Skip to content

Commit

Permalink
chore: use gapic-generator-python 0.62.1 (#60)
Browse files Browse the repository at this point in the history
- [ ] Regenerate this pull request now.

fix: resolve DuplicateCredentialArgs error when using credentials_file

committer: parthea
PiperOrigin-RevId: 425964861

Source-Link: googleapis/googleapis@84b1a5a

Source-Link: googleapis/googleapis-gen@4fb761b
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNGZiNzYxYmJkODUwNmFjMTU2ZjQ5YmFjNWYxODMwNmFhOGViM2FhOCJ9
  • Loading branch information
gcf-owl-bot[bot] authored Feb 3, 2022
1 parent 221fcdb commit c35eb29
Show file tree
Hide file tree
Showing 7 changed files with 163 additions and 14 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -162,8 +162,11 @@ def __init__(
if not self._grpc_channel:
self._grpc_channel = type(self).create_channel(
self._host,
# use the credentials which are saved
credentials=self._credentials,
credentials_file=credentials_file,
# Set ``credentials_file`` to ``None`` here as
# the credentials that we saved earlier should be used.
credentials_file=None,
scopes=self._scopes,
ssl_credentials=self._ssl_channel_credentials,
quota_project_id=quota_project_id,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -207,8 +207,11 @@ def __init__(
if not self._grpc_channel:
self._grpc_channel = type(self).create_channel(
self._host,
# use the credentials which are saved
credentials=self._credentials,
credentials_file=credentials_file,
# Set ``credentials_file`` to ``None`` here as
# the credentials that we saved earlier should be used.
credentials_file=None,
scopes=self._scopes,
ssl_credentials=self._ssl_channel_credentials,
quota_project_id=quota_project_id,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -163,8 +163,11 @@ def __init__(
if not self._grpc_channel:
self._grpc_channel = type(self).create_channel(
self._host,
# use the credentials which are saved
credentials=self._credentials,
credentials_file=credentials_file,
# Set ``credentials_file`` to ``None`` here as
# the credentials that we saved earlier should be used.
credentials_file=None,
scopes=self._scopes,
ssl_credentials=self._ssl_channel_credentials,
quota_project_id=quota_project_id,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -208,8 +208,11 @@ def __init__(
if not self._grpc_channel:
self._grpc_channel = type(self).create_channel(
self._host,
# use the credentials which are saved
credentials=self._credentials,
credentials_file=credentials_file,
# Set ``credentials_file`` to ``None`` here as
# the credentials that we saved earlier should be used.
credentials_file=None,
scopes=self._scopes,
ssl_credentials=self._ssl_channel_credentials,
quota_project_id=quota_project_id,
Expand Down
11 changes: 5 additions & 6 deletions packages/google-cloud-iap/google/cloud/iap_v1/types/service.py
Original file line number Diff line number Diff line change
Expand Up @@ -73,8 +73,7 @@ class UpdateIapSettingsRequest(proto.Message):
The field mask specifying which IAP settings
should be updated. If omitted, the all of the
settings are updated. See
https://developers.google.com/protocol-
buffers/docs/reference/google.protobuf#fieldmask
https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask
"""

iap_settings = proto.Field(proto.MESSAGE, number=1, message="IapSettings",)
Expand Down Expand Up @@ -176,10 +175,10 @@ class OAuthSettings(proto.Message):
Domain hint to send as hd=? parameter in
OAuth request flow. Enables redirect to primary
IDP by skipping Google's login screen.
https://developers.google.com/identity/protocols/OpenIDConnect#hd-
param Note: IAP does not verify that the id
token's hd claim matches this value since access
behavior is managed by IAM policies.
https://developers.google.com/identity/protocols/OpenIDConnect#hd-param
Note: IAP does not verify that the id token's hd
claim matches this value since access behavior
is managed by IAM policies.
"""

login_hint = proto.Field(proto.MESSAGE, number=2, message=wrappers_pb2.StringValue,)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -555,25 +555,28 @@ def test_identity_aware_proxy_admin_service_client_client_options_scopes(


@pytest.mark.parametrize(
"client_class,transport_class,transport_name",
"client_class,transport_class,transport_name,grpc_helpers",
[
(
IdentityAwareProxyAdminServiceClient,
transports.IdentityAwareProxyAdminServiceGrpcTransport,
"grpc",
grpc_helpers,
),
(
IdentityAwareProxyAdminServiceAsyncClient,
transports.IdentityAwareProxyAdminServiceGrpcAsyncIOTransport,
"grpc_asyncio",
grpc_helpers_async,
),
],
)
def test_identity_aware_proxy_admin_service_client_client_options_credentials_file(
client_class, transport_class, transport_name
client_class, transport_class, transport_name, grpc_helpers
):
# Check the case credentials file is provided.
options = client_options.ClientOptions(credentials_file="credentials.json")

with mock.patch.object(transport_class, "__init__") as patched:
patched.return_value = None
client = client_class(client_options=options, transport=transport_name)
Expand Down Expand Up @@ -609,6 +612,72 @@ def test_identity_aware_proxy_admin_service_client_client_options_from_dict():
)


