..e26bd64 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_77288157.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_77288157] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -49,4 +56,4 @@ def sample_update_client_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_77288157] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_9f21f2d4.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_9f21f2d4.py new file mode 100644 index 0000000..ce13786 --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_9f21f2d4.py @@ -0,0 +1,59 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateClientTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_9f21f2d4] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_update_client_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + client_tls_policy = network_security_v1beta1.ClientTlsPolicy() + client_tls_policy.name = "name_value" + + request = network_security_v1beta1.UpdateClientTlsPolicyRequest( + client_tls_policy=client_tls_policy, + ) + + # Make the request + operation = client.update_client_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync_9f21f2d4] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py index f39e428..d128b2d 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py @@ -24,6 +24,13 @@ # [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_async] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_2010b9ab.py similarity index 79% rename from samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync.py rename to samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_2010b9ab.py index 298f548..387f94b 100644 --- a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync.py +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_2010b9ab.py @@ -23,7 +23,14 @@ # python3 -m pip install google-cloud-network-security -# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync] +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_2010b9ab] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html from google.cloud import network_security_v1beta1 @@ -49,4 +56,4 @@ def sample_update_server_tls_policy(): # Handle the response print(response) -# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync] +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_2010b9ab] diff --git a/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_fd0ab5be.py b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_fd0ab5be.py new file mode 100644 index 0000000..748ecff --- /dev/null +++ b/samples/generated_samples/networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_fd0ab5be.py @@ -0,0 +1,59 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateServerTlsPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-network-security + + +# [START networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_fd0ab5be] +# This snippet has been automatically generated and should be regarded as a +# code template only. +# It will require modifications to work: +# - It may require correct/in-range values for request initialization. +# - It may require specifying regional endpoints when creating the service +# client as shown in: +# https://googleapis.dev/python/google-api-core/latest/client_options.html +from google.cloud import network_security_v1beta1 + + +def sample_update_server_tls_policy(): + # Create a client + client = network_security_v1beta1.NetworkSecurityClient() + + # Initialize request argument(s) + server_tls_policy = network_security_v1beta1.ServerTlsPolicy() + server_tls_policy.name = "name_value" + + request = network_security_v1beta1.UpdateServerTlsPolicyRequest( + server_tls_policy=server_tls_policy, + ) + + # Make the request + operation = client.update_server_tls_policy(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync_fd0ab5be] diff --git a/samples/generated_samples/snippet_metadata_network security_v1.json b/samples/generated_samples/snippet_metadata_network security_v1.json index d5eab66..a2406cc 100644 --- a/samples/generated_samples/snippet_metadata_network security_v1.json +++ b/samples/generated_samples/snippet_metadata_network security_v1.json @@ -67,33 +67,33 @@ "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_async", "segments": [ { - "end": 54, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 54, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 44, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 51, - "start": 45, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 55, - "start": 52, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], @@ -149,76 +149,75 @@ "shortName": "create_authorization_policy" }, "description": "Sample for CreateAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_create_authorization_policy_sync.py", + "file": "networksecurity_v1_generated_network_security_create_authorization_policy_sync_92eec257.py", "language": "PYTHON", "origin": "API_DEFINITION", "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync", "segments": [ { - "end": 54, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 54, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 44, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 51, - "start": 45, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 55, - "start": 52, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_create_authorization_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_create_authorization_policy_sync_92eec257.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.create_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateClientTlsPolicy" + "shortName": "CreateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.CreateClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateAuthorizationPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "client_tls_policy", - "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" }, { - "name": "client_tls_policy_id", + "name": "authorization_policy_id", "type": "str" }, { @@ -234,56 +233,57 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "create_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_authorization_policy" }, - "description": "Sample for CreateClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_create_client_tls_policy_async.py", + "description": "Sample for CreateAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_create_authorization_policy_sync_50c6f504.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync", "segments": [ { - "end": 53, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_create_client_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_create_authorization_policy_sync_50c6f504.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.create_client_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateClientTlsPolicy", "service": { @@ -322,80 +322,79 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", + "resultType": "google.api_core.operation_async.AsyncOperation", "shortName": "create_client_tls_policy" }, "description": "Sample for CreateClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync.py", + "file": "networksecurity_v1_generated_network_security_create_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_async", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_create_client_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.create_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateServerTlsPolicy" + "shortName": "CreateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.CreateServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateClientTlsPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "server_tls_policy", - "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" }, { - "name": "server_tls_policy_id", + "name": "client_tls_policy_id", "type": "str" }, { @@ -411,47 +410,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "create_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_client_tls_policy" }, - "description": "Sample for CreateServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_create_server_tls_policy_async.py", + "description": "Sample for CreateClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync_55e9e16f.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_create_server_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync_55e9e16f.py" }, { "canonical": true, @@ -460,30 +459,30 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateServerTlsPolicy" + "shortName": "CreateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.CreateServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateClientTlsPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "server_tls_policy", - "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" }, { - "name": "server_tls_policy_id", + "name": "client_tls_policy_id", "type": "str" }, { @@ -500,46 +499,46 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "create_server_tls_policy" + "shortName": "create_client_tls_policy" }, - "description": "Sample for CreateServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync.py", + "description": "Sample for CreateClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync_d41c0b2f.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_create_client_tls_policy_sync_d41c0b2f.py" }, { "canonical": true, @@ -549,22 +548,30 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteAuthorizationPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -581,46 +588,46 @@ } ], "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_authorization_policy" + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_delete_authorization_policy_async.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_create_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_async", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_authorization_policy_async.py" + "title": "networksecurity_v1_generated_network_security_create_server_tls_policy_async.py" }, { "canonical": true, @@ -629,22 +636,30 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteAuthorizationPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -661,71 +676,78 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "delete_authorization_policy" + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync_5f6bfcb1.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync_5f6bfcb1.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteClientTlsPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -741,68 +763,69 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync_9455b0b7.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_create_server_tls_policy_sync_9455b0b7.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteClientTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -821,69 +844,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", - "shortName": "delete_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_delete_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_delete_authorization_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteServerTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -902,47 +924,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync_ae73c9c7.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync_ae73c9c7.py" }, { "canonical": true, @@ -951,19 +973,19 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteServerTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.DeleteServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -983,46 +1005,46 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "delete_server_tls_policy" + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync_b3435b7b.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_delete_authorization_policy_sync_b3435b7b.py" }, { "canonical": true, @@ -1032,19 +1054,19 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetAuthorizationPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1063,47 +1085,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.AuthorizationPolicy", - "shortName": "get_authorization_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_get_authorization_policy_async.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_async", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_authorization_policy_async.py" + "title": "networksecurity_v1_generated_network_security_delete_client_tls_policy_async.py" }, { "canonical": true, @@ -1112,19 +1134,19 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetAuthorizationPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1143,69 +1165,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.AuthorizationPolicy", - "shortName": "get_authorization_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_get_authorization_policy_sync.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_3b1913a0.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_authorization_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_3b1913a0.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetClientTlsPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1224,68 +1245,69 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.ClientTlsPolicy", - "shortName": "get_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_get_client_tls_policy_async.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_edd5ff26.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_client_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_delete_client_tls_policy_sync_edd5ff26.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetClientTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1304,69 +1326,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.ClientTlsPolicy", - "shortName": "get_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_async", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_delete_server_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetServerTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1385,47 +1406,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.ServerTlsPolicy", - "shortName": "get_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_get_server_tls_policy_async.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_ad303fbb.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_server_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_ad303fbb.py" }, { "canonical": true, @@ -1434,19 +1455,19 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetServerTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.GetServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1465,47 +1486,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.types.ServerTlsPolicy", - "shortName": "get_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_38190956.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_delete_server_tls_policy_sync_38190956.py" }, { "canonical": true, @@ -1515,22 +1536,22 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_authorization_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListAuthorizationPolicies", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListAuthorizationPolicies" + "shortName": "GetAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.ListAuthorizationPoliciesRequest" + "type": "google.cloud.network_security_v1.types.GetAuthorizationPolicyRequest" }, { - "name": "parent", + "name": "name", "type": "str" }, { @@ -1546,47 +1567,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListAuthorizationPoliciesAsyncPager", - "shortName": "list_authorization_policies" + "resultType": "google.cloud.network_security_v1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" }, - "description": "Sample for ListAuthorizationPolicies", - "file": "networksecurity_v1_generated_network_security_list_authorization_policies_async.py", + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_get_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_async", "segments": [ { - "end": 45, + "end": 51, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 51, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 52, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_authorization_policies_async.py" + "title": "networksecurity_v1_generated_network_security_get_authorization_policy_async.py" }, { "canonical": true, @@ -1595,19 +1616,983 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_authorization_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListAuthorizationPolicies", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetAuthorizationPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetAuthorizationPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetAuthorizationPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" + }, + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_get_authorization_policy_sync_1a5f98be.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_authorization_policy_sync_1a5f98be.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_authorization_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetAuthorizationPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetAuthorizationPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetAuthorizationPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" + }, + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_get_authorization_policy_sync_cfc76a54.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_authorization_policy_sync_cfc76a54.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_client_tls_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_client_tls_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync_9aed6c48.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync_9aed6c48.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync_e21f794a.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_client_tls_policy_sync_e21f794a.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_server_tls_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_server_tls_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync_c5e8bf0a.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync_c5e8bf0a.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync_031e2ebd.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_get_server_tls_policy_sync_031e2ebd.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListAuthorizationPoliciesAsyncPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1_generated_network_security_list_authorization_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_authorization_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListAuthorizationPoliciesPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1_generated_network_security_list_authorization_policies_sync_a367cb24.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_authorization_policies_sync_a367cb24.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListAuthorizationPoliciesPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1_generated_network_security_list_authorization_policies_sync_bcd1f7f2.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_authorization_policies_sync_bcd1f7f2.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_client_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListClientTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListClientTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListClientTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListClientTlsPoliciesAsyncPager", + "shortName": "list_client_tls_policies" + }, + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_client_tls_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_client_tls_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_client_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListClientTlsPolicies", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListAuthorizationPolicies" + "shortName": "ListClientTlsPolicies" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.ListAuthorizationPoliciesRequest" + "type": "google.cloud.network_security_v1.types.ListClientTlsPoliciesRequest" }, { "name": "parent", @@ -1626,57 +2611,56 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListAuthorizationPoliciesPager", - "shortName": "list_authorization_policies" + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListClientTlsPoliciesPager", + "shortName": "list_client_tls_policies" }, - "description": "Sample for ListAuthorizationPolicies", - "file": "networksecurity_v1_generated_network_security_list_authorization_policies_sync.py", + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9d256917.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync", "segments": [ { - "end": 45, + "end": 52, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 52, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 53, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_authorization_policies_sync.py" + "title": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9d256917.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_client_tls_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_client_tls_policies", "method": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListClientTlsPolicies", "service": { @@ -1707,72 +2691,318 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListClientTlsPoliciesAsyncPager", + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListClientTlsPoliciesPager", "shortName": "list_client_tls_policies" }, - "description": "Sample for ListClientTlsPolicies", - "file": "networksecurity_v1_generated_network_security_list_client_tls_policies_async.py", + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9f9532a9.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync_9f9532a9.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListServerTlsPoliciesAsyncPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_server_tls_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_server_tls_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListServerTlsPoliciesPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync_91e492c0.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync_91e492c0.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListServerTlsPoliciesPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync_5b72b482.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync", "segments": [ { - "end": 45, + "end": 52, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 52, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 53, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_client_tls_policies_async.py" + "title": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync_5b72b482.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_client_tls_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListClientTlsPolicies", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListClientTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.ListClientTlsPoliciesRequest" + "type": "google.cloud.network_security_v1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1787,73 +3017,76 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListClientTlsPoliciesPager", - "shortName": "list_client_tls_policies" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListClientTlsPolicies", - "file": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_update_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListClientTlsPolicies_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_client_tls_policies_sync.py" + "title": "networksecurity_v1_generated_network_security_update_authorization_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.list_server_tls_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListServerTlsPolicies", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListServerTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.ListServerTlsPoliciesRequest" + "type": "google.cloud.network_security_v1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1868,47 +3101,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListServerTlsPoliciesAsyncPager", - "shortName": "list_server_tls_policies" + "resultType": "google.api_core.operation.Operation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListServerTlsPolicies", - "file": "networksecurity_v1_generated_network_security_list_server_tls_policies_async.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_update_authorization_policy_sync_64ee237c.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_server_tls_policies_async.py" + "title": "networksecurity_v1_generated_network_security_update_authorization_policy_sync_64ee237c.py" }, { "canonical": true, @@ -1917,23 +3150,27 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.list_server_tls_policies", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.ListServerTlsPolicies", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListServerTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.ListServerTlsPoliciesRequest" + "type": "google.cloud.network_security_v1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1948,47 +3185,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1.services.network_security.pagers.ListServerTlsPoliciesPager", - "shortName": "list_server_tls_policies" + "resultType": "google.api_core.operation.Operation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListServerTlsPolicies", - "file": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1_generated_network_security_update_authorization_policy_sync_62d4e07b.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_ListServerTlsPolicies_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_list_server_tls_policies_sync.py" + "title": "networksecurity_v1_generated_network_security_update_authorization_policy_sync_62d4e07b.py" }, { "canonical": true, @@ -1998,23 +3235,23 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateAuthorizationPolicy" + "shortName": "UpdateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.UpdateAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.UpdateClientTlsPolicyRequest" }, { - "name": "authorization_policy", - "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" }, { "name": "update_mask", @@ -2034,46 +3271,46 @@ } ], "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "update_authorization_policy" + "shortName": "update_client_tls_policy" }, - "description": "Sample for UpdateAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_update_authorization_policy_async.py", + "description": "Sample for UpdateClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_update_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_async", "segments": [ { - "end": 52, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 52, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 42, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 49, - "start": 43, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 53, - "start": 50, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_authorization_policy_async.py" + "title": "networksecurity_v1_generated_network_security_update_client_tls_policy_async.py" }, { "canonical": true, @@ -2082,23 +3319,23 @@ "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_authorization_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateAuthorizationPolicy" + "shortName": "UpdateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.UpdateAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1.types.UpdateClientTlsPolicyRequest" }, { - "name": "authorization_policy", - "type": "google.cloud.network_security_v1.types.AuthorizationPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" }, { "name": "update_mask", @@ -2118,56 +3355,55 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "update_authorization_policy" + "shortName": "update_client_tls_policy" }, - "description": "Sample for UpdateAuthorizationPolicy", - "file": "networksecurity_v1_generated_network_security_update_authorization_policy_sync.py", + "description": "Sample for UpdateClientTlsPolicy", + "file": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync_2de403cb.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", "segments": [ { - "end": 52, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 52, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 42, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 49, - "start": 43, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 53, - "start": 50, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_authorization_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync_2de403cb.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_client_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateClientTlsPolicy", "service": { @@ -2202,72 +3438,73 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", + "resultType": "google.api_core.operation.Operation", "shortName": "update_client_tls_policy" }, "description": "Sample for UpdateClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_update_client_tls_policy_async.py", + "file": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync_5ea17e64.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_client_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync_5ea17e64.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_client_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateClientTlsPolicy" + "shortName": "UpdateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1.types.UpdateClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1.types.UpdateServerTlsPolicyRequest" }, { - "name": "client_tls_policy", - "type": "google.cloud.network_security_v1.types.ClientTlsPolicy" + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1.types.ServerTlsPolicy" }, { "name": "update_mask", @@ -2286,57 +3523,56 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", - "shortName": "update_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "update_server_tls_policy" }, - "description": "Sample for UpdateClientTlsPolicy", - "file": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync.py", + "description": "Sample for UpdateServerTlsPolicy", + "file": "networksecurity_v1_generated_network_security_update_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_async", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_client_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_update_server_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1.NetworkSecurityAsyncClient.update_server_tls_policy", + "fullName": "google.cloud.network_security_v1.NetworkSecurityClient.update_server_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1.NetworkSecurity.UpdateServerTlsPolicy", "service": { @@ -2371,47 +3607,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", + "resultType": "google.api_core.operation.Operation", "shortName": "update_server_tls_policy" }, "description": "Sample for UpdateServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_update_server_tls_policy_async.py", + "file": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync_9618030c.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_async", + "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_server_tls_policy_async.py" + "title": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync_9618030c.py" }, { "canonical": true, @@ -2459,43 +3695,43 @@ "shortName": "update_server_tls_policy" }, "description": "Sample for UpdateServerTlsPolicy", - "file": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync.py", + "file": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync_7c28be0a.py", "language": "PYTHON", "origin": "API_DEFINITION", "regionTag": "networksecurity_v1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync.py" + "title": "networksecurity_v1_generated_network_security_update_server_tls_policy_sync_7c28be0a.py" } ] } diff --git a/samples/generated_samples/snippet_metadata_network security_v1beta1.json b/samples/generated_samples/snippet_metadata_network security_v1beta1.json index 75c83ea..28c62c8 100644 --- a/samples/generated_samples/snippet_metadata_network security_v1beta1.json +++ b/samples/generated_samples/snippet_metadata_network security_v1beta1.json @@ -67,33 +67,33 @@ "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_async", "segments": [ { - "end": 54, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 54, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 44, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 51, - "start": 45, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 55, - "start": 52, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], @@ -149,76 +149,75 @@ "shortName": "create_authorization_policy" }, "description": "Sample for CreateAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync.py", + "file": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_13ddae3f.py", "language": "PYTHON", "origin": "API_DEFINITION", "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync", "segments": [ { - "end": 54, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 54, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 44, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 51, - "start": 45, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 55, - "start": 52, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_13ddae3f.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.create_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateClientTlsPolicy" + "shortName": "CreateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.CreateClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateAuthorizationPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "client_tls_policy", - "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" }, { - "name": "client_tls_policy_id", + "name": "authorization_policy_id", "type": "str" }, { @@ -234,56 +233,57 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "create_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_authorization_policy" }, - "description": "Sample for CreateClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py", + "description": "Sample for CreateAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_6f94e042.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateAuthorizationPolicy_sync", "segments": [ { - "end": 53, + "end": 61, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 61, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 51, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 58, + "start": 52, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 62, + "start": 59, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_create_authorization_policy_sync_6f94e042.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.create_client_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateClientTlsPolicy", "service": { @@ -322,80 +322,79 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", + "resultType": "google.api_core.operation_async.AsyncOperation", "shortName": "create_client_tls_policy" }, "description": "Sample for CreateClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync.py", + "file": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_async", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.create_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateServerTlsPolicy" + "shortName": "CreateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.CreateServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateClientTlsPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "server_tls_policy", - "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" }, { - "name": "server_tls_policy_id", + "name": "client_tls_policy_id", "type": "str" }, { @@ -411,47 +410,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "create_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_client_tls_policy" }, - "description": "Sample for CreateServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py", + "description": "Sample for CreateClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_a5505082.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_a5505082.py" }, { "canonical": true, @@ -460,30 +459,30 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "CreateServerTlsPolicy" + "shortName": "CreateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.CreateServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateClientTlsPolicyRequest" }, { "name": "parent", "type": "str" }, { - "name": "server_tls_policy", - "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" }, { - "name": "server_tls_policy_id", + "name": "client_tls_policy_id", "type": "str" }, { @@ -500,46 +499,46 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "create_server_tls_policy" + "shortName": "create_client_tls_policy" }, - "description": "Sample for CreateServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync.py", + "description": "Sample for CreateClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_643210df.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateClientTlsPolicy_sync", "segments": [ { - "end": 53, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 53, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 43, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 50, - "start": 44, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 54, - "start": 51, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_create_client_tls_policy_sync_643210df.py" }, { "canonical": true, @@ -549,22 +548,30 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteAuthorizationPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -581,46 +588,46 @@ } ], "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_authorization_policy" + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_async", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_async.py" }, { "canonical": true, @@ -629,22 +636,30 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteAuthorizationPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -661,71 +676,78 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "delete_authorization_policy" + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_de2ac4f1.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_de2ac4f1.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.create_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.CreateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteClientTlsPolicy" + "shortName": "CreateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.CreateServerTlsPolicyRequest" }, { - "name": "name", + "name": "parent", + "type": "str" + }, + { + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" + }, + { + "name": "server_tls_policy_id", "type": "str" }, { @@ -741,68 +763,69 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "create_server_tls_policy" }, - "description": "Sample for DeleteClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py", + "description": "Sample for CreateServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_1282e690.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_CreateServerTlsPolicy_sync", "segments": [ { - "end": 48, + "end": 60, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 60, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 50, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 57, + "start": 51, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 61, + "start": 58, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_create_server_tls_policy_sync_1282e690.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteClientTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -821,69 +844,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", - "shortName": "delete_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_async", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteServerTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -902,47 +924,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "delete_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_8a6154f2.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_8a6154f2.py" }, { "canonical": true, @@ -951,19 +973,19 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "DeleteServerTlsPolicy" + "shortName": "DeleteAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.DeleteServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteAuthorizationPolicyRequest" }, { "name": "name", @@ -983,46 +1005,46 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "delete_server_tls_policy" + "shortName": "delete_authorization_policy" }, - "description": "Sample for DeleteServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync.py", + "description": "Sample for DeleteAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_54c7505b.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteAuthorizationPolicy_sync", "segments": [ { - "end": 48, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 48, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 45, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 49, - "start": 46, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_authorization_policy_sync_54c7505b.py" }, { "canonical": true, @@ -1032,19 +1054,19 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetAuthorizationPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1063,47 +1085,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy", - "shortName": "get_authorization_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_async", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_async.py" }, { "canonical": true, @@ -1112,19 +1134,19 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetAuthorizationPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1143,69 +1165,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy", - "shortName": "get_authorization_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_14da4cb2.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_14da4cb2.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetClientTlsPolicy" + "shortName": "DeleteClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteClientTlsPolicyRequest" }, { "name": "name", @@ -1224,68 +1245,69 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy", - "shortName": "get_client_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_client_tls_policy" }, - "description": "Sample for GetClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py", + "description": "Sample for DeleteClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_9826ab79.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteClientTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_client_tls_policy_sync_9826ab79.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetClientTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1304,69 +1326,68 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy", - "shortName": "get_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_async", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetServerTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1385,47 +1406,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy", - "shortName": "get_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_36381cf6.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_36381cf6.py" }, { "canonical": true, @@ -1434,19 +1455,19 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.delete_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetServerTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.DeleteServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "GetServerTlsPolicy" + "shortName": "DeleteServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.GetServerTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.DeleteServerTlsPolicyRequest" }, { "name": "name", @@ -1465,47 +1486,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy", - "shortName": "get_server_tls_policy" + "resultType": "google.api_core.operation.Operation", + "shortName": "delete_server_tls_policy" }, - "description": "Sample for GetServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync.py", + "description": "Sample for DeleteServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_ff4f924d.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_DeleteServerTlsPolicy_sync", "segments": [ { - "end": 44, + "end": 55, "start": 27, "type": "FULL" }, { - "end": 44, + "end": 55, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 52, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 45, - "start": 42, + "end": 56, + "start": 53, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_delete_server_tls_policy_sync_ff4f924d.py" }, { "canonical": true, @@ -1515,22 +1536,22 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_authorization_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListAuthorizationPolicies", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListAuthorizationPolicies" + "shortName": "GetAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.ListAuthorizationPoliciesRequest" + "type": "google.cloud.network_security_v1beta1.types.GetAuthorizationPolicyRequest" }, { - "name": "parent", + "name": "name", "type": "str" }, { @@ -1546,47 +1567,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListAuthorizationPoliciesAsyncPager", - "shortName": "list_authorization_policies" + "resultType": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" }, - "description": "Sample for ListAuthorizationPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py", + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_async", "segments": [ { - "end": 45, + "end": 51, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 51, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 52, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py" + "title": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_async.py" }, { "canonical": true, @@ -1595,19 +1616,983 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_authorization_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListAuthorizationPolicies", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetAuthorizationPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetAuthorizationPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetAuthorizationPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" + }, + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_7ee872b4.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_7ee872b4.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_authorization_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetAuthorizationPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetAuthorizationPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetAuthorizationPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy", + "shortName": "get_authorization_policy" + }, + "description": "Sample for GetAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_818c2154.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetAuthorizationPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_authorization_policy_sync_818c2154.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_fecc2055.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_fecc2055.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_client_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetClientTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetClientTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetClientTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy", + "shortName": "get_client_tls_policy" + }, + "description": "Sample for GetClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_0290a278.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetClientTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_client_tls_policy_sync_0290a278.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_async", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_b46a1e40.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_b46a1e40.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.get_server_tls_policy", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.GetServerTlsPolicy", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "GetServerTlsPolicy" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.GetServerTlsPolicyRequest" + }, + { + "name": "name", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy", + "shortName": "get_server_tls_policy" + }, + "description": "Sample for GetServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_1847c7b1.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_GetServerTlsPolicy_sync", + "segments": [ + { + "end": 51, + "start": 27, + "type": "FULL" + }, + { + "end": 51, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 52, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_get_server_tls_policy_sync_1847c7b1.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListAuthorizationPoliciesAsyncPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListAuthorizationPoliciesPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_b5fb2abc.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_b5fb2abc.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_authorization_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListAuthorizationPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListAuthorizationPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListAuthorizationPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListAuthorizationPoliciesPager", + "shortName": "list_authorization_policies" + }, + "description": "Sample for ListAuthorizationPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_09e30708.