@pytest.mark.parametrize(
"client_class,transport_class,transport_name,grpc_helpers",
[
(
IdentityAwareProxyAdminServiceClient,
transports.IdentityAwareProxyAdminServiceGrpcTransport,
"grpc",
grpc_helpers,
),
(
IdentityAwareProxyAdminServiceAsyncClient,
transports.IdentityAwareProxyAdminServiceGrpcAsyncIOTransport,
"grpc_asyncio",
grpc_helpers_async,
),
],
)
def test_identity_aware_proxy_admin_service_client_create_channel_credentials_file(
client_class, transport_class, transport_name, grpc_helpers
):
# Check the case credentials file is provided.
options = client_options.ClientOptions(credentials_file="credentials.json")

with mock.patch.object(transport_class, "__init__") as patched:
patched.return_value = None
client = client_class(client_options=options, transport=transport_name)
patched.assert_called_once_with(
credentials=None,
credentials_file="credentials.json",
host=client.DEFAULT_ENDPOINT,
scopes=None,
client_cert_source_for_mtls=None,
quota_project_id=None,
client_info=transports.base.DEFAULT_CLIENT_INFO,
always_use_jwt_access=True,
)

# test that the credentials from file are saved and used as the credentials.
with mock.patch.object(
google.auth, "load_credentials_from_file", autospec=True
) as load_creds, mock.patch.object(
google.auth, "default", autospec=True
) as adc, mock.patch.object(
grpc_helpers, "create_channel"
) as create_channel:
creds = ga_credentials.AnonymousCredentials()
file_creds = ga_credentials.AnonymousCredentials()
load_creds.return_value = (file_creds, None)
adc.return_value = (creds, None)
client = client_class(client_options=options, transport=transport_name)
create_channel.assert_called_with(
"iap.googleapis.com:443",
credentials=file_creds,
credentials_file=None,
quota_project_id=None,
default_scopes=("https://www.googleapis.com/auth/cloud-platform",),
scopes=None,
default_host="iap.googleapis.com",
ssl_credentials=None,
options=[
("grpc.max_send_message_length", -1),
("grpc.max_receive_message_length", -1),
],
)


@pytest.mark.parametrize("request_type", [iam_policy_pb2.SetIamPolicyRequest, dict,])
def test_set_iam_policy(request_type, transport: str = "grpc"):
client = IdentityAwareProxyAdminServiceClient(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -550,25 +550,28 @@ def test_identity_aware_proxy_o_auth_service_client_client_options_scopes(


@pytest.mark.parametrize(
"client_class,transport_class,transport_name",
"client_class,transport_class,transport_name,grpc_helpers",
[
(
IdentityAwareProxyOAuthServiceClient,
transports.IdentityAwareProxyOAuthServiceGrpcTransport,
"grpc",
grpc_helpers,
),
(
IdentityAwareProxyOAuthServiceAsyncClient,
transports.IdentityAwareProxyOAuthServiceGrpcAsyncIOTransport,
"grpc_asyncio",
grpc_helpers_async,
),
],
)
def test_identity_aware_proxy_o_auth_service_client_client_options_credentials_file(
client_class, transport_class, transport_name
client_class, transport_class, transport_name, grpc_helpers
):
# Check the case credentials file is provided.
options = client_options.ClientOptions(credentials_file="credentials.json")

with mock.patch.object(transport_class, "__init__") as patched:
patched.return_value = None
client = client_class(client_options=options, transport=transport_name)
Expand Down Expand Up @@ -604,6 +607,72 @@ def test_identity_aware_proxy_o_auth_service_client_client_options_from_dict():
)


@pytest.mark.parametrize(
"client_class,transport_class,transport_name,grpc_helpers",
[
(
IdentityAwareProxyOAuthServiceClient,
transports.IdentityAwareProxyOAuthServiceGrpcTransport,
"grpc",
grpc_helpers,
),
(
IdentityAwareProxyOAuthServiceAsyncClient,
transports.IdentityAwareProxyOAuthServiceGrpcAsyncIOTransport,
"grpc_asyncio",
grpc_helpers_async,
),
],
)
def test_identity_aware_proxy_o_auth_service_client_create_channel_credentials_file(
client_class, transport_class, transport_name, grpc_helpers
):
# Check the case credentials file is provided.
options = client_options.ClientOptions(credentials_file="credentials.json")

with mock.patch.object(transport_class, "__init__") as patched:
patched.return_value = None
client = client_class(client_options=options, transport=transport_name)
patched.assert_called_once_with(
credentials=None,
credentials_file="credentials.json",
host=client.DEFAULT_ENDPOINT,
scopes=None,
client_cert_source_for_mtls=None,
quota_project_id=None,
client_info=transports.base.DEFAULT_CLIENT_INFO,
always_use_jwt_access=True,
)

# test that the credentials from file are saved and used as the credentials.
with mock.patch.object(
google.auth, "load_credentials_from_file", autospec=True
) as load_creds, mock.patch.object(
google.auth, "default", autospec=True
) as adc, mock.patch.object(
grpc_helpers, "create_channel"
) as create_channel:
creds = ga_credentials.AnonymousCredentials()
file_creds = ga_credentials.AnonymousCredentials()
load_creds.return_value = (file_creds, None)
adc.return_value = (creds, None)
client = client_class(client_options=options, transport=transport_name)
create_channel.assert_called_with(
"iap.googleapis.com:443",
credentials=file_creds,
credentials_file=None,
quota_project_id=None,
default_scopes=("https://www.googleapis.com/auth/cloud-platform",),
scopes=None,
default_host="iap.googleapis.com",
ssl_credentials=None,
options=[
("grpc.max_send_message_length", -1),
("grpc.max_receive_message_length", -1),
],
)


@pytest.mark.parametrize("request_type", [service.ListBrandsRequest, dict,])
def test_list_brands(request_type, transport: str = "grpc"):
client = IdentityAwareProxyOAuthServiceClient(
Expand Down

0 comments on commit c35eb29

Please sign in to comment.