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync_09e30708.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_client_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListClientTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListClientTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListClientTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListClientTlsPoliciesAsyncPager", + "shortName": "list_client_tls_policies" + }, + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_client_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListClientTlsPolicies", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListAuthorizationPolicies" + "shortName": "ListClientTlsPolicies" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.ListAuthorizationPoliciesRequest" + "type": "google.cloud.network_security_v1beta1.types.ListClientTlsPoliciesRequest" }, { "name": "parent", @@ -1626,57 +2611,56 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListAuthorizationPoliciesPager", - "shortName": "list_authorization_policies" + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListClientTlsPoliciesPager", + "shortName": "list_client_tls_policies" }, - "description": "Sample for ListAuthorizationPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync.py", + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_0342d9d6.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListAuthorizationPolicies_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync", "segments": [ { - "end": 45, + "end": 52, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 52, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 53, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_authorization_policies_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_0342d9d6.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_client_tls_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_client_tls_policies", "method": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListClientTlsPolicies", "service": { @@ -1707,72 +2691,318 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListClientTlsPoliciesAsyncPager", + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListClientTlsPoliciesPager", "shortName": "list_client_tls_policies" }, - "description": "Sample for ListClientTlsPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py", + "description": "Sample for ListClientTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_9487a287.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync_9487a287.py" + }, + { + "canonical": true, + "clientMethod": { + "async": true, + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListServerTlsPoliciesAsyncPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_async", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListServerTlsPoliciesPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_78fe0b44.py", + "language": "PYTHON", + "origin": "API_DEFINITION", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync", + "segments": [ + { + "end": 52, + "start": 27, + "type": "FULL" + }, + { + "end": 52, + "start": 27, + "type": "SHORT" + }, + { + "end": 40, + "start": 38, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 41, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 48, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 53, + "start": 49, + "type": "RESPONSE_HANDLING" + } + ], + "title": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_78fe0b44.py" + }, + { + "canonical": true, + "clientMethod": { + "client": { + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" + }, + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_server_tls_policies", + "method": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListServerTlsPolicies", + "service": { + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", + "shortName": "NetworkSecurity" + }, + "shortName": "ListServerTlsPolicies" + }, + "parameters": [ + { + "name": "request", + "type": "google.cloud.network_security_v1beta1.types.ListServerTlsPoliciesRequest" + }, + { + "name": "parent", + "type": "str" + }, + { + "name": "retry", + "type": "google.api_core.retry.Retry" + }, + { + "name": "timeout", + "type": "float" + }, + { + "name": "metadata", + "type": "Sequence[Tuple[str, str]" + } + ], + "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListServerTlsPoliciesPager", + "shortName": "list_server_tls_policies" + }, + "description": "Sample for ListServerTlsPolicies", + "file": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_a5724e77.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync", "segments": [ { - "end": 45, + "end": 52, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 52, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 45, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 48, + "start": 46, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 53, + "start": 49, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_async.py" + "title": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync_a5724e77.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_client_tls_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListClientTlsPolicies", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListClientTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.ListClientTlsPoliciesRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1787,73 +3017,76 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListClientTlsPoliciesPager", - "shortName": "list_client_tls_policies" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListClientTlsPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListClientTlsPolicies_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_client_tls_policies_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.list_server_tls_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListServerTlsPolicies", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListServerTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.ListServerTlsPoliciesRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1868,47 +3101,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListServerTlsPoliciesAsyncPager", - "shortName": "list_server_tls_policies" + "resultType": "google.api_core.operation.Operation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListServerTlsPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_0de1ac9e.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_async.py" + "title": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_0de1ac9e.py" }, { "canonical": true, @@ -1917,23 +3150,27 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.list_server_tls_policies", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_authorization_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.ListServerTlsPolicies", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateAuthorizationPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "ListServerTlsPolicies" + "shortName": "UpdateAuthorizationPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.ListServerTlsPoliciesRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateAuthorizationPolicyRequest" }, { - "name": "parent", - "type": "str" + "name": "authorization_policy", + "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" + }, + { + "name": "update_mask", + "type": "google.protobuf.field_mask_pb2.FieldMask" }, { "name": "retry", @@ -1948,47 +3185,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.cloud.network_security_v1beta1.services.network_security.pagers.ListServerTlsPoliciesPager", - "shortName": "list_server_tls_policies" + "resultType": "google.api_core.operation.Operation", + "shortName": "update_authorization_policy" }, - "description": "Sample for ListServerTlsPolicies", - "file": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync.py", + "description": "Sample for UpdateAuthorizationPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_5b932ff2.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_ListServerTlsPolicies_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", "segments": [ { - "end": 45, + "end": 59, "start": 27, "type": "FULL" }, { - "end": 45, + "end": 59, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 38, - "start": 34, + "end": 49, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 41, - "start": 39, + "end": 56, + "start": 50, "type": "REQUEST_EXECUTION" }, { - "end": 46, - "start": 42, + "end": 60, + "start": 57, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_list_server_tls_policies_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync_5b932ff2.py" }, { "canonical": true, @@ -1998,23 +3235,23 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateAuthorizationPolicy" + "shortName": "UpdateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.UpdateAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateClientTlsPolicyRequest" }, { - "name": "authorization_policy", - "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" }, { "name": "update_mask", @@ -2034,46 +3271,46 @@ } ], "resultType": "google.api_core.operation_async.AsyncOperation", - "shortName": "update_authorization_policy" + "shortName": "update_client_tls_policy" }, - "description": "Sample for UpdateAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py", + "description": "Sample for UpdateClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_async", "segments": [ { - "end": 52, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 52, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 42, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 49, - "start": 43, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 53, - "start": 50, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py" }, { "canonical": true, @@ -2082,23 +3319,23 @@ "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_authorization_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_client_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateAuthorizationPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateClientTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateAuthorizationPolicy" + "shortName": "UpdateClientTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.UpdateAuthorizationPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateClientTlsPolicyRequest" }, { - "name": "authorization_policy", - "type": "google.cloud.network_security_v1beta1.types.AuthorizationPolicy" + "name": "client_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" }, { "name": "update_mask", @@ -2118,56 +3355,55 @@ } ], "resultType": "google.api_core.operation.Operation", - "shortName": "update_authorization_policy" + "shortName": "update_client_tls_policy" }, - "description": "Sample for UpdateAuthorizationPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync.py", + "description": "Sample for UpdateClientTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_77288157.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateAuthorizationPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", "segments": [ { - "end": 52, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 52, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 42, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 49, - "start": 43, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 53, - "start": 50, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_authorization_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_77288157.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_client_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateClientTlsPolicy", "service": { @@ -2202,72 +3438,73 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", + "resultType": "google.api_core.operation.Operation", "shortName": "update_client_tls_policy" }, "description": "Sample for UpdateClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py", + "file": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_9f21f2d4.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync_9f21f2d4.py" }, { "canonical": true, "clientMethod": { + "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", - "shortName": "NetworkSecurityClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", + "shortName": "NetworkSecurityAsyncClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_client_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_server_tls_policy", "method": { - "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateClientTlsPolicy", + "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateServerTlsPolicy", "service": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity", "shortName": "NetworkSecurity" }, - "shortName": "UpdateClientTlsPolicy" + "shortName": "UpdateServerTlsPolicy" }, "parameters": [ { "name": "request", - "type": "google.cloud.network_security_v1beta1.types.UpdateClientTlsPolicyRequest" + "type": "google.cloud.network_security_v1beta1.types.UpdateServerTlsPolicyRequest" }, { - "name": "client_tls_policy", - "type": "google.cloud.network_security_v1beta1.types.ClientTlsPolicy" + "name": "server_tls_policy", + "type": "google.cloud.network_security_v1beta1.types.ServerTlsPolicy" }, { "name": "update_mask", @@ -2286,57 +3523,56 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation.Operation", - "shortName": "update_client_tls_policy" + "resultType": "google.api_core.operation_async.AsyncOperation", + "shortName": "update_server_tls_policy" }, - "description": "Sample for UpdateClientTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync.py", + "description": "Sample for UpdateServerTlsPolicy", + "file": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateClientTlsPolicy_sync", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_async", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_client_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py" }, { "canonical": true, "clientMethod": { - "async": true, "client": { - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient", - "shortName": "NetworkSecurityAsyncClient" + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient", + "shortName": "NetworkSecurityClient" }, - "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityAsyncClient.update_server_tls_policy", + "fullName": "google.cloud.network_security_v1beta1.NetworkSecurityClient.update_server_tls_policy", "method": { "fullName": "google.cloud.networksecurity.v1beta1.NetworkSecurity.UpdateServerTlsPolicy", "service": { @@ -2371,47 +3607,47 @@ "type": "Sequence[Tuple[str, str]" } ], - "resultType": "google.api_core.operation_async.AsyncOperation", + "resultType": "google.api_core.operation.Operation", "shortName": "update_server_tls_policy" }, "description": "Sample for UpdateServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py", + "file": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_fd0ab5be.py", "language": "PYTHON", "origin": "API_DEFINITION", - "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_async", + "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_async.py" + "title": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_fd0ab5be.py" }, { "canonical": true, @@ -2459,43 +3695,43 @@ "shortName": "update_server_tls_policy" }, "description": "Sample for UpdateServerTlsPolicy", - "file": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync.py", + "file": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_2010b9ab.py", "language": "PYTHON", "origin": "API_DEFINITION", "regionTag": "networksecurity_v1beta1_generated_NetworkSecurity_UpdateServerTlsPolicy_sync", "segments": [ { - "end": 51, + "end": 58, "start": 27, "type": "FULL" }, { - "end": 51, + "end": 58, "start": 27, "type": "SHORT" }, { - "end": 33, - "start": 31, + "end": 40, + "start": 38, "type": "CLIENT_INITIALIZATION" }, { - "end": 41, - "start": 34, + "end": 48, + "start": 41, "type": "REQUEST_INITIALIZATION" }, { - "end": 48, - "start": 42, + "end": 55, + "start": 49, "type": "REQUEST_EXECUTION" }, { - "end": 52, - "start": 49, + "end": 59, + "start": 56, "type": "RESPONSE_HANDLING" } ], - "title": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync.py" + "title": "networksecurity_v1beta1_generated_network_security_update_server_tls_policy_sync_2010b9ab.py" } ] } diff --git a/setup.py b/setup.py index 879715d..83522bb 100644 --- a/setup.py +++ b/setup.py @@ -21,12 +21,12 @@ name = "google-cloud-network-security" description = "Network Security API client library" -version = "0.6.1" +version = "0.7.0" release_status = "Development Status :: 4 - Beta" dependencies = [ - "google-api-core[grpc] >= 1.32.0, <3.0.0dev,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*", + "google-api-core[grpc] >= 1.33.1, <3.0.0dev,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*", "proto-plus >= 1.22.0, <2.0.0dev", - "protobuf >= 3.19.0, <5.0.0dev", + "protobuf >= 3.20.1, <5.0.0dev", "grpc-google-iam-v1 >=0.12.4, <1.0.0dev", ] diff --git a/testing/constraints-3.7.txt b/testing/constraints-3.7.txt index 461fa1f..1384af6 100644 --- a/testing/constraints-3.7.txt +++ b/testing/constraints-3.7.txt @@ -4,7 +4,7 @@ # Pin the version to the lower bound. # e.g., if setup.py has "google-cloud-foo >= 1.14.0, < 2.0.0dev", # Then this file should have google-cloud-foo==1.14.0 -google-api-core==1.32.0 +google-api-core==1.33.1 proto-plus==1.22.0 -protobuf==3.19.0 +protobuf==3.20.1 grpc-google-iam-v1==0.12.4 diff --git a/tests/unit/gapic/network_security_v1/test_network_security.py b/tests/unit/gapic/network_security_v1/test_network_security.py index aaca116..c7bcf38 100644 --- a/tests/unit/gapic/network_security_v1/test_network_security.py +++ b/tests/unit/gapic/network_security_v1/test_network_security.py @@ -18,10 +18,12 @@ # try/except added for compatibility with python < 3.8 try: from unittest import mock - from unittest.mock import AsyncMock -except ImportError: + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER import mock +from collections.abc import Iterable +import json import math from google.api_core import ( @@ -42,11 +44,15 @@ from google.longrunning import operations_pb2 from google.oauth2 import service_account from google.protobuf import field_mask_pb2 # type: ignore +from google.protobuf import json_format from google.protobuf import timestamp_pb2 # type: ignore import grpc from grpc.experimental import aio +from proto.marshal.rules import wrappers from proto.marshal.rules.dates import DurationRule, TimestampRule import pytest +from requests import PreparedRequest, Request, Response +from requests.sessions import Session from google.cloud.network_security_v1.services.network_security import ( NetworkSecurityAsyncClient, @@ -119,6 +125,7 @@ def test__get_default_mtls_endpoint(): [ (NetworkSecurityClient, "grpc"), (NetworkSecurityAsyncClient, "grpc_asyncio"), + (NetworkSecurityClient, "rest"), ], ) def test_network_security_client_from_service_account_info( @@ -134,7 +141,11 @@ def test_network_security_client_from_service_account_info( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("networksecurity.googleapis.com:443") + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) @pytest.mark.parametrize( @@ -142,6 +153,7 @@ def test_network_security_client_from_service_account_info( [ (transports.NetworkSecurityGrpcTransport, "grpc"), (transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.NetworkSecurityRestTransport, "rest"), ], ) def test_network_security_client_service_account_always_use_jwt( @@ -167,6 +179,7 @@ def test_network_security_client_service_account_always_use_jwt( [ (NetworkSecurityClient, "grpc"), (NetworkSecurityAsyncClient, "grpc_asyncio"), + (NetworkSecurityClient, "rest"), ], ) def test_network_security_client_from_service_account_file( @@ -189,13 +202,18 @@ def test_network_security_client_from_service_account_file( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("networksecurity.googleapis.com:443") + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) def test_network_security_client_get_transport_class(): transport = NetworkSecurityClient.get_transport_class() available_transports = [ transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityRestTransport, ] assert transport in available_transports @@ -212,6 +230,7 @@ def test_network_security_client_get_transport_class(): transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio", ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest"), ], ) @mock.patch.object( @@ -367,6 +386,18 @@ def test_network_security_client_client_options( "grpc_asyncio", "false", ), + ( + NetworkSecurityClient, + transports.NetworkSecurityRestTransport, + "rest", + "true", + ), + ( + NetworkSecurityClient, + transports.NetworkSecurityRestTransport, + "rest", + "false", + ), ], ) @mock.patch.object( @@ -566,6 +597,7 @@ def test_network_security_client_get_mtls_endpoint_and_cert_source(client_class) transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio", ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest"), ], ) def test_network_security_client_client_options_scopes( @@ -606,6 +638,7 @@ def test_network_security_client_client_options_scopes( "grpc_asyncio", grpc_helpers_async, ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest", None), ], ) def test_network_security_client_client_options_credentials_file( @@ -5091,249 +5124,4922 @@ async def test_delete_client_tls_policy_flattened_error_async(): ) -def test_credentials_transport_error(): - # It is an error to provide credentials and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( +@pytest.mark.parametrize( + "request_type", + [ + authorization_policy.ListAuthorizationPoliciesRequest, + dict, + ], +) +def test_list_authorization_policies_rest(request_type): + client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - # It is an error to provide a credentials file and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options={"credentials_file": "credentials.json"}, - transport=transport, - ) + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) - # It is an error to provide an api_key and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options=options, - transport=transport, + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse( + next_page_token="next_page_token_value", ) - # It is an error to provide an api_key and a credential. - options = mock.Mock() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options=options, credentials=ga_credentials.AnonymousCredentials() + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value ) + json_return_value = json_format.MessageToJson(pb_return_value) - # It is an error to provide scopes and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options={"scopes": ["1", "2"]}, - transport=transport, - ) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_authorization_policies(request) + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListAuthorizationPoliciesPager) + assert response.next_page_token == "next_page_token_value" -def test_transport_instance(): - # A client may be instantiated with a custom transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - client = NetworkSecurityClient(transport=transport) - assert client.transport is transport +def test_list_authorization_policies_rest_required_fields( + request_type=authorization_policy.ListAuthorizationPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport -def test_transport_get_channel(): - # A client may be instantiated with a custom transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) ) - channel = transport.grpc_channel - assert channel - transport = transports.NetworkSecurityGrpcAsyncIOTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel + # verify fields with default values are dropped + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_authorization_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_transport_adc(transport_class): - # Test default credentials are used if not provided. - with mock.patch.object(google.auth, "default") as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class() - adc.assert_called_once() + # verify required fields with default values are now present + jsonified_request["parent"] = "parent_value" -@pytest.mark.parametrize( - "transport_name", - [ - "grpc", - ], -) -def test_transport_kind(transport_name): - transport = NetworkSecurityClient.get_transport_class(transport_name)( - credentials=ga_credentials.AnonymousCredentials(), + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_authorization_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) ) - assert transport.kind == transport_name + jsonified_request.update(unset_fields) + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" -def test_transport_grpc_default(): - # A client should use the gRPC transport by default. client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_authorization_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_authorization_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials ) - assert isinstance( - client.transport, - transports.NetworkSecurityGrpcTransport, + + unset_fields = transport.list_authorization_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) ) -def test_network_security_base_transport_error(): - # Passing both a credentials object and credentials_file should raise an error - with pytest.raises(core_exceptions.DuplicateCredentialArgs): - transport = transports.NetworkSecurityTransport( - credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json", +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_authorization_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_authorization_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_authorization_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.ListAuthorizationPoliciesRequest.pb( + authorization_policy.ListAuthorizationPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + authorization_policy.ListAuthorizationPoliciesResponse.to_json( + authorization_policy.ListAuthorizationPoliciesResponse() + ) ) + request = authorization_policy.ListAuthorizationPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = authorization_policy.ListAuthorizationPoliciesResponse() -def test_network_security_base_transport(): - # Instantiate the base transport. - with mock.patch( - "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport.__init__" - ) as Transport: - Transport.return_value = None - transport = transports.NetworkSecurityTransport( - credentials=ga_credentials.AnonymousCredentials(), + client.list_authorization_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], ) - # Every method on the transport should just blindly - # raise NotImplementedError. - methods = ( - "list_authorization_policies", - "get_authorization_policy", - "create_authorization_policy", - "update_authorization_policy", - "delete_authorization_policy", - "list_server_tls_policies", - "get_server_tls_policy", - "create_server_tls_policy", - "update_server_tls_policy", - "delete_server_tls_policy", - "list_client_tls_policies", - "get_client_tls_policy", - "create_client_tls_policy", - "update_client_tls_policy", - "delete_client_tls_policy", - ) - for method in methods: - with pytest.raises(NotImplementedError): - getattr(transport, method)(request=object()) + pre.assert_called_once() + post.assert_called_once() - with pytest.raises(NotImplementedError): - transport.close() - # Additionally, the LRO client (a property) should - # also raise NotImplementedError - with pytest.raises(NotImplementedError): - transport.operations_client +def test_list_authorization_policies_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.ListAuthorizationPoliciesRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) - # Catch all for all remaining methods and properties - remainder = [ - "kind", - ] - for r in remainder: - with pytest.raises(NotImplementedError): - getattr(transport, r)() + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_authorization_policies(request) -def test_network_security_base_transport_with_credentials_file(): - # Instantiate the base transport with a credentials file - with mock.patch.object( - google.auth, "load_credentials_from_file", autospec=True - ) as load_creds, mock.patch( - "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" - ) as Transport: - Transport.return_value = None - load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.NetworkSecurityTransport( - credentials_file="credentials.json", - quota_project_id="octopus", - ) - load_creds.assert_called_once_with( - "credentials.json", - scopes=None, - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id="octopus", - ) +def test_list_authorization_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) -def test_network_security_base_transport_with_adc(): - # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( - "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" - ) as Transport: - Transport.return_value = None - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.NetworkSecurityTransport() - adc.assert_called_once() + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse() + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} -def test_network_security_auth_adc(): - # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - NetworkSecurityClient() - adc.assert_called_once_with( - scopes=None, - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id=None, + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", ) + mock_args.update(sample_request) + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_network_security_transport_auth_adc(transport_class): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class(quota_project_id="octopus", scopes=["1", "2"]) - adc.assert_called_once_with( - scopes=["1", "2"], - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id="octopus", + client.list_authorization_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/authorizationPolicies" + % client.transport._host, + args[1], ) -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, +def test_list_authorization_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_authorization_policies( + authorization_policy.ListAuthorizationPoliciesRequest(), + parent="parent_value", + ) + + +def test_list_authorization_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + ], + next_page_token="abc", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[], + next_page_token="def", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + ], + next_page_token="ghi", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + authorization_policy.ListAuthorizationPoliciesResponse.to_json(x) + for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_authorization_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all( + isinstance(i, authorization_policy.AuthorizationPolicy) for i in results + ) + + pages = list(client.list_authorization_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +@pytest.mark.parametrize( + "request_type", + [ + authorization_policy.GetAuthorizationPolicyRequest, + dict, + ], +) +def test_get_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy( + name="name_value", + description="description_value", + action=authorization_policy.AuthorizationPolicy.Action.ALLOW, + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, authorization_policy.AuthorizationPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.action == authorization_policy.AuthorizationPolicy.Action.ALLOW + + +def test_get_authorization_policy_rest_required_fields( + request_type=authorization_policy.GetAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.GetAuthorizationPolicyRequest.pb( + authorization_policy.GetAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = authorization_policy.AuthorizationPolicy.to_json( + authorization_policy.AuthorizationPolicy() + ) + + request = authorization_policy.GetAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = authorization_policy.AuthorizationPolicy() + + client.get_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.GetAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_authorization_policy(request) + + +def test_get_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_authorization_policy( + authorization_policy.GetAuthorizationPolicyRequest(), + name="name_value", + ) + + +def test_get_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_authorization_policy.CreateAuthorizationPolicyRequest, + dict, + ], +) +def test_create_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["authorization_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_authorization_policy_rest_required_fields( + request_type=gcn_authorization_policy.CreateAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["authorization_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "authorizationPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "authorizationPolicyId" in jsonified_request + assert ( + jsonified_request["authorizationPolicyId"] + == request_init["authorization_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["authorizationPolicyId"] = "authorization_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_authorization_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("authorization_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "authorizationPolicyId" in jsonified_request + assert jsonified_request["authorizationPolicyId"] == "authorization_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_authorization_policy(request) + + expected_params = [ + ( + "authorizationPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("authorizationPolicyId",)) + & set( + ( + "parent", + "authorizationPolicyId", + "authorizationPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_authorization_policy.CreateAuthorizationPolicyRequest.pb( + gcn_authorization_policy.CreateAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_authorization_policy.CreateAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_authorization_policy.CreateAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["authorization_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_authorization_policy(request) + + +def test_create_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + authorization_policy_id="authorization_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/authorizationPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_authorization_policy( + gcn_authorization_policy.CreateAuthorizationPolicyRequest(), + parent="parent_value", + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + authorization_policy_id="authorization_policy_id_value", + ) + + +def test_create_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + dict, + ], +) +def test_update_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + request_init["authorization_policy"] = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_authorization_policy_rest_required_fields( + request_type=gcn_authorization_policy.UpdateAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_authorization_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("authorizationPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_authorization_policy.UpdateAuthorizationPolicyRequest.pb( + gcn_authorization_policy.UpdateAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_authorization_policy.UpdateAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_authorization_policy.UpdateAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + request_init["authorization_policy"] = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_authorization_policy(request) + + +def test_update_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{authorization_policy.name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_authorization_policy( + gcn_authorization_policy.UpdateAuthorizationPolicyRequest(), + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + authorization_policy.DeleteAuthorizationPolicyRequest, + dict, + ], +) +def test_delete_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_authorization_policy_rest_required_fields( + request_type=authorization_policy.DeleteAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.DeleteAuthorizationPolicyRequest.pb( + authorization_policy.DeleteAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = authorization_policy.DeleteAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.DeleteAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_authorization_policy(request) + + +def test_delete_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_authorization_policy( + authorization_policy.DeleteAuthorizationPolicyRequest(), + name="name_value", + ) + + +def test_delete_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.ListServerTlsPoliciesRequest, + dict, + ], +) +def test_list_server_tls_policies_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse( + next_page_token="next_page_token_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_server_tls_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListServerTlsPoliciesPager) + assert response.next_page_token == "next_page_token_value" + + +def test_list_server_tls_policies_rest_required_fields( + request_type=server_tls_policy.ListServerTlsPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_server_tls_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_server_tls_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) + ) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_server_tls_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_server_tls_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.list_server_tls_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_server_tls_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_server_tls_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_server_tls_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.ListServerTlsPoliciesRequest.pb( + server_tls_policy.ListServerTlsPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + server_tls_policy.ListServerTlsPoliciesResponse.to_json( + server_tls_policy.ListServerTlsPoliciesResponse() + ) + ) + + request = server_tls_policy.ListServerTlsPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = server_tls_policy.ListServerTlsPoliciesResponse() + + client.list_server_tls_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_list_server_tls_policies_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.ListServerTlsPoliciesRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_server_tls_policies(request) + + +def test_list_server_tls_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.list_server_tls_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/serverTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_list_server_tls_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_server_tls_policies( + server_tls_policy.ListServerTlsPoliciesRequest(), + parent="parent_value", + ) + + +def test_list_server_tls_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + ], + next_page_token="abc", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[], + next_page_token="def", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + ], + next_page_token="ghi", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + server_tls_policy.ListServerTlsPoliciesResponse.to_json(x) for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_server_tls_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, server_tls_policy.ServerTlsPolicy) for i in results) + + pages = list(client.list_server_tls_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.GetServerTlsPolicyRequest, + dict, + ], +) +def test_get_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy( + name="name_value", + description="description_value", + allow_open=True, + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, server_tls_policy.ServerTlsPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.allow_open is True + + +def test_get_server_tls_policy_rest_required_fields( + request_type=server_tls_policy.GetServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.GetServerTlsPolicyRequest.pb( + server_tls_policy.GetServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = server_tls_policy.ServerTlsPolicy.to_json( + server_tls_policy.ServerTlsPolicy() + ) + + request = server_tls_policy.GetServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = server_tls_policy.ServerTlsPolicy() + + client.get_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_server_tls_policy_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.GetServerTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_server_tls_policy(request) + + +def test_get_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_server_tls_policy( + server_tls_policy.GetServerTlsPolicyRequest(), + name="name_value", + ) + + +def test_get_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_server_tls_policy.CreateServerTlsPolicyRequest, + dict, + ], +) +def test_create_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["server_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_server_tls_policy_rest_required_fields( + request_type=gcn_server_tls_policy.CreateServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["server_tls_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "serverTlsPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "serverTlsPolicyId" in jsonified_request + assert ( + jsonified_request["serverTlsPolicyId"] == request_init["server_tls_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["serverTlsPolicyId"] = "server_tls_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_server_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("server_tls_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "serverTlsPolicyId" in jsonified_request + assert jsonified_request["serverTlsPolicyId"] == "server_tls_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_server_tls_policy(request) + + expected_params = [ + ( + "serverTlsPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("serverTlsPolicyId",)) + & set( + ( + "parent", + "serverTlsPolicyId", + "serverTlsPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_server_tls_policy.CreateServerTlsPolicyRequest.pb( + gcn_server_tls_policy.CreateServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_server_tls_policy.CreateServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_server_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_server_tls_policy.CreateServerTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["server_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_server_tls_policy(request) + + +def test_create_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + server_tls_policy_id="server_tls_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/serverTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_server_tls_policy( + gcn_server_tls_policy.CreateServerTlsPolicyRequest(), + parent="parent_value", + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + server_tls_policy_id="server_tls_policy_id_value", + ) + + +def test_create_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + dict, + ], +) +def test_update_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + request_init["server_tls_policy"] = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_server_tls_policy_rest_required_fields( + request_type=gcn_server_tls_policy.UpdateServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_server_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("serverTlsPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_server_tls_policy.UpdateServerTlsPolicyRequest.pb( + gcn_server_tls_policy.UpdateServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_server_tls_policy.UpdateServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_server_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_server_tls_policy.UpdateServerTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + request_init["server_tls_policy"] = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_server_tls_policy(request) + + +def test_update_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{server_tls_policy.name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_server_tls_policy( + gcn_server_tls_policy.UpdateServerTlsPolicyRequest(), + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.DeleteServerTlsPolicyRequest, + dict, + ], +) +def test_delete_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_server_tls_policy_rest_required_fields( + request_type=server_tls_policy.DeleteServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.DeleteServerTlsPolicyRequest.pb( + server_tls_policy.DeleteServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = server_tls_policy.DeleteServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_server_tls_policy_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.DeleteServerTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_server_tls_policy(request) + + +def test_delete_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_server_tls_policy( + server_tls_policy.DeleteServerTlsPolicyRequest(), + name="name_value", + ) + + +def test_delete_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.ListClientTlsPoliciesRequest, + dict, + ], +) +def test_list_client_tls_policies_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse( + next_page_token="next_page_token_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_client_tls_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListClientTlsPoliciesPager) + assert response.next_page_token == "next_page_token_value" + + +def test_list_client_tls_policies_rest_required_fields( + request_type=client_tls_policy.ListClientTlsPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_client_tls_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_client_tls_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) + ) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_client_tls_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_client_tls_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.list_client_tls_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_client_tls_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_client_tls_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_client_tls_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.ListClientTlsPoliciesRequest.pb( + client_tls_policy.ListClientTlsPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + client_tls_policy.ListClientTlsPoliciesResponse.to_json( + client_tls_policy.ListClientTlsPoliciesResponse() + ) + ) + + request = client_tls_policy.ListClientTlsPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = client_tls_policy.ListClientTlsPoliciesResponse() + + client.list_client_tls_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_list_client_tls_policies_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.ListClientTlsPoliciesRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_client_tls_policies(request) + + +def test_list_client_tls_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.list_client_tls_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/clientTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_list_client_tls_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_client_tls_policies( + client_tls_policy.ListClientTlsPoliciesRequest(), + parent="parent_value", + ) + + +def test_list_client_tls_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + ], + next_page_token="abc", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[], + next_page_token="def", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + ], + next_page_token="ghi", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + client_tls_policy.ListClientTlsPoliciesResponse.to_json(x) for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_client_tls_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, client_tls_policy.ClientTlsPolicy) for i in results) + + pages = list(client.list_client_tls_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.GetClientTlsPolicyRequest, + dict, + ], +) +def test_get_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy( + name="name_value", + description="description_value", + sni="sni_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, client_tls_policy.ClientTlsPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.sni == "sni_value" + + +def test_get_client_tls_policy_rest_required_fields( + request_type=client_tls_policy.GetClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.GetClientTlsPolicyRequest.pb( + client_tls_policy.GetClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = client_tls_policy.ClientTlsPolicy.to_json( + client_tls_policy.ClientTlsPolicy() + ) + + request = client_tls_policy.GetClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = client_tls_policy.ClientTlsPolicy() + + client.get_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_client_tls_policy_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.GetClientTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_client_tls_policy(request) + + +def test_get_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_client_tls_policy( + client_tls_policy.GetClientTlsPolicyRequest(), + name="name_value", + ) + + +def test_get_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_client_tls_policy.CreateClientTlsPolicyRequest, + dict, + ], +) +def test_create_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["client_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_client_tls_policy_rest_required_fields( + request_type=gcn_client_tls_policy.CreateClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["client_tls_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "clientTlsPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "clientTlsPolicyId" in jsonified_request + assert ( + jsonified_request["clientTlsPolicyId"] == request_init["client_tls_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["clientTlsPolicyId"] = "client_tls_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_client_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("client_tls_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "clientTlsPolicyId" in jsonified_request + assert jsonified_request["clientTlsPolicyId"] == "client_tls_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_client_tls_policy(request) + + expected_params = [ + ( + "clientTlsPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("clientTlsPolicyId",)) + & set( + ( + "parent", + "clientTlsPolicyId", + "clientTlsPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_client_tls_policy.CreateClientTlsPolicyRequest.pb( + gcn_client_tls_policy.CreateClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_client_tls_policy.CreateClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_client_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_client_tls_policy.CreateClientTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["client_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_client_tls_policy(request) + + +def test_create_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + client_tls_policy_id="client_tls_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=projects/*/locations/*}/clientTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_client_tls_policy( + gcn_client_tls_policy.CreateClientTlsPolicyRequest(), + parent="parent_value", + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + client_tls_policy_id="client_tls_policy_id_value", + ) + + +def test_create_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + dict, + ], +) +def test_update_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + request_init["client_tls_policy"] = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_client_tls_policy_rest_required_fields( + request_type=gcn_client_tls_policy.UpdateClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_client_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("clientTlsPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_client_tls_policy.UpdateClientTlsPolicyRequest.pb( + gcn_client_tls_policy.UpdateClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_client_tls_policy.UpdateClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_client_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_client_tls_policy.UpdateClientTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + request_init["client_tls_policy"] = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_client_tls_policy(request) + + +def test_update_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{client_tls_policy.name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_client_tls_policy( + gcn_client_tls_policy.UpdateClientTlsPolicyRequest(), + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.DeleteClientTlsPolicyRequest, + dict, + ], +) +def test_delete_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_client_tls_policy_rest_required_fields( + request_type=client_tls_policy.DeleteClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.DeleteClientTlsPolicyRequest.pb( + client_tls_policy.DeleteClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = client_tls_policy.DeleteClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_client_tls_policy_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.DeleteClientTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_client_tls_policy(request) + + +def test_delete_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_client_tls_policy( + client_tls_policy.DeleteClientTlsPolicyRequest(), + name="name_value", + ) + + +def test_delete_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = mock.Mock() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = NetworkSecurityClient(transport=transport) + assert client.transport is transport + + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.NetworkSecurityGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + transports.NetworkSecurityRestTransport, + ], +) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, "default") as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "rest", + ], +) +def test_transport_kind(transport_name): + transport = NetworkSecurityClient.get_transport_class(transport_name)( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert transport.kind == transport_name + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.NetworkSecurityGrpcTransport, + ) + + +def test_network_security_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.NetworkSecurityTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json", + ) + + +def test_network_security_base_transport(): + # Instantiate the base transport. + with mock.patch( + "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport.__init__" + ) as Transport: + Transport.return_value = None + transport = transports.NetworkSecurityTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + "list_authorization_policies", + "get_authorization_policy", + "create_authorization_policy", + "update_authorization_policy", + "delete_authorization_policy", + "list_server_tls_policies", + "get_server_tls_policy", + "create_server_tls_policy", + "update_server_tls_policy", + "delete_server_tls_policy", + "list_client_tls_policies", + "get_client_tls_policy", + "create_client_tls_policy", + "update_client_tls_policy", + "delete_client_tls_policy", + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Additionally, the LRO client (a property) should + # also raise NotImplementedError + with pytest.raises(NotImplementedError): + transport.operations_client + + # Catch all for all remaining methods and properties + remainder = [ + "kind", + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_network_security_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch( + "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" + ) as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.NetworkSecurityTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with( + "credentials.json", + scopes=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id="octopus", + ) + + +def test_network_security_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( + "google.cloud.network_security_v1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" + ) as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.NetworkSecurityTransport() + adc.assert_called_once() + + +def test_network_security_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + NetworkSecurityClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + ], +) +def test_network_security_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + transports.NetworkSecurityRestTransport, ], ) def test_network_security_transport_auth_gdch_credentials(transport_class): @@ -5431,11 +10137,40 @@ def test_network_security_grpc_transport_client_cert_source_for_mtls(transport_c ) +def test_network_security_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.NetworkSecurityRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +def test_network_security_rest_lro_client(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.AbstractOperationsClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + @pytest.mark.parametrize( "transport_name", [ "grpc", "grpc_asyncio", + "rest", ], ) def test_network_security_host_no_port(transport_name): @@ -5446,7 +10181,11 @@ def test_network_security_host_no_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("networksecurity.googleapis.com:443") + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) @pytest.mark.parametrize( @@ -5454,6 +10193,7 @@ def test_network_security_host_no_port(transport_name): [ "grpc", "grpc_asyncio", + "rest", ], ) def test_network_security_host_with_port(transport_name): @@ -5464,7 +10204,75 @@ def test_network_security_host_with_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("networksecurity.googleapis.com:8000") + assert client.transport._host == ( + "networksecurity.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com:8000" + ) + + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) +def test_network_security_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = NetworkSecurityClient( + credentials=creds1, + transport=transport_name, + ) + client2 = NetworkSecurityClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.list_authorization_policies._session + session2 = client2.transport.list_authorization_policies._session + assert session1 != session2 + session1 = client1.transport.get_authorization_policy._session + session2 = client2.transport.get_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.create_authorization_policy._session + session2 = client2.transport.create_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.update_authorization_policy._session + session2 = client2.transport.update_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.delete_authorization_policy._session + session2 = client2.transport.delete_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.list_server_tls_policies._session + session2 = client2.transport.list_server_tls_policies._session + assert session1 != session2 + session1 = client1.transport.get_server_tls_policy._session + session2 = client2.transport.get_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.create_server_tls_policy._session + session2 = client2.transport.create_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.update_server_tls_policy._session + session2 = client2.transport.update_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.delete_server_tls_policy._session + session2 = client2.transport.delete_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.list_client_tls_policies._session + session2 = client2.transport.list_client_tls_policies._session + assert session1 != session2 + session1 = client1.transport.get_client_tls_policy._session + session2 = client2.transport.get_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.create_client_tls_policy._session + session2 = client2.transport.create_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.update_client_tls_policy._session + session2 = client2.transport.update_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.delete_client_tls_policy._session + session2 = client2.transport.delete_client_tls_policy._session + assert session1 != session2 def test_network_security_grpc_transport_channel(): @@ -5853,6 +10661,7 @@ async def test_transport_close_async(): def test_transport_close(): transports = { + "rest": "_session", "grpc": "_grpc_channel", } @@ -5870,6 +10679,7 @@ def test_transport_close(): def test_client_ctx(): transports = [ + "rest", "grpc", ] for transport in transports: diff --git a/tests/unit/gapic/network_security_v1beta1/test_network_security.py b/tests/unit/gapic/network_security_v1beta1/test_network_security.py index cb09626..94d396c 100644 --- a/tests/unit/gapic/network_security_v1beta1/test_network_security.py +++ b/tests/unit/gapic/network_security_v1beta1/test_network_security.py @@ -18,10 +18,12 @@ # try/except added for compatibility with python < 3.8 try: from unittest import mock - from unittest.mock import AsyncMock -except ImportError: + from unittest.mock import AsyncMock # pragma: NO COVER +except ImportError: # pragma: NO COVER import mock +from collections.abc import Iterable +import json import math from google.api_core import ( @@ -46,11 +48,15 @@ from google.longrunning import operations_pb2 from google.oauth2 import service_account from google.protobuf import field_mask_pb2 # type: ignore +from google.protobuf import json_format from google.protobuf import timestamp_pb2 # type: ignore import grpc from grpc.experimental import aio +from proto.marshal.rules import wrappers from proto.marshal.rules.dates import DurationRule, TimestampRule import pytest +from requests import PreparedRequest, Request, Response +from requests.sessions import Session from google.cloud.network_security_v1beta1.services.network_security import ( NetworkSecurityAsyncClient, @@ -123,6 +129,7 @@ def test__get_default_mtls_endpoint(): [ (NetworkSecurityClient, "grpc"), (NetworkSecurityAsyncClient, "grpc_asyncio"), + (NetworkSecurityClient, "rest"), ], ) def test_network_security_client_from_service_account_info( @@ -138,7 +145,11 @@ def test_network_security_client_from_service_account_info( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("networksecurity.googleapis.com:443") + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) @pytest.mark.parametrize( @@ -146,6 +157,7 @@ def test_network_security_client_from_service_account_info( [ (transports.NetworkSecurityGrpcTransport, "grpc"), (transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.NetworkSecurityRestTransport, "rest"), ], ) def test_network_security_client_service_account_always_use_jwt( @@ -171,6 +183,7 @@ def test_network_security_client_service_account_always_use_jwt( [ (NetworkSecurityClient, "grpc"), (NetworkSecurityAsyncClient, "grpc_asyncio"), + (NetworkSecurityClient, "rest"), ], ) def test_network_security_client_from_service_account_file( @@ -193,13 +206,18 @@ def test_network_security_client_from_service_account_file( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("networksecurity.googleapis.com:443") + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) def test_network_security_client_get_transport_class(): transport = NetworkSecurityClient.get_transport_class() available_transports = [ transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityRestTransport, ] assert transport in available_transports @@ -216,6 +234,7 @@ def test_network_security_client_get_transport_class(): transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio", ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest"), ], ) @mock.patch.object( @@ -371,6 +390,18 @@ def test_network_security_client_client_options( "grpc_asyncio", "false", ), + ( + NetworkSecurityClient, + transports.NetworkSecurityRestTransport, + "rest", + "true", + ), + ( + NetworkSecurityClient, + transports.NetworkSecurityRestTransport, + "rest", + "false", + ), ], ) @mock.patch.object( @@ -570,6 +601,7 @@ def test_network_security_client_get_mtls_endpoint_and_cert_source(client_class) transports.NetworkSecurityGrpcAsyncIOTransport, "grpc_asyncio", ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest"), ], ) def test_network_security_client_client_options_scopes( @@ -610,6 +642,7 @@ def test_network_security_client_client_options_scopes( "grpc_asyncio", grpc_helpers_async, ), + (NetworkSecurityClient, transports.NetworkSecurityRestTransport, "rest", None), ], ) def test_network_security_client_client_options_credentials_file( @@ -5095,347 +5128,5020 @@ async def test_delete_client_tls_policy_flattened_error_async(): ) -def test_credentials_transport_error(): - # It is an error to provide credentials and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( +@pytest.mark.parametrize( + "request_type", + [ + authorization_policy.ListAuthorizationPoliciesRequest, + dict, + ], +) +def test_list_authorization_policies_rest(request_type): + client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, - ) - # It is an error to provide a credentials file and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options={"credentials_file": "credentials.json"}, - transport=transport, - ) + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) - # It is an error to provide an api_key and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options=options, - transport=transport, + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse( + next_page_token="next_page_token_value", ) - # It is an error to provide an api_key and a credential. - options = mock.Mock() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options=options, credentials=ga_credentials.AnonymousCredentials() + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value ) + json_return_value = json_format.MessageToJson(pb_return_value) - # It is an error to provide scopes and a transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = NetworkSecurityClient( - client_options={"scopes": ["1", "2"]}, - transport=transport, - ) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_authorization_policies(request) + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListAuthorizationPoliciesPager) + assert response.next_page_token == "next_page_token_value" -def test_transport_instance(): - # A client may be instantiated with a custom transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - client = NetworkSecurityClient(transport=transport) - assert client.transport is transport +def test_list_authorization_policies_rest_required_fields( + request_type=authorization_policy.ListAuthorizationPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport -def test_transport_get_channel(): - # A client may be instantiated with a custom transport instance. - transport = transports.NetworkSecurityGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) ) - channel = transport.grpc_channel - assert channel - transport = transports.NetworkSecurityGrpcAsyncIOTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - channel = transport.grpc_channel - assert channel + # verify fields with default values are dropped + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_authorization_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_transport_adc(transport_class): - # Test default credentials are used if not provided. - with mock.patch.object(google.auth, "default") as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class() - adc.assert_called_once() + # verify required fields with default values are now present + jsonified_request["parent"] = "parent_value" -@pytest.mark.parametrize( - "transport_name", - [ - "grpc", - ], -) -def test_transport_kind(transport_name): - transport = NetworkSecurityClient.get_transport_class(transport_name)( - credentials=ga_credentials.AnonymousCredentials(), + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_authorization_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) ) - assert transport.kind == transport_name + jsonified_request.update(unset_fields) + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" -def test_transport_grpc_default(): - # A client should use the gRPC transport by default. client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_authorization_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_authorization_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials ) - assert isinstance( - client.transport, - transports.NetworkSecurityGrpcTransport, + + unset_fields = transport.list_authorization_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) ) -def test_network_security_base_transport_error(): - # Passing both a credentials object and credentials_file should raise an error - with pytest.raises(core_exceptions.DuplicateCredentialArgs): - transport = transports.NetworkSecurityTransport( - credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json", +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_authorization_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_authorization_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_authorization_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.ListAuthorizationPoliciesRequest.pb( + authorization_policy.ListAuthorizationPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + authorization_policy.ListAuthorizationPoliciesResponse.to_json( + authorization_policy.ListAuthorizationPoliciesResponse() + ) ) + request = authorization_policy.ListAuthorizationPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = authorization_policy.ListAuthorizationPoliciesResponse() -def test_network_security_base_transport(): - # Instantiate the base transport. - with mock.patch( - "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport.__init__" - ) as Transport: - Transport.return_value = None - transport = transports.NetworkSecurityTransport( - credentials=ga_credentials.AnonymousCredentials(), + client.list_authorization_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], ) - # Every method on the transport should just blindly - # raise NotImplementedError. - methods = ( - "list_authorization_policies", - "get_authorization_policy", - "create_authorization_policy", - "update_authorization_policy", - "delete_authorization_policy", - "list_server_tls_policies", - "get_server_tls_policy", - "create_server_tls_policy", - "update_server_tls_policy", - "delete_server_tls_policy", - "list_client_tls_policies", - "get_client_tls_policy", - "create_client_tls_policy", - "update_client_tls_policy", - "delete_client_tls_policy", - "set_iam_policy", - "get_iam_policy", - "test_iam_permissions", - "get_location", - "list_locations", - "get_operation", - "cancel_operation", - "delete_operation", - "list_operations", + pre.assert_called_once() + post.assert_called_once() + + +def test_list_authorization_policies_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.ListAuthorizationPoliciesRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, ) - for method in methods: - with pytest.raises(NotImplementedError): - getattr(transport, method)(request=object()) - with pytest.raises(NotImplementedError): - transport.close() + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) - # Additionally, the LRO client (a property) should - # also raise NotImplementedError - with pytest.raises(NotImplementedError): - transport.operations_client + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_authorization_policies(request) - # Catch all for all remaining methods and properties - remainder = [ - "kind", - ] - for r in remainder: - with pytest.raises(NotImplementedError): - getattr(transport, r)() +def test_list_authorization_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) -def test_network_security_base_transport_with_credentials_file(): - # Instantiate the base transport with a credentials file - with mock.patch.object( - google.auth, "load_credentials_from_file", autospec=True - ) as load_creds, mock.patch( - "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" - ) as Transport: - Transport.return_value = None - load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.NetworkSecurityTransport( - credentials_file="credentials.json", - quota_project_id="octopus", - ) - load_creds.assert_called_once_with( - "credentials.json", - scopes=None, - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id="octopus", - ) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.ListAuthorizationPoliciesResponse() + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} -def test_network_security_base_transport_with_adc(): - # Test the default credentials are used if credentials and credentials_file are None. - with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( - "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" - ) as Transport: - Transport.return_value = None - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport = transports.NetworkSecurityTransport() - adc.assert_called_once() + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.ListAuthorizationPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value -def test_network_security_auth_adc(): - # If no credentials are provided, we should use ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - NetworkSecurityClient() - adc.assert_called_once_with( - scopes=None, - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id=None, + client.list_authorization_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/authorizationPolicies" + % client.transport._host, + args[1], ) -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_network_security_transport_auth_adc(transport_class): - # If credentials and host are not provided, the transport class should use - # ADC credentials. - with mock.patch.object(google.auth, "default", autospec=True) as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class(quota_project_id="octopus", scopes=["1", "2"]) - adc.assert_called_once_with( - scopes=["1", "2"], - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - quota_project_id="octopus", +def test_list_authorization_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_authorization_policies( + authorization_policy.ListAuthorizationPoliciesRequest(), + parent="parent_value", ) -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_network_security_transport_auth_gdch_credentials(transport_class): - host = "https://language.com" - api_audience_tests = [None, "https://language2.com"] - api_audience_expect = [host, "https://language2.com"] - for t, e in zip(api_audience_tests, api_audience_expect): - with mock.patch.object(google.auth, "default", autospec=True) as adc: - gdch_mock = mock.MagicMock() - type(gdch_mock).with_gdch_audience = mock.PropertyMock( - return_value=gdch_mock - ) - adc.return_value = (gdch_mock, None) - transport_class(host=host, api_audience=t) - gdch_mock.with_gdch_audience.assert_called_once_with(e) +def test_list_authorization_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + ], + next_page_token="abc", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[], + next_page_token="def", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + ], + next_page_token="ghi", + ), + authorization_policy.ListAuthorizationPoliciesResponse( + authorization_policies=[ + authorization_policy.AuthorizationPolicy(), + authorization_policy.AuthorizationPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + authorization_policy.ListAuthorizationPoliciesResponse.to_json(x) + for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_authorization_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all( + isinstance(i, authorization_policy.AuthorizationPolicy) for i in results + ) + + pages = list(client.list_authorization_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token @pytest.mark.parametrize( - "transport_class,grpc_helpers", + "request_type", [ - (transports.NetworkSecurityGrpcTransport, grpc_helpers), - (transports.NetworkSecurityGrpcAsyncIOTransport, grpc_helpers_async), + authorization_policy.GetAuthorizationPolicyRequest, + dict, ], ) -def test_network_security_transport_create_channel(transport_class, grpc_helpers): - # If credentials and host are not provided, the transport class should use - # ADC credentials. +def test_get_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy( + name="name_value", + description="description_value", + action=authorization_policy.AuthorizationPolicy.Action.ALLOW, + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, authorization_policy.AuthorizationPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.action == authorization_policy.AuthorizationPolicy.Action.ALLOW + + +def test_get_authorization_policy_rest_required_fields( + request_type=authorization_policy.GetAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) with mock.patch.object( - google.auth, "default", autospec=True - ) as adc, mock.patch.object( - grpc_helpers, "create_channel", autospec=True - ) as create_channel: - creds = ga_credentials.AnonymousCredentials() - adc.return_value = (creds, None) - transport_class(quota_project_id="octopus", scopes=["1", "2"]) + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.GetAuthorizationPolicyRequest.pb( + authorization_policy.GetAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = authorization_policy.AuthorizationPolicy.to_json( + authorization_policy.AuthorizationPolicy() + ) - create_channel.assert_called_with( - "networksecurity.googleapis.com:443", - credentials=creds, - credentials_file=None, - quota_project_id="octopus", - default_scopes=("https://www.googleapis.com/auth/cloud-platform",), - scopes=["1", "2"], - default_host="networksecurity.googleapis.com", - ssl_credentials=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), + request = authorization_policy.GetAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = authorization_policy.AuthorizationPolicy() + + client.get_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), ], ) + pre.assert_called_once() + post.assert_called_once() + + +def test_get_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.GetAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_authorization_policy(request) + + +def test_get_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = authorization_policy.AuthorizationPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = authorization_policy.AuthorizationPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_authorization_policy( + authorization_policy.GetAuthorizationPolicyRequest(), + name="name_value", + ) + + +def test_get_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + @pytest.mark.parametrize( - "transport_class", + "request_type", [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, + gcn_authorization_policy.CreateAuthorizationPolicyRequest, + dict, ], ) -def test_network_security_grpc_transport_client_cert_source_for_mtls(transport_class): - cred = ga_credentials.AnonymousCredentials() +def test_create_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["authorization_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) - # Check ssl_channel_credentials is used if provided. - with mock.patch.object(transport_class, "create_channel") as mock_create_channel: - mock_ssl_channel_creds = mock.Mock() - transport_class( - host="squid.clam.whelk", - credentials=cred, - ssl_channel_credentials=mock_ssl_channel_creds, - ) - mock_create_channel.assert_called_once_with( - "squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_channel_creds, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") - # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls - # is used. - with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): - with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: - transport_class( - credentials=cred, + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_authorization_policy_rest_required_fields( + request_type=gcn_authorization_policy.CreateAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["authorization_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "authorizationPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "authorizationPolicyId" in jsonified_request + assert ( + jsonified_request["authorizationPolicyId"] + == request_init["authorization_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["authorizationPolicyId"] = "authorization_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_authorization_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("authorization_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "authorizationPolicyId" in jsonified_request + assert jsonified_request["authorizationPolicyId"] == "authorization_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_authorization_policy(request) + + expected_params = [ + ( + "authorizationPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("authorizationPolicyId",)) + & set( + ( + "parent", + "authorizationPolicyId", + "authorizationPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_authorization_policy.CreateAuthorizationPolicyRequest.pb( + gcn_authorization_policy.CreateAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_authorization_policy.CreateAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_authorization_policy.CreateAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["authorization_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_authorization_policy(request) + + +def test_create_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + authorization_policy_id="authorization_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/authorizationPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_authorization_policy( + gcn_authorization_policy.CreateAuthorizationPolicyRequest(), + parent="parent_value", + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + authorization_policy_id="authorization_policy_id_value", + ) + + +def test_create_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_authorization_policy.UpdateAuthorizationPolicyRequest, + dict, + ], +) +def test_update_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + request_init["authorization_policy"] = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_authorization_policy_rest_required_fields( + request_type=gcn_authorization_policy.UpdateAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_authorization_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("authorizationPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_authorization_policy.UpdateAuthorizationPolicyRequest.pb( + gcn_authorization_policy.UpdateAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_authorization_policy.UpdateAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_authorization_policy.UpdateAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + request_init["authorization_policy"] = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "action": 1, + "rules": [ + { + "sources": [ + { + "principals": ["principals_value1", "principals_value2"], + "ip_blocks": ["ip_blocks_value1", "ip_blocks_value2"], + } + ], + "destinations": [ + { + "hosts": ["hosts_value1", "hosts_value2"], + "ports": [569, 570], + "methods": ["methods_value1", "methods_value2"], + "http_header_match": { + "regex_match": "regex_match_value", + "header_name": "header_name_value", + }, + } + ], + } + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_authorization_policy(request) + + +def test_update_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "authorization_policy": { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{authorization_policy.name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_authorization_policy( + gcn_authorization_policy.UpdateAuthorizationPolicyRequest(), + authorization_policy=gcn_authorization_policy.AuthorizationPolicy( + name="name_value" + ), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + authorization_policy.DeleteAuthorizationPolicyRequest, + dict, + ], +) +def test_delete_authorization_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_authorization_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_authorization_policy_rest_required_fields( + request_type=authorization_policy.DeleteAuthorizationPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_authorization_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_authorization_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_authorization_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_authorization_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_authorization_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_authorization_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_authorization_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = authorization_policy.DeleteAuthorizationPolicyRequest.pb( + authorization_policy.DeleteAuthorizationPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = authorization_policy.DeleteAuthorizationPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_authorization_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_authorization_policy_rest_bad_request( + transport: str = "rest", + request_type=authorization_policy.DeleteAuthorizationPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_authorization_policy(request) + + +def test_delete_authorization_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_authorization_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/authorizationPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_authorization_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_authorization_policy( + authorization_policy.DeleteAuthorizationPolicyRequest(), + name="name_value", + ) + + +def test_delete_authorization_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.ListServerTlsPoliciesRequest, + dict, + ], +) +def test_list_server_tls_policies_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse( + next_page_token="next_page_token_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_server_tls_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListServerTlsPoliciesPager) + assert response.next_page_token == "next_page_token_value" + + +def test_list_server_tls_policies_rest_required_fields( + request_type=server_tls_policy.ListServerTlsPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_server_tls_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_server_tls_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) + ) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_server_tls_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_server_tls_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.list_server_tls_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_server_tls_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_server_tls_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_server_tls_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.ListServerTlsPoliciesRequest.pb( + server_tls_policy.ListServerTlsPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + server_tls_policy.ListServerTlsPoliciesResponse.to_json( + server_tls_policy.ListServerTlsPoliciesResponse() + ) + ) + + request = server_tls_policy.ListServerTlsPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = server_tls_policy.ListServerTlsPoliciesResponse() + + client.list_server_tls_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_list_server_tls_policies_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.ListServerTlsPoliciesRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_server_tls_policies(request) + + +def test_list_server_tls_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ListServerTlsPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ListServerTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.list_server_tls_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/serverTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_list_server_tls_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_server_tls_policies( + server_tls_policy.ListServerTlsPoliciesRequest(), + parent="parent_value", + ) + + +def test_list_server_tls_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + ], + next_page_token="abc", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[], + next_page_token="def", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + ], + next_page_token="ghi", + ), + server_tls_policy.ListServerTlsPoliciesResponse( + server_tls_policies=[ + server_tls_policy.ServerTlsPolicy(), + server_tls_policy.ServerTlsPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + server_tls_policy.ListServerTlsPoliciesResponse.to_json(x) for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_server_tls_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, server_tls_policy.ServerTlsPolicy) for i in results) + + pages = list(client.list_server_tls_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.GetServerTlsPolicyRequest, + dict, + ], +) +def test_get_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy( + name="name_value", + description="description_value", + allow_open=True, + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, server_tls_policy.ServerTlsPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.allow_open is True + + +def test_get_server_tls_policy_rest_required_fields( + request_type=server_tls_policy.GetServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.GetServerTlsPolicyRequest.pb( + server_tls_policy.GetServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = server_tls_policy.ServerTlsPolicy.to_json( + server_tls_policy.ServerTlsPolicy() + ) + + request = server_tls_policy.GetServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = server_tls_policy.ServerTlsPolicy() + + client.get_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_server_tls_policy_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.GetServerTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_server_tls_policy(request) + + +def test_get_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = server_tls_policy.ServerTlsPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = server_tls_policy.ServerTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_server_tls_policy( + server_tls_policy.GetServerTlsPolicyRequest(), + name="name_value", + ) + + +def test_get_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_server_tls_policy.CreateServerTlsPolicyRequest, + dict, + ], +) +def test_create_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["server_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_server_tls_policy_rest_required_fields( + request_type=gcn_server_tls_policy.CreateServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["server_tls_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "serverTlsPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "serverTlsPolicyId" in jsonified_request + assert ( + jsonified_request["serverTlsPolicyId"] == request_init["server_tls_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["serverTlsPolicyId"] = "server_tls_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_server_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("server_tls_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "serverTlsPolicyId" in jsonified_request + assert jsonified_request["serverTlsPolicyId"] == "server_tls_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_server_tls_policy(request) + + expected_params = [ + ( + "serverTlsPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("serverTlsPolicyId",)) + & set( + ( + "parent", + "serverTlsPolicyId", + "serverTlsPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_server_tls_policy.CreateServerTlsPolicyRequest.pb( + gcn_server_tls_policy.CreateServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_server_tls_policy.CreateServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_server_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_server_tls_policy.CreateServerTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["server_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_server_tls_policy(request) + + +def test_create_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + server_tls_policy_id="server_tls_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/serverTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_server_tls_policy( + gcn_server_tls_policy.CreateServerTlsPolicyRequest(), + parent="parent_value", + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + server_tls_policy_id="server_tls_policy_id_value", + ) + + +def test_create_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_server_tls_policy.UpdateServerTlsPolicyRequest, + dict, + ], +) +def test_update_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + request_init["server_tls_policy"] = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_server_tls_policy_rest_required_fields( + request_type=gcn_server_tls_policy.UpdateServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_server_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("serverTlsPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_server_tls_policy.UpdateServerTlsPolicyRequest.pb( + gcn_server_tls_policy.UpdateServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_server_tls_policy.UpdateServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_server_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_server_tls_policy.UpdateServerTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + request_init["server_tls_policy"] = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "allow_open": True, + "server_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "mtls_policy": { + "client_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ] + }, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_server_tls_policy(request) + + +def test_update_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "server_tls_policy": { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{server_tls_policy.name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_server_tls_policy( + gcn_server_tls_policy.UpdateServerTlsPolicyRequest(), + server_tls_policy=gcn_server_tls_policy.ServerTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + server_tls_policy.DeleteServerTlsPolicyRequest, + dict, + ], +) +def test_delete_server_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_server_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_server_tls_policy_rest_required_fields( + request_type=server_tls_policy.DeleteServerTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_server_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_server_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_server_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_server_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_server_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_server_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_server_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = server_tls_policy.DeleteServerTlsPolicyRequest.pb( + server_tls_policy.DeleteServerTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = server_tls_policy.DeleteServerTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_server_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_server_tls_policy_rest_bad_request( + transport: str = "rest", request_type=server_tls_policy.DeleteServerTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_server_tls_policy(request) + + +def test_delete_server_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/serverTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_server_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/serverTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_server_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_server_tls_policy( + server_tls_policy.DeleteServerTlsPolicyRequest(), + name="name_value", + ) + + +def test_delete_server_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.ListClientTlsPoliciesRequest, + dict, + ], +) +def test_list_client_tls_policies_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse( + next_page_token="next_page_token_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_client_tls_policies(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListClientTlsPoliciesPager) + assert response.next_page_token == "next_page_token_value" + + +def test_list_client_tls_policies_rest_required_fields( + request_type=client_tls_policy.ListClientTlsPoliciesRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_client_tls_policies._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_client_tls_policies._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "page_size", + "page_token", + ) + ) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_client_tls_policies(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_client_tls_policies_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.list_client_tls_policies._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_client_tls_policies_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_list_client_tls_policies" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_list_client_tls_policies" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.ListClientTlsPoliciesRequest.pb( + client_tls_policy.ListClientTlsPoliciesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + client_tls_policy.ListClientTlsPoliciesResponse.to_json( + client_tls_policy.ListClientTlsPoliciesResponse() + ) + ) + + request = client_tls_policy.ListClientTlsPoliciesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = client_tls_policy.ListClientTlsPoliciesResponse() + + client.list_client_tls_policies( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_list_client_tls_policies_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.ListClientTlsPoliciesRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_client_tls_policies(request) + + +def test_list_client_tls_policies_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ListClientTlsPoliciesResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ListClientTlsPoliciesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.list_client_tls_policies(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/clientTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_list_client_tls_policies_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_client_tls_policies( + client_tls_policy.ListClientTlsPoliciesRequest(), + parent="parent_value", + ) + + +def test_list_client_tls_policies_rest_pager(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + ], + next_page_token="abc", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[], + next_page_token="def", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + ], + next_page_token="ghi", + ), + client_tls_policy.ListClientTlsPoliciesResponse( + client_tls_policies=[ + client_tls_policy.ClientTlsPolicy(), + client_tls_policy.ClientTlsPolicy(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + client_tls_policy.ListClientTlsPoliciesResponse.to_json(x) for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "projects/sample1/locations/sample2"} + + pager = client.list_client_tls_policies(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, client_tls_policy.ClientTlsPolicy) for i in results) + + pages = list(client.list_client_tls_policies(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.GetClientTlsPolicyRequest, + dict, + ], +) +def test_get_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy( + name="name_value", + description="description_value", + sni="sni_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, client_tls_policy.ClientTlsPolicy) + assert response.name == "name_value" + assert response.description == "description_value" + assert response.sni == "sni_value" + + +def test_get_client_tls_policy_rest_required_fields( + request_type=client_tls_policy.GetClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_get_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_get_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.GetClientTlsPolicyRequest.pb( + client_tls_policy.GetClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = client_tls_policy.ClientTlsPolicy.to_json( + client_tls_policy.ClientTlsPolicy() + ) + + request = client_tls_policy.GetClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = client_tls_policy.ClientTlsPolicy() + + client.get_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_client_tls_policy_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.GetClientTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_client_tls_policy(request) + + +def test_get_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = client_tls_policy.ClientTlsPolicy() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = client_tls_policy.ClientTlsPolicy.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_get_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_client_tls_policy( + client_tls_policy.GetClientTlsPolicyRequest(), + name="name_value", + ) + + +def test_get_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_client_tls_policy.CreateClientTlsPolicyRequest, + dict, + ], +) +def test_create_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["client_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_client_tls_policy_rest_required_fields( + request_type=gcn_client_tls_policy.CreateClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["parent"] = "" + request_init["client_tls_policy_id"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + assert "clientTlsPolicyId" not in jsonified_request + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + assert "clientTlsPolicyId" in jsonified_request + assert ( + jsonified_request["clientTlsPolicyId"] == request_init["client_tls_policy_id"] + ) + + jsonified_request["parent"] = "parent_value" + jsonified_request["clientTlsPolicyId"] = "client_tls_policy_id_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_client_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("client_tls_policy_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + assert "clientTlsPolicyId" in jsonified_request + assert jsonified_request["clientTlsPolicyId"] == "client_tls_policy_id_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_client_tls_policy(request) + + expected_params = [ + ( + "clientTlsPolicyId", + "", + ), + ] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("clientTlsPolicyId",)) + & set( + ( + "parent", + "clientTlsPolicyId", + "clientTlsPolicy", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_create_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_create_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_client_tls_policy.CreateClientTlsPolicyRequest.pb( + gcn_client_tls_policy.CreateClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_client_tls_policy.CreateClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_client_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_client_tls_policy.CreateClientTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "projects/sample1/locations/sample2"} + request_init["client_tls_policy"] = { + "name": "name_value", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_client_tls_policy(request) + + +def test_create_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "projects/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + client_tls_policy_id="client_tls_policy_id_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=projects/*/locations/*}/clientTlsPolicies" + % client.transport._host, + args[1], + ) + + +def test_create_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_client_tls_policy( + gcn_client_tls_policy.CreateClientTlsPolicyRequest(), + parent="parent_value", + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + client_tls_policy_id="client_tls_policy_id_value", + ) + + +def test_create_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + gcn_client_tls_policy.UpdateClientTlsPolicyRequest, + dict, + ], +) +def test_update_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + request_init["client_tls_policy"] = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_update_client_tls_policy_rest_required_fields( + request_type=gcn_client_tls_policy.UpdateClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_client_tls_policy._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(("updateMask",)) & set(("clientTlsPolicy",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_update_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_update_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = gcn_client_tls_policy.UpdateClientTlsPolicyRequest.pb( + gcn_client_tls_policy.UpdateClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = gcn_client_tls_policy.UpdateClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.update_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_client_tls_policy_rest_bad_request( + transport: str = "rest", + request_type=gcn_client_tls_policy.UpdateClientTlsPolicyRequest, +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + request_init["client_tls_policy"] = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3", + "description": "description_value", + "create_time": {"seconds": 751, "nanos": 543}, + "update_time": {}, + "labels": {}, + "sni": "sni_value", + "client_certificate": { + "grpc_endpoint": {"target_uri": "target_uri_value"}, + "certificate_provider_instance": { + "plugin_instance": "plugin_instance_value" + }, + }, + "server_validation_ca": [ + {"grpc_endpoint": {}, "certificate_provider_instance": {}} + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_client_tls_policy(request) + + +def test_update_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "client_tls_policy": { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{client_tls_policy.name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_update_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_client_tls_policy( + gcn_client_tls_policy.UpdateClientTlsPolicyRequest(), + client_tls_policy=gcn_client_tls_policy.ClientTlsPolicy(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + client_tls_policy.DeleteClientTlsPolicyRequest, + dict, + ], +) +def test_delete_client_tls_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_client_tls_policy(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_delete_client_tls_policy_rest_required_fields( + request_type=client_tls_policy.DeleteClientTlsPolicyRequest, +): + transport_class = transports.NetworkSecurityRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_client_tls_policy._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_client_tls_policy(request) + + expected_params = [] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_client_tls_policy_rest_unset_required_fields(): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_client_tls_policy._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_client_tls_policy_rest_interceptors(null_interceptor): + transport = transports.NetworkSecurityRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.NetworkSecurityRestInterceptor(), + ) + client = NetworkSecurityClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.NetworkSecurityRestInterceptor, "post_delete_client_tls_policy" + ) as post, mock.patch.object( + transports.NetworkSecurityRestInterceptor, "pre_delete_client_tls_policy" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = client_tls_policy.DeleteClientTlsPolicyRequest.pb( + client_tls_policy.DeleteClientTlsPolicyRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = client_tls_policy.DeleteClientTlsPolicyRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.delete_client_tls_policy( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_delete_client_tls_policy_rest_bad_request( + transport: str = "rest", request_type=client_tls_policy.DeleteClientTlsPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_client_tls_policy(request) + + +def test_delete_client_tls_policy_rest_flattened(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "projects/sample1/locations/sample2/clientTlsPolicies/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_client_tls_policy(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=projects/*/locations/*/clientTlsPolicies/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_client_tls_policy_rest_flattened_error(transport: str = "rest"): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_client_tls_policy( + client_tls_policy.DeleteClientTlsPolicyRequest(), + name="name_value", + ) + + +def test_delete_client_tls_policy_rest_error(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = mock.Mock() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = NetworkSecurityClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = NetworkSecurityClient(transport=transport) + assert client.transport is transport + + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.NetworkSecurityGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.NetworkSecurityGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + transports.NetworkSecurityRestTransport, + ], +) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, "default") as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "rest", + ], +) +def test_transport_kind(transport_name): + transport = NetworkSecurityClient.get_transport_class(transport_name)( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert transport.kind == transport_name + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.NetworkSecurityGrpcTransport, + ) + + +def test_network_security_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.NetworkSecurityTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json", + ) + + +def test_network_security_base_transport(): + # Instantiate the base transport. + with mock.patch( + "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport.__init__" + ) as Transport: + Transport.return_value = None + transport = transports.NetworkSecurityTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + "list_authorization_policies", + "get_authorization_policy", + "create_authorization_policy", + "update_authorization_policy", + "delete_authorization_policy", + "list_server_tls_policies", + "get_server_tls_policy", + "create_server_tls_policy", + "update_server_tls_policy", + "delete_server_tls_policy", + "list_client_tls_policies", + "get_client_tls_policy", + "create_client_tls_policy", + "update_client_tls_policy", + "delete_client_tls_policy", + "set_iam_policy", + "get_iam_policy", + "test_iam_permissions", + "get_location", + "list_locations", + "get_operation", + "cancel_operation", + "delete_operation", + "list_operations", + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Additionally, the LRO client (a property) should + # also raise NotImplementedError + with pytest.raises(NotImplementedError): + transport.operations_client + + # Catch all for all remaining methods and properties + remainder = [ + "kind", + ] + for r in remainder: + with pytest.raises(NotImplementedError): + getattr(transport, r)() + + +def test_network_security_base_transport_with_credentials_file(): + # Instantiate the base transport with a credentials file + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch( + "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" + ) as Transport: + Transport.return_value = None + load_creds.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.NetworkSecurityTransport( + credentials_file="credentials.json", + quota_project_id="octopus", + ) + load_creds.assert_called_once_with( + "credentials.json", + scopes=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id="octopus", + ) + + +def test_network_security_base_transport_with_adc(): + # Test the default credentials are used if credentials and credentials_file are None. + with mock.patch.object(google.auth, "default", autospec=True) as adc, mock.patch( + "google.cloud.network_security_v1beta1.services.network_security.transports.NetworkSecurityTransport._prep_wrapped_messages" + ) as Transport: + Transport.return_value = None + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport = transports.NetworkSecurityTransport() + adc.assert_called_once() + + +def test_network_security_auth_adc(): + # If no credentials are provided, we should use ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + NetworkSecurityClient() + adc.assert_called_once_with( + scopes=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id=None, + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + ], +) +def test_network_security_transport_auth_adc(transport_class): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object(google.auth, "default", autospec=True) as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + adc.assert_called_once_with( + scopes=["1", "2"], + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + quota_project_id="octopus", + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + transports.NetworkSecurityRestTransport, + ], +) +def test_network_security_transport_auth_gdch_credentials(transport_class): + host = "https://language.com" + api_audience_tests = [None, "https://language2.com"] + api_audience_expect = [host, "https://language2.com"] + for t, e in zip(api_audience_tests, api_audience_expect): + with mock.patch.object(google.auth, "default", autospec=True) as adc: + gdch_mock = mock.MagicMock() + type(gdch_mock).with_gdch_audience = mock.PropertyMock( + return_value=gdch_mock + ) + adc.return_value = (gdch_mock, None) + transport_class(host=host, api_audience=t) + gdch_mock.with_gdch_audience.assert_called_once_with(e) + + +@pytest.mark.parametrize( + "transport_class,grpc_helpers", + [ + (transports.NetworkSecurityGrpcTransport, grpc_helpers), + (transports.NetworkSecurityGrpcAsyncIOTransport, grpc_helpers_async), + ], +) +def test_network_security_transport_create_channel(transport_class, grpc_helpers): + # If credentials and host are not provided, the transport class should use + # ADC credentials. + with mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel", autospec=True + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + adc.return_value = (creds, None) + transport_class(quota_project_id="octopus", scopes=["1", "2"]) + + create_channel.assert_called_with( + "networksecurity.googleapis.com:443", + credentials=creds, + credentials_file=None, + quota_project_id="octopus", + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + scopes=["1", "2"], + default_host="networksecurity.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + ], +) +def test_network_security_grpc_transport_client_cert_source_for_mtls(transport_class): + cred = ga_credentials.AnonymousCredentials() + + # Check ssl_channel_credentials is used if provided. + with mock.patch.object(transport_class, "create_channel") as mock_create_channel: + mock_ssl_channel_creds = mock.Mock() + transport_class( + host="squid.clam.whelk", + credentials=cred, + ssl_channel_credentials=mock_ssl_channel_creds, + ) + mock_create_channel.assert_called_once_with( + "squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_channel_creds, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + # Check if ssl_channel_credentials is not provided, then client_cert_source_for_mtls + # is used. + with mock.patch.object(transport_class, "create_channel", return_value=mock.Mock()): + with mock.patch("grpc.ssl_channel_credentials") as mock_ssl_cred: + transport_class( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback, ) expected_cert, expected_key = client_cert_source_callback() @@ -5444,424 +10150,1061 @@ def test_network_security_grpc_transport_client_cert_source_for_mtls(transport_c ) -@pytest.mark.parametrize( - "transport_name", - [ - "grpc", - "grpc_asyncio", - ], -) -def test_network_security_host_no_port(transport_name): +def test_network_security_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.NetworkSecurityRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +def test_network_security_rest_lro_client(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.AbstractOperationsClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) +def test_network_security_host_no_port(transport_name): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions( + api_endpoint="networksecurity.googleapis.com" + ), + transport=transport_name, + ) + assert client.transport._host == ( + "networksecurity.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com" + ) + + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "grpc_asyncio", + "rest", + ], +) +def test_network_security_host_with_port(transport_name): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + client_options=client_options.ClientOptions( + api_endpoint="networksecurity.googleapis.com:8000" + ), + transport=transport_name, + ) + assert client.transport._host == ( + "networksecurity.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://networksecurity.googleapis.com:8000" + ) + + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) +def test_network_security_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = NetworkSecurityClient( + credentials=creds1, + transport=transport_name, + ) + client2 = NetworkSecurityClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.list_authorization_policies._session + session2 = client2.transport.list_authorization_policies._session + assert session1 != session2 + session1 = client1.transport.get_authorization_policy._session + session2 = client2.transport.get_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.create_authorization_policy._session + session2 = client2.transport.create_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.update_authorization_policy._session + session2 = client2.transport.update_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.delete_authorization_policy._session + session2 = client2.transport.delete_authorization_policy._session + assert session1 != session2 + session1 = client1.transport.list_server_tls_policies._session + session2 = client2.transport.list_server_tls_policies._session + assert session1 != session2 + session1 = client1.transport.get_server_tls_policy._session + session2 = client2.transport.get_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.create_server_tls_policy._session + session2 = client2.transport.create_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.update_server_tls_policy._session + session2 = client2.transport.update_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.delete_server_tls_policy._session + session2 = client2.transport.delete_server_tls_policy._session + assert session1 != session2 + session1 = client1.transport.list_client_tls_policies._session + session2 = client2.transport.list_client_tls_policies._session + assert session1 != session2 + session1 = client1.transport.get_client_tls_policy._session + session2 = client2.transport.get_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.create_client_tls_policy._session + session2 = client2.transport.create_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.update_client_tls_policy._session + session2 = client2.transport.update_client_tls_policy._session + assert session1 != session2 + session1 = client1.transport.delete_client_tls_policy._session + session2 = client2.transport.delete_client_tls_policy._session + assert session1 != session2 + + +def test_network_security_grpc_transport_channel(): + channel = grpc.secure_channel("http://localhost/", grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.NetworkSecurityGrpcTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +def test_network_security_grpc_asyncio_transport_channel(): + channel = aio.secure_channel("http://localhost/", grpc.local_channel_credentials()) + + # Check that channel is used if provided. + transport = transports.NetworkSecurityGrpcAsyncIOTransport( + host="squid.clam.whelk", + channel=channel, + ) + assert transport.grpc_channel == channel + assert transport._host == "squid.clam.whelk:443" + assert transport._ssl_channel_credentials == None + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + ], +) +def test_network_security_transport_channel_mtls_with_client_cert_source( + transport_class, +): + with mock.patch( + "grpc.ssl_channel_credentials", autospec=True + ) as grpc_ssl_channel_cred: + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: + mock_ssl_cred = mock.Mock() + grpc_ssl_channel_cred.return_value = mock_ssl_cred + + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + + cred = ga_credentials.AnonymousCredentials() + with pytest.warns(DeprecationWarning): + with mock.patch.object(google.auth, "default") as adc: + adc.return_value = (cred, None) + transport = transport_class( + host="squid.clam.whelk", + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=client_cert_source_callback, + ) + adc.assert_called_once() + + grpc_ssl_channel_cred.assert_called_once_with( + certificate_chain=b"cert bytes", private_key=b"key bytes" + ) + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + assert transport._ssl_channel_credentials == mock_ssl_cred + + +# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are +# removed from grpc/grpc_asyncio transport constructor. +@pytest.mark.parametrize( + "transport_class", + [ + transports.NetworkSecurityGrpcTransport, + transports.NetworkSecurityGrpcAsyncIOTransport, + ], +) +def test_network_security_transport_channel_mtls_with_adc(transport_class): + mock_ssl_cred = mock.Mock() + with mock.patch.multiple( + "google.auth.transport.grpc.SslCredentials", + __init__=mock.Mock(return_value=None), + ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), + ): + with mock.patch.object( + transport_class, "create_channel" + ) as grpc_create_channel: + mock_grpc_channel = mock.Mock() + grpc_create_channel.return_value = mock_grpc_channel + mock_cred = mock.Mock() + + with pytest.warns(DeprecationWarning): + transport = transport_class( + host="squid.clam.whelk", + credentials=mock_cred, + api_mtls_endpoint="mtls.squid.clam.whelk", + client_cert_source=None, + ) + + grpc_create_channel.assert_called_once_with( + "mtls.squid.clam.whelk:443", + credentials=mock_cred, + credentials_file=None, + scopes=None, + ssl_credentials=mock_ssl_cred, + quota_project_id=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + assert transport.grpc_channel == mock_grpc_channel + + +def test_network_security_grpc_lro_client(): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.OperationsClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + +def test_network_security_grpc_lro_async_client(): + client = NetworkSecurityAsyncClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc_asyncio", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.OperationsAsyncClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + +def test_authorization_policy_path(): + project = "squid" + location = "clam" + authorization_policy = "whelk" + expected = "projects/{project}/locations/{location}/authorizationPolicies/{authorization_policy}".format( + project=project, + location=location, + authorization_policy=authorization_policy, + ) + actual = NetworkSecurityClient.authorization_policy_path( + project, location, authorization_policy + ) + assert expected == actual + + +def test_parse_authorization_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "authorization_policy": "nudibranch", + } + path = NetworkSecurityClient.authorization_policy_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_authorization_policy_path(path) + assert expected == actual + + +def test_client_tls_policy_path(): + project = "cuttlefish" + location = "mussel" + client_tls_policy = "winkle" + expected = "projects/{project}/locations/{location}/clientTlsPolicies/{client_tls_policy}".format( + project=project, + location=location, + client_tls_policy=client_tls_policy, + ) + actual = NetworkSecurityClient.client_tls_policy_path( + project, location, client_tls_policy + ) + assert expected == actual + + +def test_parse_client_tls_policy_path(): + expected = { + "project": "nautilus", + "location": "scallop", + "client_tls_policy": "abalone", + } + path = NetworkSecurityClient.client_tls_policy_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_client_tls_policy_path(path) + assert expected == actual + + +def test_server_tls_policy_path(): + project = "squid" + location = "clam" + server_tls_policy = "whelk" + expected = "projects/{project}/locations/{location}/serverTlsPolicies/{server_tls_policy}".format( + project=project, + location=location, + server_tls_policy=server_tls_policy, + ) + actual = NetworkSecurityClient.server_tls_policy_path( + project, location, server_tls_policy + ) + assert expected == actual + + +def test_parse_server_tls_policy_path(): + expected = { + "project": "octopus", + "location": "oyster", + "server_tls_policy": "nudibranch", + } + path = NetworkSecurityClient.server_tls_policy_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_server_tls_policy_path(path) + assert expected == actual + + +def test_common_billing_account_path(): + billing_account = "cuttlefish" + expected = "billingAccounts/{billing_account}".format( + billing_account=billing_account, + ) + actual = NetworkSecurityClient.common_billing_account_path(billing_account) + assert expected == actual + + +def test_parse_common_billing_account_path(): + expected = { + "billing_account": "mussel", + } + path = NetworkSecurityClient.common_billing_account_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_common_billing_account_path(path) + assert expected == actual + + +def test_common_folder_path(): + folder = "winkle" + expected = "folders/{folder}".format( + folder=folder, + ) + actual = NetworkSecurityClient.common_folder_path(folder) + assert expected == actual + + +def test_parse_common_folder_path(): + expected = { + "folder": "nautilus", + } + path = NetworkSecurityClient.common_folder_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_common_folder_path(path) + assert expected == actual + + +def test_common_organization_path(): + organization = "scallop" + expected = "organizations/{organization}".format( + organization=organization, + ) + actual = NetworkSecurityClient.common_organization_path(organization) + assert expected == actual + + +def test_parse_common_organization_path(): + expected = { + "organization": "abalone", + } + path = NetworkSecurityClient.common_organization_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_common_organization_path(path) + assert expected == actual + + +def test_common_project_path(): + project = "squid" + expected = "projects/{project}".format( + project=project, + ) + actual = NetworkSecurityClient.common_project_path(project) + assert expected == actual + + +def test_parse_common_project_path(): + expected = { + "project": "clam", + } + path = NetworkSecurityClient.common_project_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_common_project_path(path) + assert expected == actual + + +def test_common_location_path(): + project = "whelk" + location = "octopus" + expected = "projects/{project}/locations/{location}".format( + project=project, + location=location, + ) + actual = NetworkSecurityClient.common_location_path(project, location) + assert expected == actual + + +def test_parse_common_location_path(): + expected = { + "project": "oyster", + "location": "nudibranch", + } + path = NetworkSecurityClient.common_location_path(**expected) + + # Check that the path construction is reversible. + actual = NetworkSecurityClient.parse_common_location_path(path) + assert expected == actual + + +def test_client_with_default_client_info(): + client_info = gapic_v1.client_info.ClientInfo() + + with mock.patch.object( + transports.NetworkSecurityTransport, "_prep_wrapped_messages" + ) as prep: + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + with mock.patch.object( + transports.NetworkSecurityTransport, "_prep_wrapped_messages" + ) as prep: + transport_class = NetworkSecurityClient.get_transport_class() + transport = transport_class( + credentials=ga_credentials.AnonymousCredentials(), + client_info=client_info, + ) + prep.assert_called_once_with(client_info) + + +@pytest.mark.asyncio +async def test_transport_close_async(): + client = NetworkSecurityAsyncClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="grpc_asyncio", + ) + with mock.patch.object( + type(getattr(client.transport, "grpc_channel")), "close" + ) as close: + async with client: + close.assert_not_called() + close.assert_called_once() + + +def test_get_location_rest_bad_request( + transport: str = "rest", request_type=locations_pb2.GetLocationRequest +): client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions( - api_endpoint="networksecurity.googleapis.com" - ), - transport=transport_name, + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "projects/sample1/locations/sample2"}, request ) - assert client.transport._host == ("networksecurity.googleapis.com:443") + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_location(request) @pytest.mark.parametrize( - "transport_name", + "request_type", [ - "grpc", - "grpc_asyncio", + locations_pb2.GetLocationRequest, + dict, ], ) -def test_network_security_host_with_port(transport_name): +def test_get_location_rest(request_type): client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), - client_options=client_options.ClientOptions( - api_endpoint="networksecurity.googleapis.com:8000" - ), - transport=transport_name, + transport="rest", ) - assert client.transport._host == ("networksecurity.googleapis.com:8000") + request_init = {"name": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = locations_pb2.Location() + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) -def test_network_security_grpc_transport_channel(): - channel = grpc.secure_channel("http://localhost/", grpc.local_channel_credentials()) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - # Check that channel is used if provided. - transport = transports.NetworkSecurityGrpcTransport( - host="squid.clam.whelk", - channel=channel, - ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None + response = client.get_location(request) + # Establish that the response is the type that we expect. + assert isinstance(response, locations_pb2.Location) -def test_network_security_grpc_asyncio_transport_channel(): - channel = aio.secure_channel("http://localhost/", grpc.local_channel_credentials()) - # Check that channel is used if provided. - transport = transports.NetworkSecurityGrpcAsyncIOTransport( - host="squid.clam.whelk", - channel=channel, +def test_list_locations_rest_bad_request( + transport: str = "rest", request_type=locations_pb2.ListLocationsRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, ) - assert transport.grpc_channel == channel - assert transport._host == "squid.clam.whelk:443" - assert transport._ssl_channel_credentials == None + + request = request_type() + request = json_format.ParseDict({"name": "projects/sample1"}, request) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_locations(request) -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. @pytest.mark.parametrize( - "transport_class", + "request_type", [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, + locations_pb2.ListLocationsRequest, + dict, ], ) -def test_network_security_transport_channel_mtls_with_client_cert_source( - transport_class, -): - with mock.patch( - "grpc.ssl_channel_credentials", autospec=True - ) as grpc_ssl_channel_cred: - with mock.patch.object( - transport_class, "create_channel" - ) as grpc_create_channel: - mock_ssl_cred = mock.Mock() - grpc_ssl_channel_cred.return_value = mock_ssl_cred +def test_list_locations_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = {"name": "projects/sample1"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = locations_pb2.ListLocationsResponse() - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) - cred = ga_credentials.AnonymousCredentials() - with pytest.warns(DeprecationWarning): - with mock.patch.object(google.auth, "default") as adc: - adc.return_value = (cred, None) - transport = transport_class( - host="squid.clam.whelk", - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=client_cert_source_callback, - ) - adc.assert_called_once() + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - grpc_ssl_channel_cred.assert_called_once_with( - certificate_chain=b"cert bytes", private_key=b"key bytes" - ) - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel - assert transport._ssl_channel_credentials == mock_ssl_cred + response = client.list_locations(request) + # Establish that the response is the type that we expect. + assert isinstance(response, locations_pb2.ListLocationsResponse) -# Remove this test when deprecated arguments (api_mtls_endpoint, client_cert_source) are -# removed from grpc/grpc_asyncio transport constructor. -@pytest.mark.parametrize( - "transport_class", - [ - transports.NetworkSecurityGrpcTransport, - transports.NetworkSecurityGrpcAsyncIOTransport, - ], -) -def test_network_security_transport_channel_mtls_with_adc(transport_class): - mock_ssl_cred = mock.Mock() - with mock.patch.multiple( - "google.auth.transport.grpc.SslCredentials", - __init__=mock.Mock(return_value=None), - ssl_credentials=mock.PropertyMock(return_value=mock_ssl_cred), - ): - with mock.patch.object( - transport_class, "create_channel" - ) as grpc_create_channel: - mock_grpc_channel = mock.Mock() - grpc_create_channel.return_value = mock_grpc_channel - mock_cred = mock.Mock() - with pytest.warns(DeprecationWarning): - transport = transport_class( - host="squid.clam.whelk", - credentials=mock_cred, - api_mtls_endpoint="mtls.squid.clam.whelk", - client_cert_source=None, - ) +def test_get_iam_policy_rest_bad_request( + transport: str = "rest", request_type=iam_policy_pb2.GetIamPolicyRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) - grpc_create_channel.assert_called_once_with( - "mtls.squid.clam.whelk:443", - credentials=mock_cred, - credentials_file=None, - scopes=None, - ssl_credentials=mock_ssl_cred, - quota_project_id=None, - options=[ - ("grpc.max_send_message_length", -1), - ("grpc.max_receive_message_length", -1), - ], - ) - assert transport.grpc_channel == mock_grpc_channel + request = request_type() + request = json_format.ParseDict( + { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + }, + request, + ) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_iam_policy(request) -def test_network_security_grpc_lro_client(): +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.GetIamPolicyRequest, + dict, + ], +) +def test_get_iam_policy_rest(request_type): client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), - transport="grpc", + transport="rest", ) - transport = client.transport + request_init = { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() - # Ensure that we have a api-core operations client. - assert isinstance( - transport.operations_client, - operations_v1.OperationsClient, - ) + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) - # Ensure that subsequent calls to the property send the exact same object. - assert transport.operations_client is transport.operations_client + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_iam_policy(request) -def test_network_security_grpc_lro_async_client(): - client = NetworkSecurityAsyncClient( + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) + + +def test_set_iam_policy_rest_bad_request( + transport: str = "rest", request_type=iam_policy_pb2.SetIamPolicyRequest +): + client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), - transport="grpc_asyncio", + transport=transport, ) - transport = client.transport - # Ensure that we have a api-core operations client. - assert isinstance( - transport.operations_client, - operations_v1.OperationsAsyncClient, + request = request_type() + request = json_format.ParseDict( + { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + }, + request, ) - # Ensure that subsequent calls to the property send the exact same object. - assert transport.operations_client is transport.operations_client + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.set_iam_policy(request) -def test_authorization_policy_path(): - project = "squid" - location = "clam" - authorization_policy = "whelk" - expected = "projects/{project}/locations/{location}/authorizationPolicies/{authorization_policy}".format( - project=project, - location=location, - authorization_policy=authorization_policy, - ) - actual = NetworkSecurityClient.authorization_policy_path( - project, location, authorization_policy +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.SetIamPolicyRequest, + dict, + ], +) +def test_set_iam_policy_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - assert expected == actual + request_init = { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + } + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = policy_pb2.Policy() + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) -def test_parse_authorization_policy_path(): - expected = { - "project": "octopus", - "location": "oyster", - "authorization_policy": "nudibranch", - } - path = NetworkSecurityClient.authorization_policy_path(**expected) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_authorization_policy_path(path) - assert expected == actual + response = client.set_iam_policy(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, policy_pb2.Policy) -def test_client_tls_policy_path(): - project = "cuttlefish" - location = "mussel" - client_tls_policy = "winkle" - expected = "projects/{project}/locations/{location}/clientTlsPolicies/{client_tls_policy}".format( - project=project, - location=location, - client_tls_policy=client_tls_policy, +def test_test_iam_permissions_rest_bad_request( + transport: str = "rest", request_type=iam_policy_pb2.TestIamPermissionsRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, ) - actual = NetworkSecurityClient.client_tls_policy_path( - project, location, client_tls_policy + + request = request_type() + request = json_format.ParseDict( + { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" + }, + request, ) - assert expected == actual + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.test_iam_permissions(request) -def test_parse_client_tls_policy_path(): - expected = { - "project": "nautilus", - "location": "scallop", - "client_tls_policy": "abalone", + +@pytest.mark.parametrize( + "request_type", + [ + iam_policy_pb2.TestIamPermissionsRequest, + dict, + ], +) +def test_test_iam_permissions_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = { + "resource": "projects/sample1/locations/sample2/authorizationPolicies/sample3" } - path = NetworkSecurityClient.client_tls_policy_path(**expected) + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = iam_policy_pb2.TestIamPermissionsResponse() - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_client_tls_policy_path(path) - assert expected == actual + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value -def test_server_tls_policy_path(): - project = "squid" - location = "clam" - server_tls_policy = "whelk" - expected = "projects/{project}/locations/{location}/serverTlsPolicies/{server_tls_policy}".format( - project=project, - location=location, - server_tls_policy=server_tls_policy, - ) - actual = NetworkSecurityClient.server_tls_policy_path( - project, location, server_tls_policy - ) - assert expected == actual + response = client.test_iam_permissions(request) + # Establish that the response is the type that we expect. + assert isinstance(response, iam_policy_pb2.TestIamPermissionsResponse) -def test_parse_server_tls_policy_path(): - expected = { - "project": "octopus", - "location": "oyster", - "server_tls_policy": "nudibranch", - } - path = NetworkSecurityClient.server_tls_policy_path(**expected) - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_server_tls_policy_path(path) - assert expected == actual +def test_cancel_operation_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.CancelOperationRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "projects/sample1/locations/sample2/operations/sample3"}, request + ) + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.cancel_operation(request) -def test_common_billing_account_path(): - billing_account = "cuttlefish" - expected = "billingAccounts/{billing_account}".format( - billing_account=billing_account, + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.CancelOperationRequest, + dict, + ], +) +def test_cancel_operation_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - actual = NetworkSecurityClient.common_billing_account_path(billing_account) - assert expected == actual + request_init = {"name": "projects/sample1/locations/sample2/operations/sample3"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "{}" -def test_parse_common_billing_account_path(): - expected = { - "billing_account": "mussel", - } - path = NetworkSecurityClient.common_billing_account_path(**expected) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_common_billing_account_path(path) - assert expected == actual + response = client.cancel_operation(request) + # Establish that the response is the type that we expect. + assert response is None -def test_common_folder_path(): - folder = "winkle" - expected = "folders/{folder}".format( - folder=folder, - ) - actual = NetworkSecurityClient.common_folder_path(folder) - assert expected == actual +def test_delete_operation_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.DeleteOperationRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) -def test_parse_common_folder_path(): - expected = { - "folder": "nautilus", - } - path = NetworkSecurityClient.common_folder_path(**expected) + request = request_type() + request = json_format.ParseDict( + {"name": "projects/sample1/locations/sample2/operations/sample3"}, request + ) - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_common_folder_path(path) - assert expected == actual + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_operation(request) -def test_common_organization_path(): - organization = "scallop" - expected = "organizations/{organization}".format( - organization=organization, +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.DeleteOperationRequest, + dict, + ], +) +def test_delete_operation_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - actual = NetworkSecurityClient.common_organization_path(organization) - assert expected == actual + request_init = {"name": "projects/sample1/locations/sample2/operations/sample3"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "{}" -def test_parse_common_organization_path(): - expected = { - "organization": "abalone", - } - path = NetworkSecurityClient.common_organization_path(**expected) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_common_organization_path(path) - assert expected == actual + response = client.delete_operation(request) + # Establish that the response is the type that we expect. + assert response is None -def test_common_project_path(): - project = "squid" - expected = "projects/{project}".format( - project=project, - ) - actual = NetworkSecurityClient.common_project_path(project) - assert expected == actual +def test_get_operation_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.GetOperationRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) -def test_parse_common_project_path(): - expected = { - "project": "clam", - } - path = NetworkSecurityClient.common_project_path(**expected) + request = request_type() + request = json_format.ParseDict( + {"name": "projects/sample1/locations/sample2/operations/sample3"}, request + ) - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_common_project_path(path) - assert expected == actual + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_operation(request) -def test_common_location_path(): - project = "whelk" - location = "octopus" - expected = "projects/{project}/locations/{location}".format( - project=project, - location=location, +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.GetOperationRequest, + dict, + ], +) +def test_get_operation_rest(request_type): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - actual = NetworkSecurityClient.common_location_path(project, location) - assert expected == actual + request_init = {"name": "projects/sample1/locations/sample2/operations/sample3"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation() + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) -def test_parse_common_location_path(): - expected = { - "project": "oyster", - "location": "nudibranch", - } - path = NetworkSecurityClient.common_location_path(**expected) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value - # Check that the path construction is reversible. - actual = NetworkSecurityClient.parse_common_location_path(path) - assert expected == actual + response = client.get_operation(request) + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.Operation) -def test_client_with_default_client_info(): - client_info = gapic_v1.client_info.ClientInfo() - with mock.patch.object( - transports.NetworkSecurityTransport, "_prep_wrapped_messages" - ) as prep: - client = NetworkSecurityClient( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) +def test_list_operations_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.ListOperationsRequest +): + client = NetworkSecurityClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) - with mock.patch.object( - transports.NetworkSecurityTransport, "_prep_wrapped_messages" - ) as prep: - transport_class = NetworkSecurityClient.get_transport_class() - transport = transport_class( - credentials=ga_credentials.AnonymousCredentials(), - client_info=client_info, - ) - prep.assert_called_once_with(client_info) + request = request_type() + request = json_format.ParseDict( + {"name": "projects/sample1/locations/sample2"}, request + ) + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_operations(request) -@pytest.mark.asyncio -async def test_transport_close_async(): - client = NetworkSecurityAsyncClient( + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.ListOperationsRequest, + dict, + ], +) +def test_list_operations_rest(request_type): + client = NetworkSecurityClient( credentials=ga_credentials.AnonymousCredentials(), - transport="grpc_asyncio", + transport="rest", ) - with mock.patch.object( - type(getattr(client.transport, "grpc_channel")), "close" - ) as close: - async with client: - close.assert_not_called() - close.assert_called_once() + request_init = {"name": "projects/sample1/locations/sample2"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.ListOperationsResponse() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_operations(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.ListOperationsResponse) def test_delete_operation(transport: str = "grpc"): @@ -7230,6 +12573,7 @@ async def test_test_iam_permissions_from_dict_async(): def test_transport_close(): transports = { + "rest": "_session", "grpc": "_grpc_channel", } @@ -7247,6 +12591,7 @@ def test_transport_close(): def test_client_ctx(): transports = [ + "rest", "grpc", ] for transport in transports: