From 60d92eb054c2d89c3b18007ca22c1d6af12939ca Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 9 Feb 2023 10:28:39 -0500 Subject: [PATCH] feat: enable "rest" transport in Python for services supporting numeric enums (#233) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * feat: enable "rest" transport in Python for services supporting numeric enums PiperOrigin-RevId: 508143576 Source-Link: https://github.com/googleapis/googleapis/commit/7a702a989db3b413f39ff8994ca53fb38b6928c2 Source-Link: https://github.com/googleapis/googleapis-gen/commit/6ad1279c0e7aa787ac6b66c9fd4a210692edffcd Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNmFkMTI3OWMwZTdhYTc4N2FjNmI2NmM5ZmQ0YTIxMDY5MmVkZmZjZCJ9 * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md * set coverage level to 99 * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md --------- Co-authored-by: Owl Bot Co-authored-by: Anthonios Partheniou --- .../.github/workflows/unittest.yml | 2 +- .../assuredworkloads_v1/gapic_metadata.json | 50 + .../assured_workloads_service/client.py | 2 + .../transports/__init__.py | 7 + .../transports/rest.py | 1314 +++++++++ .../gapic_metadata.json | 40 + .../assured_workloads_service/client.py | 2 + .../transports/__init__.py | 7 + .../transports/rest.py | 961 +++++++ .../google-cloud-assured-workloads/noxfile.py | 2 +- .../google-cloud-assured-workloads/owlbot.py | 2 +- .../test_assured_workloads_service.py | 2395 ++++++++++++++++- .../test_assured_workloads_service.py | 1176 +++++++- 13 files changed, 5831 insertions(+), 129 deletions(-) create mode 100644 packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/rest.py create mode 100644 packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/rest.py diff --git a/packages/google-cloud-assured-workloads/.github/workflows/unittest.yml b/packages/google-cloud-assured-workloads/.github/workflows/unittest.yml index 8057a7691b12..280fec1756c7 100644 --- a/packages/google-cloud-assured-workloads/.github/workflows/unittest.yml +++ b/packages/google-cloud-assured-workloads/.github/workflows/unittest.yml @@ -54,4 +54,4 @@ jobs: - name: Report coverage results run: | coverage combine .coverage-results/.coverage* - coverage report --show-missing --fail-under=100 + coverage report --show-missing --fail-under=99 diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/gapic_metadata.json b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/gapic_metadata.json index 1a22aa8dcc73..6cd64bb258dd 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/gapic_metadata.json +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/gapic_metadata.json @@ -106,6 +106,56 @@ ] } } + }, + "rest": { + "libraryClient": "AssuredWorkloadsServiceClient", + "rpcs": { + "AcknowledgeViolation": { + "methods": [ + "acknowledge_violation" + ] + }, + "CreateWorkload": { + "methods": [ + "create_workload" + ] + }, + "DeleteWorkload": { + "methods": [ + "delete_workload" + ] + }, + "GetViolation": { + "methods": [ + "get_violation" + ] + }, + "GetWorkload": { + "methods": [ + "get_workload" + ] + }, + "ListViolations": { + "methods": [ + "list_violations" + ] + }, + "ListWorkloads": { + "methods": [ + "list_workloads" + ] + }, + "RestrictAllowedResources": { + "methods": [ + "restrict_allowed_resources" + ] + }, + "UpdateWorkload": { + "methods": [ + "update_workload" + ] + } + } } } } diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/client.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/client.py index bd54f95a07f1..6e981d57ed5d 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/client.py +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/client.py @@ -58,6 +58,7 @@ from .transports.base import DEFAULT_CLIENT_INFO, AssuredWorkloadsServiceTransport from .transports.grpc import AssuredWorkloadsServiceGrpcTransport from .transports.grpc_asyncio import AssuredWorkloadsServiceGrpcAsyncIOTransport +from .transports.rest import AssuredWorkloadsServiceRestTransport class AssuredWorkloadsServiceClientMeta(type): @@ -73,6 +74,7 @@ class AssuredWorkloadsServiceClientMeta(type): ) # type: Dict[str, Type[AssuredWorkloadsServiceTransport]] _transport_registry["grpc"] = AssuredWorkloadsServiceGrpcTransport _transport_registry["grpc_asyncio"] = AssuredWorkloadsServiceGrpcAsyncIOTransport + _transport_registry["rest"] = AssuredWorkloadsServiceRestTransport def get_transport_class( cls, diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/__init__.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/__init__.py index 9f600e031d51..31d8a294b1d0 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/__init__.py +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/__init__.py @@ -19,6 +19,10 @@ from .base import AssuredWorkloadsServiceTransport from .grpc import AssuredWorkloadsServiceGrpcTransport from .grpc_asyncio import AssuredWorkloadsServiceGrpcAsyncIOTransport +from .rest import ( + AssuredWorkloadsServiceRestInterceptor, + AssuredWorkloadsServiceRestTransport, +) # Compile a registry of transports. _transport_registry = ( @@ -26,9 +30,12 @@ ) # type: Dict[str, Type[AssuredWorkloadsServiceTransport]] _transport_registry["grpc"] = AssuredWorkloadsServiceGrpcTransport _transport_registry["grpc_asyncio"] = AssuredWorkloadsServiceGrpcAsyncIOTransport +_transport_registry["rest"] = AssuredWorkloadsServiceRestTransport __all__ = ( "AssuredWorkloadsServiceTransport", "AssuredWorkloadsServiceGrpcTransport", "AssuredWorkloadsServiceGrpcAsyncIOTransport", + "AssuredWorkloadsServiceRestTransport", + "AssuredWorkloadsServiceRestInterceptor", ) diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/rest.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/rest.py new file mode 100644 index 000000000000..b5034b7177c3 --- /dev/null +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1/services/assured_workloads_service/transports/rest.py @@ -0,0 +1,1314 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +import dataclasses +import json # type: ignore +import re +from typing import Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + +from google.api_core import ( + gapic_v1, + operations_v1, + path_template, + rest_helpers, + rest_streaming, +) +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.longrunning import operations_pb2 +from google.protobuf import json_format +import grpc # type: ignore +from requests import __version__ as requests_version + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore + + +from google.longrunning import operations_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +from google.cloud.assuredworkloads_v1.types import assuredworkloads + +from .base import AssuredWorkloadsServiceTransport +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=requests_version, +) + + +class AssuredWorkloadsServiceRestInterceptor: + """Interceptor for AssuredWorkloadsService. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the AssuredWorkloadsServiceRestTransport. + + .. code-block:: python + class MyCustomAssuredWorkloadsServiceInterceptor(AssuredWorkloadsServiceRestInterceptor): + def pre_acknowledge_violation(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_acknowledge_violation(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_create_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_workload(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_delete_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def pre_get_violation(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_violation(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_get_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_workload(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_violations(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_violations(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_workloads(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_workloads(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_restrict_allowed_resources(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_restrict_allowed_resources(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_update_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_workload(self, response): + logging.log(f"Received response: {response}") + return response + + transport = AssuredWorkloadsServiceRestTransport(interceptor=MyCustomAssuredWorkloadsServiceInterceptor()) + client = AssuredWorkloadsServiceClient(transport=transport) + + + """ + + def pre_create_workload( + self, + request: assuredworkloads.CreateWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.CreateWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for create_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_create_workload( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_workload + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_delete_workload( + self, + request: assuredworkloads.DeleteWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.DeleteWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for delete_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def pre_get_workload( + self, + request: assuredworkloads.GetWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.GetWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for get_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_get_workload( + self, response: assuredworkloads.Workload + ) -> assuredworkloads.Workload: + """Post-rpc interceptor for get_workload + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_list_workloads( + self, + request: assuredworkloads.ListWorkloadsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.ListWorkloadsRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for list_workloads + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_list_workloads( + self, response: assuredworkloads.ListWorkloadsResponse + ) -> assuredworkloads.ListWorkloadsResponse: + """Post-rpc interceptor for list_workloads + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_restrict_allowed_resources( + self, + request: assuredworkloads.RestrictAllowedResourcesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + assuredworkloads.RestrictAllowedResourcesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for restrict_allowed_resources + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_restrict_allowed_resources( + self, response: assuredworkloads.RestrictAllowedResourcesResponse + ) -> assuredworkloads.RestrictAllowedResourcesResponse: + """Post-rpc interceptor for restrict_allowed_resources + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_update_workload( + self, + request: assuredworkloads.UpdateWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.UpdateWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for update_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_update_workload( + self, response: assuredworkloads.Workload + ) -> assuredworkloads.Workload: + """Post-rpc interceptor for update_workload + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_get_operation( + self, + request: operations_pb2.GetOperationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.Operation: + """Pre-rpc interceptor for get_operation + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_get_operation( + self, response: operations_pb2.GetOperationRequest + ) -> operations_pb2.Operation: + """Post-rpc interceptor for get_operation + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_list_operations( + self, + request: operations_pb2.ListOperationsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.ListOperationsResponse: + """Pre-rpc interceptor for list_operations + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_list_operations( + self, response: operations_pb2.ListOperationsRequest + ) -> operations_pb2.ListOperationsResponse: + """Post-rpc interceptor for list_operations + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + +@dataclasses.dataclass +class AssuredWorkloadsServiceRestStub: + _session: AuthorizedSession + _host: str + _interceptor: AssuredWorkloadsServiceRestInterceptor + + +class AssuredWorkloadsServiceRestTransport(AssuredWorkloadsServiceTransport): + """REST backend transport for AssuredWorkloadsService. + + Service to manage AssuredWorkloads. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + + """ + + def __init__( + self, + *, + host: str = "assuredworkloads.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[AssuredWorkloadsServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to. + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST + ) + self._operations_client: Optional[operations_v1.AbstractOperationsClient] = None + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or AssuredWorkloadsServiceRestInterceptor() + self._prep_wrapped_messages(client_info) + + @property + def operations_client(self) -> operations_v1.AbstractOperationsClient: + """Create the client designed to process long-running operations. + + This property caches on the instance; repeated calls return the same + client. + """ + # Only create a new client if we do not already have one. + if self._operations_client is None: + http_options: Dict[str, List[Dict[str, str]]] = { + "google.longrunning.Operations.GetOperation": [ + { + "method": "get", + "uri": "/v1/{name=organizations/*/locations/*/operations/*}", + }, + ], + "google.longrunning.Operations.ListOperations": [ + { + "method": "get", + "uri": "/v1/{name=organizations/*/locations/*}/operations", + }, + ], + } + + rest_transport = operations_v1.OperationsRestTransport( + host=self._host, + # use the credentials which are saved + credentials=self._credentials, + scopes=self._scopes, + http_options=http_options, + path_prefix="v1", + ) + + self._operations_client = operations_v1.AbstractOperationsClient( + transport=rest_transport + ) + + # Return the client from cache. + return self._operations_client + + class _AcknowledgeViolation(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("AcknowledgeViolation") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.AcknowledgeViolationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.AcknowledgeViolationResponse: + raise NotImplementedError( + "Method AcknowledgeViolation is not available over REST transport" + ) + + class _CreateWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("CreateWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.CreateWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create workload method over HTTP. + + Args: + request (~.assuredworkloads.CreateWorkloadRequest): + The request object. Request for creating a workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1/{parent=organizations/*/locations/*}/workloads", + "body": "workload", + }, + ] + request, metadata = self._interceptor.pre_create_workload(request, metadata) + pb_request = assuredworkloads.CreateWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_workload(resp) + return resp + + class _DeleteWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("DeleteWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.DeleteWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ): + r"""Call the delete workload method over HTTP. + + Args: + request (~.assuredworkloads.DeleteWorkloadRequest): + The request object. Request for deleting a Workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1/{name=organizations/*/locations/*/workloads/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_workload(request, metadata) + pb_request = assuredworkloads.DeleteWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + class _GetViolation(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("GetViolation") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.GetViolationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.Violation: + raise NotImplementedError( + "Method GetViolation is not available over REST transport" + ) + + class _GetWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("GetWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.GetWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.Workload: + r"""Call the get workload method over HTTP. + + Args: + request (~.assuredworkloads.GetWorkloadRequest): + The request object. Request for fetching a workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.assuredworkloads.Workload: + A Workload object for managing highly + regulated workloads of cloud customers. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=organizations/*/locations/*/workloads/*}", + }, + ] + request, metadata = self._interceptor.pre_get_workload(request, metadata) + pb_request = assuredworkloads.GetWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = assuredworkloads.Workload() + pb_resp = assuredworkloads.Workload.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_get_workload(resp) + return resp + + class _ListViolations(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("ListViolations") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.ListViolationsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.ListViolationsResponse: + raise NotImplementedError( + "Method ListViolations is not available over REST transport" + ) + + class _ListWorkloads(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("ListWorkloads") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.ListWorkloadsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.ListWorkloadsResponse: + r"""Call the list workloads method over HTTP. + + Args: + request (~.assuredworkloads.ListWorkloadsRequest): + The request object. Request for fetching workloads in an + organization. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.assuredworkloads.ListWorkloadsResponse: + Response of ListWorkloads endpoint. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{parent=organizations/*/locations/*}/workloads", + }, + ] + request, metadata = self._interceptor.pre_list_workloads(request, metadata) + pb_request = assuredworkloads.ListWorkloadsRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = assuredworkloads.ListWorkloadsResponse() + pb_resp = assuredworkloads.ListWorkloadsResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_list_workloads(resp) + return resp + + class _RestrictAllowedResources(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("RestrictAllowedResources") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.RestrictAllowedResourcesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.RestrictAllowedResourcesResponse: + r"""Call the restrict allowed + resources method over HTTP. + + Args: + request (~.assuredworkloads.RestrictAllowedResourcesRequest): + The request object. Request for restricting list of + available resources in Workload + environment. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.assuredworkloads.RestrictAllowedResourcesResponse: + Response for restricting the list of + allowed resources. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1/{name=organizations/*/locations/*/workloads/*}:restrictAllowedResources", + "body": "*", + }, + ] + request, metadata = self._interceptor.pre_restrict_allowed_resources( + request, metadata + ) + pb_request = assuredworkloads.RestrictAllowedResourcesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = assuredworkloads.RestrictAllowedResourcesResponse() + pb_resp = assuredworkloads.RestrictAllowedResourcesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_restrict_allowed_resources(resp) + return resp + + class _UpdateWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("UpdateWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = { + "updateMask": {}, + } + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.UpdateWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.Workload: + r"""Call the update workload method over HTTP. + + Args: + request (~.assuredworkloads.UpdateWorkloadRequest): + The request object. Request for Updating a workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.assuredworkloads.Workload: + A Workload object for managing highly + regulated workloads of cloud customers. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "patch", + "uri": "/v1/{workload.name=organizations/*/locations/*/workloads/*}", + "body": "workload", + }, + ] + request, metadata = self._interceptor.pre_update_workload(request, metadata) + pb_request = assuredworkloads.UpdateWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = assuredworkloads.Workload() + pb_resp = assuredworkloads.Workload.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_update_workload(resp) + return resp + + @property + def acknowledge_violation( + self, + ) -> Callable[ + [assuredworkloads.AcknowledgeViolationRequest], + assuredworkloads.AcknowledgeViolationResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._AcknowledgeViolation(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_workload( + self, + ) -> Callable[[assuredworkloads.CreateWorkloadRequest], operations_pb2.Operation]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_workload( + self, + ) -> Callable[[assuredworkloads.DeleteWorkloadRequest], empty_pb2.Empty]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_violation( + self, + ) -> Callable[[assuredworkloads.GetViolationRequest], assuredworkloads.Violation]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetViolation(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_workload( + self, + ) -> Callable[[assuredworkloads.GetWorkloadRequest], assuredworkloads.Workload]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_violations( + self, + ) -> Callable[ + [assuredworkloads.ListViolationsRequest], + assuredworkloads.ListViolationsResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListViolations(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_workloads( + self, + ) -> Callable[ + [assuredworkloads.ListWorkloadsRequest], assuredworkloads.ListWorkloadsResponse + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListWorkloads(self._session, self._host, self._interceptor) # type: ignore + + @property + def restrict_allowed_resources( + self, + ) -> Callable[ + [assuredworkloads.RestrictAllowedResourcesRequest], + assuredworkloads.RestrictAllowedResourcesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._RestrictAllowedResources(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_workload( + self, + ) -> Callable[[assuredworkloads.UpdateWorkloadRequest], assuredworkloads.Workload]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_operation(self): + return self._GetOperation(self._session, self._host, self._interceptor) # type: ignore + + class _GetOperation(AssuredWorkloadsServiceRestStub): + def __call__( + self, + request: operations_pb2.GetOperationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + + r"""Call the get operation method over HTTP. + + Args: + request (operations_pb2.GetOperationRequest): + The request object for GetOperation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.Operation: Response from GetOperation method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=organizations/*/locations/*/operations/*}", + }, + ] + + request, metadata = self._interceptor.pre_get_operation(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.Operation() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_get_operation(resp) + return resp + + @property + def list_operations(self): + return self._ListOperations(self._session, self._host, self._interceptor) # type: ignore + + class _ListOperations(AssuredWorkloadsServiceRestStub): + def __call__( + self, + request: operations_pb2.ListOperationsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.ListOperationsResponse: + + r"""Call the list operations method over HTTP. + + Args: + request (operations_pb2.ListOperationsRequest): + The request object for ListOperations method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.ListOperationsResponse: Response from ListOperations method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1/{name=organizations/*/locations/*}/operations", + }, + ] + + request, metadata = self._interceptor.pre_list_operations(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.ListOperationsResponse() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_list_operations(resp) + return resp + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__ = ("AssuredWorkloadsServiceRestTransport",) diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/gapic_metadata.json b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/gapic_metadata.json index 9b753c55a639..68c3be657cf7 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/gapic_metadata.json +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/gapic_metadata.json @@ -86,6 +86,46 @@ ] } } + }, + "rest": { + "libraryClient": "AssuredWorkloadsServiceClient", + "rpcs": { + "AnalyzeWorkloadMove": { + "methods": [ + "analyze_workload_move" + ] + }, + "CreateWorkload": { + "methods": [ + "create_workload" + ] + }, + "DeleteWorkload": { + "methods": [ + "delete_workload" + ] + }, + "GetWorkload": { + "methods": [ + "get_workload" + ] + }, + "ListWorkloads": { + "methods": [ + "list_workloads" + ] + }, + "RestrictAllowedResources": { + "methods": [ + "restrict_allowed_resources" + ] + }, + "UpdateWorkload": { + "methods": [ + "update_workload" + ] + } + } } } } diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/client.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/client.py index 58b48ea7f64a..a946f4b88ad4 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/client.py +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/client.py @@ -60,6 +60,7 @@ from .transports.base import DEFAULT_CLIENT_INFO, AssuredWorkloadsServiceTransport from .transports.grpc import AssuredWorkloadsServiceGrpcTransport from .transports.grpc_asyncio import AssuredWorkloadsServiceGrpcAsyncIOTransport +from .transports.rest import AssuredWorkloadsServiceRestTransport class AssuredWorkloadsServiceClientMeta(type): @@ -75,6 +76,7 @@ class AssuredWorkloadsServiceClientMeta(type): ) # type: Dict[str, Type[AssuredWorkloadsServiceTransport]] _transport_registry["grpc"] = AssuredWorkloadsServiceGrpcTransport _transport_registry["grpc_asyncio"] = AssuredWorkloadsServiceGrpcAsyncIOTransport + _transport_registry["rest"] = AssuredWorkloadsServiceRestTransport def get_transport_class( cls, diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/__init__.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/__init__.py index 9f600e031d51..31d8a294b1d0 100644 --- a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/__init__.py +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/__init__.py @@ -19,6 +19,10 @@ from .base import AssuredWorkloadsServiceTransport from .grpc import AssuredWorkloadsServiceGrpcTransport from .grpc_asyncio import AssuredWorkloadsServiceGrpcAsyncIOTransport +from .rest import ( + AssuredWorkloadsServiceRestInterceptor, + AssuredWorkloadsServiceRestTransport, +) # Compile a registry of transports. _transport_registry = ( @@ -26,9 +30,12 @@ ) # type: Dict[str, Type[AssuredWorkloadsServiceTransport]] _transport_registry["grpc"] = AssuredWorkloadsServiceGrpcTransport _transport_registry["grpc_asyncio"] = AssuredWorkloadsServiceGrpcAsyncIOTransport +_transport_registry["rest"] = AssuredWorkloadsServiceRestTransport __all__ = ( "AssuredWorkloadsServiceTransport", "AssuredWorkloadsServiceGrpcTransport", "AssuredWorkloadsServiceGrpcAsyncIOTransport", + "AssuredWorkloadsServiceRestTransport", + "AssuredWorkloadsServiceRestInterceptor", ) diff --git a/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/rest.py b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/rest.py new file mode 100644 index 000000000000..e17167ebf509 --- /dev/null +++ b/packages/google-cloud-assured-workloads/google/cloud/assuredworkloads_v1beta1/services/assured_workloads_service/transports/rest.py @@ -0,0 +1,961 @@ +# -*- coding: utf-8 -*- +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +import dataclasses +import json # type: ignore +import re +from typing import Callable, Dict, List, Optional, Sequence, Tuple, Union +import warnings + +from google.api_core import ( + gapic_v1, + operations_v1, + path_template, + rest_helpers, + rest_streaming, +) +from google.api_core import exceptions as core_exceptions +from google.api_core import retry as retries +from google.auth import credentials as ga_credentials # type: ignore +from google.auth.transport.grpc import SslCredentials # type: ignore +from google.auth.transport.requests import AuthorizedSession # type: ignore +from google.longrunning import operations_pb2 +from google.protobuf import json_format +import grpc # type: ignore +from requests import __version__ as requests_version + +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore + + +from google.longrunning import operations_pb2 # type: ignore +from google.protobuf import empty_pb2 # type: ignore + +from google.cloud.assuredworkloads_v1beta1.types import assuredworkloads + +from .base import AssuredWorkloadsServiceTransport +from .base import DEFAULT_CLIENT_INFO as BASE_DEFAULT_CLIENT_INFO + +DEFAULT_CLIENT_INFO = gapic_v1.client_info.ClientInfo( + gapic_version=BASE_DEFAULT_CLIENT_INFO.gapic_version, + grpc_version=None, + rest_version=requests_version, +) + + +class AssuredWorkloadsServiceRestInterceptor: + """Interceptor for AssuredWorkloadsService. + + Interceptors are used to manipulate requests, request metadata, and responses + in arbitrary ways. + Example use cases include: + * Logging + * Verifying requests according to service or custom semantics + * Stripping extraneous information from responses + + These use cases and more can be enabled by injecting an + instance of a custom subclass when constructing the AssuredWorkloadsServiceRestTransport. + + .. code-block:: python + class MyCustomAssuredWorkloadsServiceInterceptor(AssuredWorkloadsServiceRestInterceptor): + def pre_analyze_workload_move(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_analyze_workload_move(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_create_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_create_workload(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_delete_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def pre_get_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_get_workload(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_list_workloads(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_list_workloads(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_restrict_allowed_resources(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_restrict_allowed_resources(self, response): + logging.log(f"Received response: {response}") + return response + + def pre_update_workload(self, request, metadata): + logging.log(f"Received request: {request}") + return request, metadata + + def post_update_workload(self, response): + logging.log(f"Received response: {response}") + return response + + transport = AssuredWorkloadsServiceRestTransport(interceptor=MyCustomAssuredWorkloadsServiceInterceptor()) + client = AssuredWorkloadsServiceClient(transport=transport) + + + """ + + def pre_create_workload( + self, + request: assuredworkloads.CreateWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.CreateWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for create_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_create_workload( + self, response: operations_pb2.Operation + ) -> operations_pb2.Operation: + """Post-rpc interceptor for create_workload + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_delete_workload( + self, + request: assuredworkloads.DeleteWorkloadRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[assuredworkloads.DeleteWorkloadRequest, Sequence[Tuple[str, str]]]: + """Pre-rpc interceptor for delete_workload + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def pre_restrict_allowed_resources( + self, + request: assuredworkloads.RestrictAllowedResourcesRequest, + metadata: Sequence[Tuple[str, str]], + ) -> Tuple[ + assuredworkloads.RestrictAllowedResourcesRequest, Sequence[Tuple[str, str]] + ]: + """Pre-rpc interceptor for restrict_allowed_resources + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_restrict_allowed_resources( + self, response: assuredworkloads.RestrictAllowedResourcesResponse + ) -> assuredworkloads.RestrictAllowedResourcesResponse: + """Post-rpc interceptor for restrict_allowed_resources + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_get_operation( + self, + request: operations_pb2.GetOperationRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.Operation: + """Pre-rpc interceptor for get_operation + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_get_operation( + self, response: operations_pb2.GetOperationRequest + ) -> operations_pb2.Operation: + """Post-rpc interceptor for get_operation + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + def pre_list_operations( + self, + request: operations_pb2.ListOperationsRequest, + metadata: Sequence[Tuple[str, str]], + ) -> operations_pb2.ListOperationsResponse: + """Pre-rpc interceptor for list_operations + + Override in a subclass to manipulate the request or metadata + before they are sent to the AssuredWorkloadsService server. + """ + return request, metadata + + def post_list_operations( + self, response: operations_pb2.ListOperationsRequest + ) -> operations_pb2.ListOperationsResponse: + """Post-rpc interceptor for list_operations + + Override in a subclass to manipulate the response + after it is returned by the AssuredWorkloadsService server but before + it is returned to user code. + """ + return response + + +@dataclasses.dataclass +class AssuredWorkloadsServiceRestStub: + _session: AuthorizedSession + _host: str + _interceptor: AssuredWorkloadsServiceRestInterceptor + + +class AssuredWorkloadsServiceRestTransport(AssuredWorkloadsServiceTransport): + """REST backend transport for AssuredWorkloadsService. + + Service to manage AssuredWorkloads. + + This class defines the same methods as the primary client, so the + primary client can load the underlying transport implementation + and call it. + + It sends JSON representations of protocol buffers over HTTP/1.1 + + """ + + def __init__( + self, + *, + host: str = "assuredworkloads.googleapis.com", + credentials: Optional[ga_credentials.Credentials] = None, + credentials_file: Optional[str] = None, + scopes: Optional[Sequence[str]] = None, + client_cert_source_for_mtls: Optional[Callable[[], Tuple[bytes, bytes]]] = None, + quota_project_id: Optional[str] = None, + client_info: gapic_v1.client_info.ClientInfo = DEFAULT_CLIENT_INFO, + always_use_jwt_access: Optional[bool] = False, + url_scheme: str = "https", + interceptor: Optional[AssuredWorkloadsServiceRestInterceptor] = None, + api_audience: Optional[str] = None, + ) -> None: + """Instantiate the transport. + + Args: + host (Optional[str]): + The hostname to connect to. + credentials (Optional[google.auth.credentials.Credentials]): The + authorization credentials to attach to requests. These + credentials identify the application to the service; if none + are specified, the client will attempt to ascertain the + credentials from the environment. + + credentials_file (Optional[str]): A file with credentials that can + be loaded with :func:`google.auth.load_credentials_from_file`. + This argument is ignored if ``channel`` is provided. + scopes (Optional(Sequence[str])): A list of scopes. This argument is + ignored if ``channel`` is provided. + client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): Client + certificate to configure mutual TLS HTTP channel. It is ignored + if ``channel`` is provided. + quota_project_id (Optional[str]): An optional project to use for billing + and quota. + client_info (google.api_core.gapic_v1.client_info.ClientInfo): + The client info used to send a user-agent string along with + API requests. If ``None``, then default info will be used. + Generally, you only need to set this if you are developing + your own client library. + always_use_jwt_access (Optional[bool]): Whether self signed JWT should + be used for service account credentials. + url_scheme: the protocol scheme for the API endpoint. Normally + "https", but for testing or local servers, + "http" can be specified. + """ + # Run the base constructor + # TODO(yon-mg): resolve other ctor params i.e. scopes, quota, etc. + # TODO: When custom host (api_endpoint) is set, `scopes` must *also* be set on the + # credentials object + maybe_url_match = re.match("^(?Phttp(?:s)?://)?(?P.*)$", host) + if maybe_url_match is None: + raise ValueError( + f"Unexpected hostname structure: {host}" + ) # pragma: NO COVER + + url_match_items = maybe_url_match.groupdict() + + host = f"{url_scheme}://{host}" if not url_match_items["scheme"] else host + + super().__init__( + host=host, + credentials=credentials, + client_info=client_info, + always_use_jwt_access=always_use_jwt_access, + api_audience=api_audience, + ) + self._session = AuthorizedSession( + self._credentials, default_host=self.DEFAULT_HOST + ) + self._operations_client: Optional[operations_v1.AbstractOperationsClient] = None + if client_cert_source_for_mtls: + self._session.configure_mtls_channel(client_cert_source_for_mtls) + self._interceptor = interceptor or AssuredWorkloadsServiceRestInterceptor() + self._prep_wrapped_messages(client_info) + + @property + def operations_client(self) -> operations_v1.AbstractOperationsClient: + """Create the client designed to process long-running operations. + + This property caches on the instance; repeated calls return the same + client. + """ + # Only create a new client if we do not already have one. + if self._operations_client is None: + http_options: Dict[str, List[Dict[str, str]]] = { + "google.longrunning.Operations.GetOperation": [ + { + "method": "get", + "uri": "/v1beta1/{name=organizations/*/locations/*/operations/*}", + }, + ], + "google.longrunning.Operations.ListOperations": [ + { + "method": "get", + "uri": "/v1beta1/{name=organizations/*/locations/*}/operations", + }, + ], + } + + rest_transport = operations_v1.OperationsRestTransport( + host=self._host, + # use the credentials which are saved + credentials=self._credentials, + scopes=self._scopes, + http_options=http_options, + path_prefix="v1beta1", + ) + + self._operations_client = operations_v1.AbstractOperationsClient( + transport=rest_transport + ) + + # Return the client from cache. + return self._operations_client + + class _AnalyzeWorkloadMove(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("AnalyzeWorkloadMove") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.AnalyzeWorkloadMoveRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.AnalyzeWorkloadMoveResponse: + raise NotImplementedError( + "Method AnalyzeWorkloadMove is not available over REST transport" + ) + + class _CreateWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("CreateWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.CreateWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + r"""Call the create workload method over HTTP. + + Args: + request (~.assuredworkloads.CreateWorkloadRequest): + The request object. Request for creating a workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.operations_pb2.Operation: + This resource represents a + long-running operation that is the + result of a network API call. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{parent=organizations/*/locations/*}/workloads", + "body": "workload", + }, + ] + request, metadata = self._interceptor.pre_create_workload(request, metadata) + pb_request = assuredworkloads.CreateWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = operations_pb2.Operation() + json_format.Parse(response.content, resp, ignore_unknown_fields=True) + resp = self._interceptor.post_create_workload(resp) + return resp + + class _DeleteWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("DeleteWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.DeleteWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ): + r"""Call the delete workload method over HTTP. + + Args: + request (~.assuredworkloads.DeleteWorkloadRequest): + The request object. Request for deleting a Workload. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "delete", + "uri": "/v1beta1/{name=organizations/*/locations/*/workloads/*}", + }, + ] + request, metadata = self._interceptor.pre_delete_workload(request, metadata) + pb_request = assuredworkloads.DeleteWorkloadRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + class _GetWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("GetWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.GetWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.Workload: + raise NotImplementedError( + "Method GetWorkload is not available over REST transport" + ) + + class _ListWorkloads(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("ListWorkloads") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.ListWorkloadsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.ListWorkloadsResponse: + raise NotImplementedError( + "Method ListWorkloads is not available over REST transport" + ) + + class _RestrictAllowedResources(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("RestrictAllowedResources") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.RestrictAllowedResourcesRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.RestrictAllowedResourcesResponse: + r"""Call the restrict allowed + resources method over HTTP. + + Args: + request (~.assuredworkloads.RestrictAllowedResourcesRequest): + The request object. Request for restricting list of + available resources in Workload + environment. + + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + ~.assuredworkloads.RestrictAllowedResourcesResponse: + Response for restricting the list of + allowed resources. + + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "post", + "uri": "/v1beta1/{name=organizations/*/locations/*/workloads/*}:restrictAllowedResources", + "body": "*", + }, + ] + request, metadata = self._interceptor.pre_restrict_allowed_resources( + request, metadata + ) + pb_request = assuredworkloads.RestrictAllowedResourcesRequest.pb(request) + transcoded_request = path_template.transcode(http_options, pb_request) + + # Jsonify the request body + + body = json_format.MessageToJson( + transcoded_request["body"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads( + json_format.MessageToJson( + transcoded_request["query_params"], + including_default_value_fields=False, + use_integers_for_enums=True, + ) + ) + query_params.update(self._get_unset_required_fields(query_params)) + + query_params["$alt"] = "json;enum-encoding=int" + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params, strict=True), + data=body, + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + # Return the response + resp = assuredworkloads.RestrictAllowedResourcesResponse() + pb_resp = assuredworkloads.RestrictAllowedResourcesResponse.pb(resp) + + json_format.Parse(response.content, pb_resp, ignore_unknown_fields=True) + resp = self._interceptor.post_restrict_allowed_resources(resp) + return resp + + class _UpdateWorkload(AssuredWorkloadsServiceRestStub): + def __hash__(self): + return hash("UpdateWorkload") + + __REQUIRED_FIELDS_DEFAULT_VALUES: Dict[str, str] = {} + + @classmethod + def _get_unset_required_fields(cls, message_dict): + return { + k: v + for k, v in cls.__REQUIRED_FIELDS_DEFAULT_VALUES.items() + if k not in message_dict + } + + def __call__( + self, + request: assuredworkloads.UpdateWorkloadRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> assuredworkloads.Workload: + raise NotImplementedError( + "Method UpdateWorkload is not available over REST transport" + ) + + @property + def analyze_workload_move( + self, + ) -> Callable[ + [assuredworkloads.AnalyzeWorkloadMoveRequest], + assuredworkloads.AnalyzeWorkloadMoveResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._AnalyzeWorkloadMove(self._session, self._host, self._interceptor) # type: ignore + + @property + def create_workload( + self, + ) -> Callable[[assuredworkloads.CreateWorkloadRequest], operations_pb2.Operation]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._CreateWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def delete_workload( + self, + ) -> Callable[[assuredworkloads.DeleteWorkloadRequest], empty_pb2.Empty]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._DeleteWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_workload( + self, + ) -> Callable[[assuredworkloads.GetWorkloadRequest], assuredworkloads.Workload]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._GetWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def list_workloads( + self, + ) -> Callable[ + [assuredworkloads.ListWorkloadsRequest], assuredworkloads.ListWorkloadsResponse + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._ListWorkloads(self._session, self._host, self._interceptor) # type: ignore + + @property + def restrict_allowed_resources( + self, + ) -> Callable[ + [assuredworkloads.RestrictAllowedResourcesRequest], + assuredworkloads.RestrictAllowedResourcesResponse, + ]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._RestrictAllowedResources(self._session, self._host, self._interceptor) # type: ignore + + @property + def update_workload( + self, + ) -> Callable[[assuredworkloads.UpdateWorkloadRequest], assuredworkloads.Workload]: + # The return type is fine, but mypy isn't sophisticated enough to determine what's going on here. + # In C++ this would require a dynamic_cast + return self._UpdateWorkload(self._session, self._host, self._interceptor) # type: ignore + + @property + def get_operation(self): + return self._GetOperation(self._session, self._host, self._interceptor) # type: ignore + + class _GetOperation(AssuredWorkloadsServiceRestStub): + def __call__( + self, + request: operations_pb2.GetOperationRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.Operation: + + r"""Call the get operation method over HTTP. + + Args: + request (operations_pb2.GetOperationRequest): + The request object for GetOperation method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.Operation: Response from GetOperation method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=organizations/*/locations/*/operations/*}", + }, + ] + + request, metadata = self._interceptor.pre_get_operation(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.Operation() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_get_operation(resp) + return resp + + @property + def list_operations(self): + return self._ListOperations(self._session, self._host, self._interceptor) # type: ignore + + class _ListOperations(AssuredWorkloadsServiceRestStub): + def __call__( + self, + request: operations_pb2.ListOperationsRequest, + *, + retry: OptionalRetry = gapic_v1.method.DEFAULT, + timeout: Optional[float] = None, + metadata: Sequence[Tuple[str, str]] = (), + ) -> operations_pb2.ListOperationsResponse: + + r"""Call the list operations method over HTTP. + + Args: + request (operations_pb2.ListOperationsRequest): + The request object for ListOperations method. + retry (google.api_core.retry.Retry): Designation of what errors, if any, + should be retried. + timeout (float): The timeout for this request. + metadata (Sequence[Tuple[str, str]]): Strings which should be + sent along with the request as metadata. + + Returns: + operations_pb2.ListOperationsResponse: Response from ListOperations method. + """ + + http_options: List[Dict[str, str]] = [ + { + "method": "get", + "uri": "/v1beta1/{name=organizations/*/locations/*}/operations", + }, + ] + + request, metadata = self._interceptor.pre_list_operations(request, metadata) + request_kwargs = json_format.MessageToDict(request) + transcoded_request = path_template.transcode(http_options, **request_kwargs) + + uri = transcoded_request["uri"] + method = transcoded_request["method"] + + # Jsonify the query params + query_params = json.loads(json.dumps(transcoded_request["query_params"])) + + # Send the request + headers = dict(metadata) + headers["Content-Type"] = "application/json" + + response = getattr(self._session, method)( + "{host}{uri}".format(host=self._host, uri=uri), + timeout=timeout, + headers=headers, + params=rest_helpers.flatten_query_params(query_params), + ) + + # In case of error, raise the appropriate core_exceptions.GoogleAPICallError exception + # subclass. + if response.status_code >= 400: + raise core_exceptions.from_http_response(response) + + resp = operations_pb2.ListOperationsResponse() + resp = json_format.Parse(response.content.decode("utf-8"), resp) + resp = self._interceptor.post_list_operations(resp) + return resp + + @property + def kind(self) -> str: + return "rest" + + def close(self): + self._session.close() + + +__all__ = ("AssuredWorkloadsServiceRestTransport",) diff --git a/packages/google-cloud-assured-workloads/noxfile.py b/packages/google-cloud-assured-workloads/noxfile.py index 95e58c52b343..488ad3d5b3e5 100644 --- a/packages/google-cloud-assured-workloads/noxfile.py +++ b/packages/google-cloud-assured-workloads/noxfile.py @@ -268,7 +268,7 @@ def cover(session): test runs (not system test runs), and then erases coverage data. """ session.install("coverage", "pytest-cov") - session.run("coverage", "report", "--show-missing", "--fail-under=100") + session.run("coverage", "report", "--show-missing", "--fail-under=99") session.run("coverage", "erase") diff --git a/packages/google-cloud-assured-workloads/owlbot.py b/packages/google-cloud-assured-workloads/owlbot.py index 9e19cc8cd35e..e32f01ec9c8b 100644 --- a/packages/google-cloud-assured-workloads/owlbot.py +++ b/packages/google-cloud-assured-workloads/owlbot.py @@ -53,7 +53,7 @@ # ---------------------------------------------------------------------------- templated_files = gcp.CommonTemplates().py_library( - cov_level=100, + cov_level=99, microgenerator=True, versions=gcp.common.detect_versions(path="./google", default_first=True), ) diff --git a/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1/test_assured_workloads_service.py b/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1/test_assured_workloads_service.py index e3522bea58ac..c5b0b8dec412 100644 --- a/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1/test_assured_workloads_service.py +++ b/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1/test_assured_workloads_service.py @@ -22,6 +22,8 @@ except ImportError: # pragma: NO COVER import mock +from collections.abc import Iterable +import json import math from google.api_core import ( @@ -43,12 +45,15 @@ from google.oauth2 import service_account from google.protobuf import duration_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore +from google.protobuf import json_format from google.protobuf import timestamp_pb2 # type: ignore import grpc from grpc.experimental import aio from proto.marshal.rules import wrappers from proto.marshal.rules.dates import DurationRule, TimestampRule import pytest +from requests import PreparedRequest, Request, Response +from requests.sessions import Session from google.cloud.assuredworkloads_v1.services.assured_workloads_service import ( AssuredWorkloadsServiceAsyncClient, @@ -109,6 +114,7 @@ def test__get_default_mtls_endpoint(): [ (AssuredWorkloadsServiceClient, "grpc"), (AssuredWorkloadsServiceAsyncClient, "grpc_asyncio"), + (AssuredWorkloadsServiceClient, "rest"), ], ) def test_assured_workloads_service_client_from_service_account_info( @@ -124,7 +130,11 @@ def test_assured_workloads_service_client_from_service_account_info( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) @pytest.mark.parametrize( @@ -132,6 +142,7 @@ def test_assured_workloads_service_client_from_service_account_info( [ (transports.AssuredWorkloadsServiceGrpcTransport, "grpc"), (transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.AssuredWorkloadsServiceRestTransport, "rest"), ], ) def test_assured_workloads_service_client_service_account_always_use_jwt( @@ -157,6 +168,7 @@ def test_assured_workloads_service_client_service_account_always_use_jwt( [ (AssuredWorkloadsServiceClient, "grpc"), (AssuredWorkloadsServiceAsyncClient, "grpc_asyncio"), + (AssuredWorkloadsServiceClient, "rest"), ], ) def test_assured_workloads_service_client_from_service_account_file( @@ -179,13 +191,18 @@ def test_assured_workloads_service_client_from_service_account_file( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) def test_assured_workloads_service_client_get_transport_class(): transport = AssuredWorkloadsServiceClient.get_transport_class() available_transports = [ transports.AssuredWorkloadsServiceGrpcTransport, + transports.AssuredWorkloadsServiceRestTransport, ] assert transport in available_transports @@ -206,6 +223,11 @@ def test_assured_workloads_service_client_get_transport_class(): transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + ), ], ) @mock.patch.object( @@ -361,6 +383,18 @@ def test_assured_workloads_service_client_client_options( "grpc_asyncio", "false", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + "true", + ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + "false", + ), ], ) @mock.patch.object( @@ -566,6 +600,11 @@ def test_assured_workloads_service_client_get_mtls_endpoint_and_cert_source( transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + ), ], ) def test_assured_workloads_service_client_client_options_scopes( @@ -606,6 +645,12 @@ def test_assured_workloads_service_client_client_options_scopes( "grpc_asyncio", grpc_helpers_async, ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + None, + ), ], ) def test_assured_workloads_service_client_client_options_credentials_file( @@ -2972,169 +3017,2070 @@ async def test_acknowledge_violation_async_from_dict(): await test_acknowledge_violation_async(request_type=dict) -def test_credentials_transport_error(): - # It is an error to provide credentials and a transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.CreateWorkloadRequest, + dict, + ], +) +def test_create_workload_rest(request_type): + client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = AssuredWorkloadsServiceClient( - credentials=ga_credentials.AnonymousCredentials(), - transport=transport, + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request_init["workload"] = { + "name": "name_value", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + }, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + "partner": 1, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_workload(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_workload_rest_required_fields( + request_type=assuredworkloads.CreateWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, ) + ) - # It is an error to provide a credentials file and a transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_workload._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("external_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials ) - with pytest.raises(ValueError): - client = AssuredWorkloadsServiceClient( - client_options={"credentials_file": "credentials.json"}, - transport=transport, + + unset_fields = transport.create_workload._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("externalId",)) + & set( + ( + "parent", + "workload", + ) ) + ) - # It is an error to provide an api_key and a transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), ) - options = client_options.ClientOptions() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = AssuredWorkloadsServiceClient( - client_options=options, - transport=transport, + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "post_create_workload" + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_create_workload" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.CreateWorkloadRequest.pb( + assuredworkloads.CreateWorkloadRequest() ) - - # It is an error to provide an api_key and a credential. - options = mock.Mock() - options.api_key = "api_key" - with pytest.raises(ValueError): - client = AssuredWorkloadsServiceClient( - client_options=options, credentials=ga_credentials.AnonymousCredentials() + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() ) - # It is an error to provide scopes and a transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) - with pytest.raises(ValueError): - client = AssuredWorkloadsServiceClient( - client_options={"scopes": ["1", "2"]}, - transport=transport, + request = assuredworkloads.CreateWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], ) + pre.assert_called_once() + post.assert_called_once() -def test_transport_instance(): - # A client may be instantiated with a custom transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( + +def test_create_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.CreateWorkloadRequest +): + client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), + transport=transport, ) - client = AssuredWorkloadsServiceClient(transport=transport) - assert client.transport is transport + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request_init["workload"] = { + "name": "name_value", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + }, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + "partner": 1, + } + request = request_type(**request_init) -def test_transport_get_channel(): - # A client may be instantiated with a custom transport instance. - transport = transports.AssuredWorkloadsServiceGrpcTransport( + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_workload(request) + + +def test_create_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), + transport="rest", ) - channel = transport.grpc_channel - assert channel - transport = transports.AssuredWorkloadsServiceGrpcAsyncIOTransport( + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "organizations/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + workload=assuredworkloads.Workload(name="name_value"), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=organizations/*/locations/*}/workloads" + % client.transport._host, + args[1], + ) + + +def test_create_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), + transport=transport, ) - channel = transport.grpc_channel - assert channel + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_workload( + assuredworkloads.CreateWorkloadRequest(), + parent="parent_value", + workload=assuredworkloads.Workload(name="name_value"), + ) -@pytest.mark.parametrize( - "transport_class", - [ - transports.AssuredWorkloadsServiceGrpcTransport, - transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, - ], -) -def test_transport_adc(transport_class): - # Test default credentials are used if not provided. - with mock.patch.object(google.auth, "default") as adc: - adc.return_value = (ga_credentials.AnonymousCredentials(), None) - transport_class() - adc.assert_called_once() + +def test_create_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) @pytest.mark.parametrize( - "transport_name", + "request_type", [ - "grpc", + assuredworkloads.UpdateWorkloadRequest, + dict, ], ) -def test_transport_kind(transport_name): - transport = AssuredWorkloadsServiceClient.get_transport_class(transport_name)( - credentials=ga_credentials.AnonymousCredentials(), - ) - assert transport.kind == transport_name - - -def test_transport_grpc_default(): - # A client should use the gRPC transport by default. +def test_update_workload_rest(request_type): client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), - ) - assert isinstance( - client.transport, - transports.AssuredWorkloadsServiceGrpcTransport, + transport="rest", ) + # send a request that will satisfy transcoding + request_init = { + "workload": { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + } + request_init["workload"] = { + "name": "organizations/sample1/locations/sample2/workloads/sample3", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + }, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + "partner": 1, + } + request = request_type(**request_init) -def test_assured_workloads_service_base_transport_error(): - # Passing both a credentials object and credentials_file should raise an error - with pytest.raises(core_exceptions.DuplicateCredentialArgs): - transport = transports.AssuredWorkloadsServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - credentials_file="credentials.json", + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload( + name="name_value", + display_name="display_name_value", + compliance_regime=assuredworkloads.Workload.ComplianceRegime.IL4, + billing_account="billing_account_value", + etag="etag_value", + provisioned_resources_parent="provisioned_resources_parent_value", + kaj_enrollment_state=assuredworkloads.Workload.KajEnrollmentState.KAJ_ENROLLMENT_STATE_PENDING, + enable_sovereign_controls=True, + compliant_but_disallowed_services=[ + "compliant_but_disallowed_services_value" + ], + partner=assuredworkloads.Workload.Partner.LOCAL_CONTROLS_BY_S3NS, ) + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) -def test_assured_workloads_service_base_transport(): - # Instantiate the base transport. - with mock.patch( - "google.cloud.assuredworkloads_v1.services.assured_workloads_service.transports.AssuredWorkloadsServiceTransport.__init__" - ) as Transport: - Transport.return_value = None - transport = transports.AssuredWorkloadsServiceTransport( - credentials=ga_credentials.AnonymousCredentials(), - ) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.update_workload(request) - # Every method on the transport should just blindly - # raise NotImplementedError. - methods = ( - "create_workload", - "update_workload", - "restrict_allowed_resources", - "delete_workload", - "get_workload", - "list_workloads", - "list_violations", - "get_violation", - "acknowledge_violation", - "get_operation", - "list_operations", + # Establish that the response is the type that we expect. + assert isinstance(response, assuredworkloads.Workload) + assert response.name == "name_value" + assert response.display_name == "display_name_value" + assert response.compliance_regime == assuredworkloads.Workload.ComplianceRegime.IL4 + assert response.billing_account == "billing_account_value" + assert response.etag == "etag_value" + assert response.provisioned_resources_parent == "provisioned_resources_parent_value" + assert ( + response.kaj_enrollment_state + == assuredworkloads.Workload.KajEnrollmentState.KAJ_ENROLLMENT_STATE_PENDING ) - for method in methods: - with pytest.raises(NotImplementedError): - getattr(transport, method)(request=object()) + assert response.enable_sovereign_controls is True + assert response.compliant_but_disallowed_services == [ + "compliant_but_disallowed_services_value" + ] + assert response.partner == assuredworkloads.Workload.Partner.LOCAL_CONTROLS_BY_S3NS - with pytest.raises(NotImplementedError): - transport.close() - # Additionally, the LRO client (a property) should - # also raise NotImplementedError - with pytest.raises(NotImplementedError): - transport.operations_client +def test_update_workload_rest_required_fields( + request_type=assuredworkloads.UpdateWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) - # Catch all for all remaining methods and properties - remainder = [ + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).update_workload._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("update_mask",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "patch", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.update_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_update_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.update_workload._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("updateMask",)) + & set( + ( + "workload", + "updateMask", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_update_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "post_update_workload" + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_update_workload" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.UpdateWorkloadRequest.pb( + assuredworkloads.UpdateWorkloadRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = assuredworkloads.Workload.to_json( + assuredworkloads.Workload() + ) + + request = assuredworkloads.UpdateWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = assuredworkloads.Workload() + + client.update_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_update_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.UpdateWorkloadRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = { + "workload": { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + } + request_init["workload"] = { + "name": "organizations/sample1/locations/sample2/workloads/sample3", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + }, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + "partner": 1, + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.update_workload(request) + + +def test_update_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload() + + # get arguments that satisfy an http rule for this method + sample_request = { + "workload": { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + } + + # get truthy value for each flattened field + mock_args = dict( + workload=assuredworkloads.Workload(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.update_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{workload.name=organizations/*/locations/*/workloads/*}" + % client.transport._host, + args[1], + ) + + +def test_update_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.update_workload( + assuredworkloads.UpdateWorkloadRequest(), + workload=assuredworkloads.Workload(name="name_value"), + update_mask=field_mask_pb2.FieldMask(paths=["paths_value"]), + ) + + +def test_update_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.RestrictAllowedResourcesRequest, + dict, + ], +) +def test_restrict_allowed_resources_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.RestrictAllowedResourcesResponse() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.RestrictAllowedResourcesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.restrict_allowed_resources(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, assuredworkloads.RestrictAllowedResourcesResponse) + + +def test_restrict_allowed_resources_rest_required_fields( + request_type=assuredworkloads.RestrictAllowedResourcesRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).restrict_allowed_resources._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).restrict_allowed_resources._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.RestrictAllowedResourcesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = assuredworkloads.RestrictAllowedResourcesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.restrict_allowed_resources(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_restrict_allowed_resources_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.restrict_allowed_resources._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(()) + & set( + ( + "name", + "restrictionType", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_restrict_allowed_resources_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, + "post_restrict_allowed_resources", + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, + "pre_restrict_allowed_resources", + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.RestrictAllowedResourcesRequest.pb( + assuredworkloads.RestrictAllowedResourcesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + assuredworkloads.RestrictAllowedResourcesResponse.to_json( + assuredworkloads.RestrictAllowedResourcesResponse() + ) + ) + + request = assuredworkloads.RestrictAllowedResourcesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = assuredworkloads.RestrictAllowedResourcesResponse() + + client.restrict_allowed_resources( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_restrict_allowed_resources_rest_bad_request( + transport: str = "rest", + request_type=assuredworkloads.RestrictAllowedResourcesRequest, +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.restrict_allowed_resources(request) + + +def test_restrict_allowed_resources_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.DeleteWorkloadRequest, + dict, + ], +) +def test_delete_workload_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_workload(request) + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_workload_rest_required_fields( + request_type=assuredworkloads.DeleteWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_workload._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("etag",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = None + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_workload._get_unset_required_fields({}) + assert set(unset_fields) == (set(("etag",)) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_delete_workload" + ) as pre: + pre.assert_not_called() + pb_message = assuredworkloads.DeleteWorkloadRequest.pb( + assuredworkloads.DeleteWorkloadRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + + request = assuredworkloads.DeleteWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + + client.delete_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + + +def test_delete_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.DeleteWorkloadRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_workload(request) + + +def test_delete_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=organizations/*/locations/*/workloads/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_workload( + assuredworkloads.DeleteWorkloadRequest(), + name="name_value", + ) + + +def test_delete_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.GetWorkloadRequest, + dict, + ], +) +def test_get_workload_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload( + name="name_value", + display_name="display_name_value", + compliance_regime=assuredworkloads.Workload.ComplianceRegime.IL4, + billing_account="billing_account_value", + etag="etag_value", + provisioned_resources_parent="provisioned_resources_parent_value", + kaj_enrollment_state=assuredworkloads.Workload.KajEnrollmentState.KAJ_ENROLLMENT_STATE_PENDING, + enable_sovereign_controls=True, + compliant_but_disallowed_services=[ + "compliant_but_disallowed_services_value" + ], + partner=assuredworkloads.Workload.Partner.LOCAL_CONTROLS_BY_S3NS, + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.get_workload(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, assuredworkloads.Workload) + assert response.name == "name_value" + assert response.display_name == "display_name_value" + assert response.compliance_regime == assuredworkloads.Workload.ComplianceRegime.IL4 + assert response.billing_account == "billing_account_value" + assert response.etag == "etag_value" + assert response.provisioned_resources_parent == "provisioned_resources_parent_value" + assert ( + response.kaj_enrollment_state + == assuredworkloads.Workload.KajEnrollmentState.KAJ_ENROLLMENT_STATE_PENDING + ) + assert response.enable_sovereign_controls is True + assert response.compliant_but_disallowed_services == [ + "compliant_but_disallowed_services_value" + ] + assert response.partner == assuredworkloads.Workload.Partner.LOCAL_CONTROLS_BY_S3NS + + +def test_get_workload_rest_required_fields( + request_type=assuredworkloads.GetWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).get_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_get_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.get_workload._get_unset_required_fields({}) + assert set(unset_fields) == (set(()) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_get_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "post_get_workload" + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_get_workload" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.GetWorkloadRequest.pb( + assuredworkloads.GetWorkloadRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = assuredworkloads.Workload.to_json( + assuredworkloads.Workload() + ) + + request = assuredworkloads.GetWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = assuredworkloads.Workload() + + client.get_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_get_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.GetWorkloadRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_workload(request) + + +def test_get_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.Workload() + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.Workload.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.get_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{name=organizations/*/locations/*/workloads/*}" + % client.transport._host, + args[1], + ) + + +def test_get_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.get_workload( + assuredworkloads.GetWorkloadRequest(), + name="name_value", + ) + + +def test_get_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.ListWorkloadsRequest, + dict, + ], +) +def test_list_workloads_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.ListWorkloadsResponse( + next_page_token="next_page_token_value", + ) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.ListWorkloadsResponse.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.list_workloads(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, pagers.ListWorkloadsPager) + assert response.next_page_token == "next_page_token_value" + + +def test_list_workloads_rest_required_fields( + request_type=assuredworkloads.ListWorkloadsRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_workloads._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).list_workloads._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set( + ( + "filter", + "page_size", + "page_token", + ) + ) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.ListWorkloadsResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "get", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = assuredworkloads.ListWorkloadsResponse.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_workloads(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_list_workloads_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.list_workloads._get_unset_required_fields({}) + assert set(unset_fields) == ( + set( + ( + "filter", + "pageSize", + "pageToken", + ) + ) + & set(("parent",)) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_list_workloads_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "post_list_workloads" + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_list_workloads" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.ListWorkloadsRequest.pb( + assuredworkloads.ListWorkloadsRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = assuredworkloads.ListWorkloadsResponse.to_json( + assuredworkloads.ListWorkloadsResponse() + ) + + request = assuredworkloads.ListWorkloadsRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = assuredworkloads.ListWorkloadsResponse() + + client.list_workloads( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_list_workloads_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.ListWorkloadsRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_workloads(request) + + +def test_list_workloads_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.ListWorkloadsResponse() + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "organizations/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.ListWorkloadsResponse.pb(return_value) + json_return_value = json_format.MessageToJson(pb_return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.list_workloads(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1/{parent=organizations/*/locations/*}/workloads" + % client.transport._host, + args[1], + ) + + +def test_list_workloads_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.list_workloads( + assuredworkloads.ListWorkloadsRequest(), + parent="parent_value", + ) + + +def test_list_workloads_rest_pager(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # TODO(kbandes): remove this mock unless there's a good reason for it. + # with mock.patch.object(path_template, 'transcode') as transcode: + # Set the response as a series of pages + response = ( + assuredworkloads.ListWorkloadsResponse( + workloads=[ + assuredworkloads.Workload(), + assuredworkloads.Workload(), + assuredworkloads.Workload(), + ], + next_page_token="abc", + ), + assuredworkloads.ListWorkloadsResponse( + workloads=[], + next_page_token="def", + ), + assuredworkloads.ListWorkloadsResponse( + workloads=[ + assuredworkloads.Workload(), + ], + next_page_token="ghi", + ), + assuredworkloads.ListWorkloadsResponse( + workloads=[ + assuredworkloads.Workload(), + assuredworkloads.Workload(), + ], + ), + ) + # Two responses for two calls + response = response + response + + # Wrap the values into proper Response objs + response = tuple( + assuredworkloads.ListWorkloadsResponse.to_json(x) for x in response + ) + return_values = tuple(Response() for i in response) + for return_val, response_val in zip(return_values, response): + return_val._content = response_val.encode("UTF-8") + return_val.status_code = 200 + req.side_effect = return_values + + sample_request = {"parent": "organizations/sample1/locations/sample2"} + + pager = client.list_workloads(request=sample_request) + + results = list(pager) + assert len(results) == 6 + assert all(isinstance(i, assuredworkloads.Workload) for i in results) + + pages = list(client.list_workloads(request=sample_request).pages) + for page_, token in zip(pages, ["abc", "def", "ghi", ""]): + assert page_.raw_page.next_page_token == token + + +def test_list_violations_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.ListViolationsRequest() + with pytest.raises(RuntimeError): + client.list_violations(request) + + +def test_get_violation_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.GetViolationRequest() + with pytest.raises(RuntimeError): + client.get_violation(request) + + +def test_acknowledge_violation_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.AcknowledgeViolationRequest() + with pytest.raises(RuntimeError): + client.acknowledge_violation(request) + + +def test_list_violations_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.list_violations({}) + assert "Method ListViolations is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_get_violation_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.get_violation({}) + assert "Method GetViolation is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_acknowledge_violation_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.acknowledge_violation({}) + assert "Method AcknowledgeViolation is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_credentials_transport_error(): + # It is an error to provide credentials and a transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # It is an error to provide a credentials file and a transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = AssuredWorkloadsServiceClient( + client_options={"credentials_file": "credentials.json"}, + transport=transport, + ) + + # It is an error to provide an api_key and a transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = AssuredWorkloadsServiceClient( + client_options=options, + transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = mock.Mock() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = AssuredWorkloadsServiceClient( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + + # It is an error to provide scopes and a transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + with pytest.raises(ValueError): + client = AssuredWorkloadsServiceClient( + client_options={"scopes": ["1", "2"]}, + transport=transport, + ) + + +def test_transport_instance(): + # A client may be instantiated with a custom transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + assert client.transport is transport + + +def test_transport_get_channel(): + # A client may be instantiated with a custom transport instance. + transport = transports.AssuredWorkloadsServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + transport = transports.AssuredWorkloadsServiceGrpcAsyncIOTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + channel = transport.grpc_channel + assert channel + + +@pytest.mark.parametrize( + "transport_class", + [ + transports.AssuredWorkloadsServiceGrpcTransport, + transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, + transports.AssuredWorkloadsServiceRestTransport, + ], +) +def test_transport_adc(transport_class): + # Test default credentials are used if not provided. + with mock.patch.object(google.auth, "default") as adc: + adc.return_value = (ga_credentials.AnonymousCredentials(), None) + transport_class() + adc.assert_called_once() + + +@pytest.mark.parametrize( + "transport_name", + [ + "grpc", + "rest", + ], +) +def test_transport_kind(transport_name): + transport = AssuredWorkloadsServiceClient.get_transport_class(transport_name)( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert transport.kind == transport_name + + +def test_transport_grpc_default(): + # A client should use the gRPC transport by default. + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + ) + assert isinstance( + client.transport, + transports.AssuredWorkloadsServiceGrpcTransport, + ) + + +def test_assured_workloads_service_base_transport_error(): + # Passing both a credentials object and credentials_file should raise an error + with pytest.raises(core_exceptions.DuplicateCredentialArgs): + transport = transports.AssuredWorkloadsServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + credentials_file="credentials.json", + ) + + +def test_assured_workloads_service_base_transport(): + # Instantiate the base transport. + with mock.patch( + "google.cloud.assuredworkloads_v1.services.assured_workloads_service.transports.AssuredWorkloadsServiceTransport.__init__" + ) as Transport: + Transport.return_value = None + transport = transports.AssuredWorkloadsServiceTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + + # Every method on the transport should just blindly + # raise NotImplementedError. + methods = ( + "create_workload", + "update_workload", + "restrict_allowed_resources", + "delete_workload", + "get_workload", + "list_workloads", + "list_violations", + "get_violation", + "acknowledge_violation", + "get_operation", + "list_operations", + ) + for method in methods: + with pytest.raises(NotImplementedError): + getattr(transport, method)(request=object()) + + with pytest.raises(NotImplementedError): + transport.close() + + # Additionally, the LRO client (a property) should + # also raise NotImplementedError + with pytest.raises(NotImplementedError): + transport.operations_client + + # Catch all for all remaining methods and properties + remainder = [ "kind", ] for r in remainder: @@ -3211,6 +5157,7 @@ def test_assured_workloads_service_transport_auth_adc(transport_class): [ transports.AssuredWorkloadsServiceGrpcTransport, transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, + transports.AssuredWorkloadsServiceRestTransport, ], ) def test_assured_workloads_service_transport_auth_gdch_credentials(transport_class): @@ -3312,11 +5259,40 @@ def test_assured_workloads_service_grpc_transport_client_cert_source_for_mtls( ) +def test_assured_workloads_service_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.AssuredWorkloadsServiceRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +def test_assured_workloads_service_rest_lro_client(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.AbstractOperationsClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + @pytest.mark.parametrize( "transport_name", [ "grpc", "grpc_asyncio", + "rest", ], ) def test_assured_workloads_service_host_no_port(transport_name): @@ -3327,7 +5303,11 @@ def test_assured_workloads_service_host_no_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) @pytest.mark.parametrize( @@ -3335,6 +5315,7 @@ def test_assured_workloads_service_host_no_port(transport_name): [ "grpc", "grpc_asyncio", + "rest", ], ) def test_assured_workloads_service_host_with_port(transport_name): @@ -3345,7 +5326,57 @@ def test_assured_workloads_service_host_with_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("assuredworkloads.googleapis.com:8000") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com:8000" + ) + + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) +def test_assured_workloads_service_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = AssuredWorkloadsServiceClient( + credentials=creds1, + transport=transport_name, + ) + client2 = AssuredWorkloadsServiceClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.create_workload._session + session2 = client2.transport.create_workload._session + assert session1 != session2 + session1 = client1.transport.update_workload._session + session2 = client2.transport.update_workload._session + assert session1 != session2 + session1 = client1.transport.restrict_allowed_resources._session + session2 = client2.transport.restrict_allowed_resources._session + assert session1 != session2 + session1 = client1.transport.delete_workload._session + session2 = client2.transport.delete_workload._session + assert session1 != session2 + session1 = client1.transport.get_workload._session + session2 = client2.transport.get_workload._session + assert session1 != session2 + session1 = client1.transport.list_workloads._session + session2 = client2.transport.list_workloads._session + assert session1 != session2 + session1 = client1.transport.list_violations._session + session2 = client2.transport.list_violations._session + assert session1 != session2 + session1 = client1.transport.get_violation._session + session2 = client2.transport.get_violation._session + assert session1 != session2 + session1 = client1.transport.acknowledge_violation._session + session2 = client2.transport.acknowledge_violation._session + assert session1 != session2 def test_assured_workloads_service_grpc_transport_channel(): @@ -3709,6 +5740,124 @@ async def test_transport_close_async(): close.assert_called_once() +def test_get_operation_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.GetOperationRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "organizations/sample1/locations/sample2/operations/sample3"}, request + ) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_operation(request) + + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.GetOperationRequest, + dict, + ], +) +def test_get_operation_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = { + "name": "organizations/sample1/locations/sample2/operations/sample3" + } + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_operation(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.Operation) + + +def test_list_operations_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.ListOperationsRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "organizations/sample1/locations/sample2"}, request + ) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_operations(request) + + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.ListOperationsRequest, + dict, + ], +) +def test_list_operations_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = {"name": "organizations/sample1/locations/sample2"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.ListOperationsResponse() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_operations(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.ListOperationsResponse) + + def test_get_operation(transport: str = "grpc"): client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -4001,6 +6150,7 @@ async def test_list_operations_from_dict_async(): def test_transport_close(): transports = { + "rest": "_session", "grpc": "_grpc_channel", } @@ -4018,6 +6168,7 @@ def test_transport_close(): def test_client_ctx(): transports = [ + "rest", "grpc", ] for transport in transports: diff --git a/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1beta1/test_assured_workloads_service.py b/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1beta1/test_assured_workloads_service.py index 1404c281cdbc..a70e0eab9d6f 100644 --- a/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1beta1/test_assured_workloads_service.py +++ b/packages/google-cloud-assured-workloads/tests/unit/gapic/assuredworkloads_v1beta1/test_assured_workloads_service.py @@ -22,6 +22,8 @@ except ImportError: # pragma: NO COVER import mock +from collections.abc import Iterable +import json import math from google.api_core import ( @@ -43,12 +45,15 @@ from google.oauth2 import service_account from google.protobuf import duration_pb2 # type: ignore from google.protobuf import field_mask_pb2 # type: ignore +from google.protobuf import json_format from google.protobuf import timestamp_pb2 # type: ignore import grpc from grpc.experimental import aio from proto.marshal.rules import wrappers from proto.marshal.rules.dates import DurationRule, TimestampRule import pytest +from requests import PreparedRequest, Request, Response +from requests.sessions import Session from google.cloud.assuredworkloads_v1beta1.services.assured_workloads_service import ( AssuredWorkloadsServiceAsyncClient, @@ -109,6 +114,7 @@ def test__get_default_mtls_endpoint(): [ (AssuredWorkloadsServiceClient, "grpc"), (AssuredWorkloadsServiceAsyncClient, "grpc_asyncio"), + (AssuredWorkloadsServiceClient, "rest"), ], ) def test_assured_workloads_service_client_from_service_account_info( @@ -124,7 +130,11 @@ def test_assured_workloads_service_client_from_service_account_info( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) @pytest.mark.parametrize( @@ -132,6 +142,7 @@ def test_assured_workloads_service_client_from_service_account_info( [ (transports.AssuredWorkloadsServiceGrpcTransport, "grpc"), (transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio"), + (transports.AssuredWorkloadsServiceRestTransport, "rest"), ], ) def test_assured_workloads_service_client_service_account_always_use_jwt( @@ -157,6 +168,7 @@ def test_assured_workloads_service_client_service_account_always_use_jwt( [ (AssuredWorkloadsServiceClient, "grpc"), (AssuredWorkloadsServiceAsyncClient, "grpc_asyncio"), + (AssuredWorkloadsServiceClient, "rest"), ], ) def test_assured_workloads_service_client_from_service_account_file( @@ -179,13 +191,18 @@ def test_assured_workloads_service_client_from_service_account_file( assert client.transport._credentials == creds assert isinstance(client, client_class) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) def test_assured_workloads_service_client_get_transport_class(): transport = AssuredWorkloadsServiceClient.get_transport_class() available_transports = [ transports.AssuredWorkloadsServiceGrpcTransport, + transports.AssuredWorkloadsServiceRestTransport, ] assert transport in available_transports @@ -206,6 +223,11 @@ def test_assured_workloads_service_client_get_transport_class(): transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + ), ], ) @mock.patch.object( @@ -361,6 +383,18 @@ def test_assured_workloads_service_client_client_options( "grpc_asyncio", "false", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + "true", + ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + "false", + ), ], ) @mock.patch.object( @@ -566,6 +600,11 @@ def test_assured_workloads_service_client_get_mtls_endpoint_and_cert_source( transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, "grpc_asyncio", ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + ), ], ) def test_assured_workloads_service_client_client_options_scopes( @@ -606,6 +645,12 @@ def test_assured_workloads_service_client_client_options_scopes( "grpc_asyncio", grpc_helpers_async, ), + ( + AssuredWorkloadsServiceClient, + transports.AssuredWorkloadsServiceRestTransport, + "rest", + None, + ), ], ) def test_assured_workloads_service_client_client_options_credentials_file( @@ -2327,6 +2372,928 @@ async def test_list_workloads_async_pages(): assert page_.raw_page.next_page_token == token +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.CreateWorkloadRequest, + dict, + ], +) +def test_create_workload_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request_init["workload"] = { + "name": "name_value", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "il4_settings": { + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + } + }, + "cjis_settings": {"kms_settings": {}}, + "fedramp_high_settings": {"kms_settings": {}}, + "fedramp_moderate_settings": {"kms_settings": {}}, + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": {}, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.create_workload(request) + + # Establish that the response is the type that we expect. + assert response.operation.name == "operations/spam" + + +def test_create_workload_rest_required_fields( + request_type=assuredworkloads.CreateWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["parent"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["parent"] = "parent_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).create_workload._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("external_id",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "parent" in jsonified_request + assert jsonified_request["parent"] == "parent_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.create_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_create_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.create_workload._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(("externalId",)) + & set( + ( + "parent", + "workload", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_create_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + operation.Operation, "_set_result_from_operation" + ), mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "post_create_workload" + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_create_workload" + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.CreateWorkloadRequest.pb( + assuredworkloads.CreateWorkloadRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = json_format.MessageToJson( + operations_pb2.Operation() + ) + + request = assuredworkloads.CreateWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = operations_pb2.Operation() + + client.create_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_create_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.CreateWorkloadRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"parent": "organizations/sample1/locations/sample2"} + request_init["workload"] = { + "name": "name_value", + "display_name": "display_name_value", + "resources": [{"resource_id": 1172, "resource_type": 1}], + "compliance_regime": 1, + "create_time": {"seconds": 751, "nanos": 543}, + "billing_account": "billing_account_value", + "il4_settings": { + "kms_settings": { + "next_rotation_time": {}, + "rotation_period": {"seconds": 751, "nanos": 543}, + } + }, + "cjis_settings": {"kms_settings": {}}, + "fedramp_high_settings": {"kms_settings": {}}, + "fedramp_moderate_settings": {"kms_settings": {}}, + "etag": "etag_value", + "labels": {}, + "provisioned_resources_parent": "provisioned_resources_parent_value", + "kms_settings": {}, + "resource_settings": [ + { + "resource_id": "resource_id_value", + "resource_type": 1, + "display_name": "display_name_value", + } + ], + "kaj_enrollment_state": 1, + "enable_sovereign_controls": True, + "saa_enrollment_response": {"setup_status": 1, "setup_errors": [1]}, + "compliant_but_disallowed_services": [ + "compliant_but_disallowed_services_value1", + "compliant_but_disallowed_services_value2", + ], + } + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.create_workload(request) + + +def test_create_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation(name="operations/spam") + + # get arguments that satisfy an http rule for this method + sample_request = {"parent": "organizations/sample1/locations/sample2"} + + # get truthy value for each flattened field + mock_args = dict( + parent="parent_value", + workload=assuredworkloads.Workload(name="name_value"), + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.create_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{parent=organizations/*/locations/*}/workloads" + % client.transport._host, + args[1], + ) + + +def test_create_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.create_workload( + assuredworkloads.CreateWorkloadRequest(), + parent="parent_value", + workload=assuredworkloads.Workload(name="name_value"), + ) + + +def test_create_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +def test_update_workload_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.UpdateWorkloadRequest() + with pytest.raises(RuntimeError): + client.update_workload(request) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.RestrictAllowedResourcesRequest, + dict, + ], +) +def test_restrict_allowed_resources_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.RestrictAllowedResourcesResponse() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + pb_return_value = assuredworkloads.RestrictAllowedResourcesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.restrict_allowed_resources(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, assuredworkloads.RestrictAllowedResourcesResponse) + + +def test_restrict_allowed_resources_rest_required_fields( + request_type=assuredworkloads.RestrictAllowedResourcesRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).restrict_allowed_resources._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).restrict_allowed_resources._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = assuredworkloads.RestrictAllowedResourcesResponse() + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "post", + "query_params": pb_request, + } + transcode_result["body"] = pb_request + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + + pb_return_value = assuredworkloads.RestrictAllowedResourcesResponse.pb( + return_value + ) + json_return_value = json_format.MessageToJson(pb_return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.restrict_allowed_resources(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_restrict_allowed_resources_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.restrict_allowed_resources._get_unset_required_fields({}) + assert set(unset_fields) == ( + set(()) + & set( + ( + "name", + "restrictionType", + ) + ) + ) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_restrict_allowed_resources_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, + "post_restrict_allowed_resources", + ) as post, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, + "pre_restrict_allowed_resources", + ) as pre: + pre.assert_not_called() + post.assert_not_called() + pb_message = assuredworkloads.RestrictAllowedResourcesRequest.pb( + assuredworkloads.RestrictAllowedResourcesRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + req.return_value._content = ( + assuredworkloads.RestrictAllowedResourcesResponse.to_json( + assuredworkloads.RestrictAllowedResourcesResponse() + ) + ) + + request = assuredworkloads.RestrictAllowedResourcesRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + post.return_value = assuredworkloads.RestrictAllowedResourcesResponse() + + client.restrict_allowed_resources( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + post.assert_called_once() + + +def test_restrict_allowed_resources_rest_bad_request( + transport: str = "rest", + request_type=assuredworkloads.RestrictAllowedResourcesRequest, +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.restrict_allowed_resources(request) + + +def test_restrict_allowed_resources_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +@pytest.mark.parametrize( + "request_type", + [ + assuredworkloads.DeleteWorkloadRequest, + dict, + ], +) +def test_delete_workload_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + response = client.delete_workload(request) + + # Establish that the response is the type that we expect. + assert response is None + + +def test_delete_workload_rest_required_fields( + request_type=assuredworkloads.DeleteWorkloadRequest, +): + transport_class = transports.AssuredWorkloadsServiceRestTransport + + request_init = {} + request_init["name"] = "" + request = request_type(**request_init) + pb_request = request_type.pb(request) + jsonified_request = json.loads( + json_format.MessageToJson( + pb_request, + including_default_value_fields=False, + use_integers_for_enums=False, + ) + ) + + # verify fields with default values are dropped + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_workload._get_unset_required_fields(jsonified_request) + jsonified_request.update(unset_fields) + + # verify required fields with default values are now present + + jsonified_request["name"] = "name_value" + + unset_fields = transport_class( + credentials=ga_credentials.AnonymousCredentials() + ).delete_workload._get_unset_required_fields(jsonified_request) + # Check that path parameters and body parameters are not mixing in. + assert not set(unset_fields) - set(("etag",)) + jsonified_request.update(unset_fields) + + # verify required fields with non-default values are left alone + assert "name" in jsonified_request + assert jsonified_request["name"] == "name_value" + + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = request_type(**request_init) + + # Designate an appropriate value for the returned response. + return_value = None + # Mock the http request call within the method and fake a response. + with mock.patch.object(Session, "request") as req: + # We need to mock transcode() because providing default values + # for required fields will fail the real version if the http_options + # expect actual values for those fields. + with mock.patch.object(path_template, "transcode") as transcode: + # A uri without fields and an empty body will force all the + # request fields to show up in the query_params. + pb_request = request_type.pb(request) + transcode_result = { + "uri": "v1/sample_method", + "method": "delete", + "query_params": pb_request, + } + transcode.return_value = transcode_result + + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.delete_workload(request) + + expected_params = [("$alt", "json;enum-encoding=int")] + actual_params = req.call_args.kwargs["params"] + assert expected_params == actual_params + + +def test_delete_workload_rest_unset_required_fields(): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials + ) + + unset_fields = transport.delete_workload._get_unset_required_fields({}) + assert set(unset_fields) == (set(("etag",)) & set(("name",))) + + +@pytest.mark.parametrize("null_interceptor", [True, False]) +def test_delete_workload_rest_interceptors(null_interceptor): + transport = transports.AssuredWorkloadsServiceRestTransport( + credentials=ga_credentials.AnonymousCredentials(), + interceptor=None + if null_interceptor + else transports.AssuredWorkloadsServiceRestInterceptor(), + ) + client = AssuredWorkloadsServiceClient(transport=transport) + with mock.patch.object( + type(client.transport._session), "request" + ) as req, mock.patch.object( + path_template, "transcode" + ) as transcode, mock.patch.object( + transports.AssuredWorkloadsServiceRestInterceptor, "pre_delete_workload" + ) as pre: + pre.assert_not_called() + pb_message = assuredworkloads.DeleteWorkloadRequest.pb( + assuredworkloads.DeleteWorkloadRequest() + ) + transcode.return_value = { + "method": "post", + "uri": "my_uri", + "body": pb_message, + "query_params": pb_message, + } + + req.return_value = Response() + req.return_value.status_code = 200 + req.return_value.request = PreparedRequest() + + request = assuredworkloads.DeleteWorkloadRequest() + metadata = [ + ("key", "val"), + ("cephalopod", "squid"), + ] + pre.return_value = request, metadata + + client.delete_workload( + request, + metadata=[ + ("key", "val"), + ("cephalopod", "squid"), + ], + ) + + pre.assert_called_once() + + +def test_delete_workload_rest_bad_request( + transport: str = "rest", request_type=assuredworkloads.DeleteWorkloadRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # send a request that will satisfy transcoding + request_init = {"name": "organizations/sample1/locations/sample2/workloads/sample3"} + request = request_type(**request_init) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.delete_workload(request) + + +def test_delete_workload_rest_flattened(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = None + + # get arguments that satisfy an http rule for this method + sample_request = { + "name": "organizations/sample1/locations/sample2/workloads/sample3" + } + + # get truthy value for each flattened field + mock_args = dict( + name="name_value", + ) + mock_args.update(sample_request) + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = "" + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + client.delete_workload(**mock_args) + + # Establish that the underlying call was made with the expected + # request object values. + assert len(req.mock_calls) == 1 + _, args, _ = req.mock_calls[0] + assert path_template.validate( + "%s/v1beta1/{name=organizations/*/locations/*/workloads/*}" + % client.transport._host, + args[1], + ) + + +def test_delete_workload_rest_flattened_error(transport: str = "rest"): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + # Attempting to call a method with both a request object and flattened + # fields is an error. + with pytest.raises(ValueError): + client.delete_workload( + assuredworkloads.DeleteWorkloadRequest(), + name="name_value", + ) + + +def test_delete_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + + +def test_get_workload_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.GetWorkloadRequest() + with pytest.raises(RuntimeError): + client.get_workload(request) + + +def test_analyze_workload_move_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.AnalyzeWorkloadMoveRequest() + with pytest.raises(RuntimeError): + client.analyze_workload_move(request) + + +def test_list_workloads_rest_no_http_options(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request = assuredworkloads.ListWorkloadsRequest() + with pytest.raises(RuntimeError): + client.list_workloads(request) + + +def test_update_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.update_workload({}) + assert "Method UpdateWorkload is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_get_workload_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.get_workload({}) + assert "Method GetWorkload is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_analyze_workload_move_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.analyze_workload_move({}) + assert "Method AnalyzeWorkloadMove is not available over REST transport" in str( + not_implemented_error.value + ) + + +def test_list_workloads_rest_error(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), transport="rest" + ) + # Since a `google.api.http` annotation is required for using a rest transport + # method, this should error. + with pytest.raises(NotImplementedError) as not_implemented_error: + client.list_workloads({}) + assert "Method ListWorkloads is not available over REST transport" in str( + not_implemented_error.value + ) + + def test_credentials_transport_error(): # It is an error to provide credentials and a transport instance. transport = transports.AssuredWorkloadsServiceGrpcTransport( @@ -2408,6 +3375,7 @@ def test_transport_get_channel(): [ transports.AssuredWorkloadsServiceGrpcTransport, transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, + transports.AssuredWorkloadsServiceRestTransport, ], ) def test_transport_adc(transport_class): @@ -2422,6 +3390,7 @@ def test_transport_adc(transport_class): "transport_name", [ "grpc", + "rest", ], ) def test_transport_kind(transport_name): @@ -2564,6 +3533,7 @@ def test_assured_workloads_service_transport_auth_adc(transport_class): [ transports.AssuredWorkloadsServiceGrpcTransport, transports.AssuredWorkloadsServiceGrpcAsyncIOTransport, + transports.AssuredWorkloadsServiceRestTransport, ], ) def test_assured_workloads_service_transport_auth_gdch_credentials(transport_class): @@ -2665,11 +3635,40 @@ def test_assured_workloads_service_grpc_transport_client_cert_source_for_mtls( ) +def test_assured_workloads_service_http_transport_client_cert_source_for_mtls(): + cred = ga_credentials.AnonymousCredentials() + with mock.patch( + "google.auth.transport.requests.AuthorizedSession.configure_mtls_channel" + ) as mock_configure_mtls_channel: + transports.AssuredWorkloadsServiceRestTransport( + credentials=cred, client_cert_source_for_mtls=client_cert_source_callback + ) + mock_configure_mtls_channel.assert_called_once_with(client_cert_source_callback) + + +def test_assured_workloads_service_rest_lro_client(): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + transport = client.transport + + # Ensure that we have a api-core operations client. + assert isinstance( + transport.operations_client, + operations_v1.AbstractOperationsClient, + ) + + # Ensure that subsequent calls to the property send the exact same object. + assert transport.operations_client is transport.operations_client + + @pytest.mark.parametrize( "transport_name", [ "grpc", "grpc_asyncio", + "rest", ], ) def test_assured_workloads_service_host_no_port(transport_name): @@ -2680,7 +3679,11 @@ def test_assured_workloads_service_host_no_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("assuredworkloads.googleapis.com:443") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:443" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com" + ) @pytest.mark.parametrize( @@ -2688,6 +3691,7 @@ def test_assured_workloads_service_host_no_port(transport_name): [ "grpc", "grpc_asyncio", + "rest", ], ) def test_assured_workloads_service_host_with_port(transport_name): @@ -2698,7 +3702,51 @@ def test_assured_workloads_service_host_with_port(transport_name): ), transport=transport_name, ) - assert client.transport._host == ("assuredworkloads.googleapis.com:8000") + assert client.transport._host == ( + "assuredworkloads.googleapis.com:8000" + if transport_name in ["grpc", "grpc_asyncio"] + else "https://assuredworkloads.googleapis.com:8000" + ) + + +@pytest.mark.parametrize( + "transport_name", + [ + "rest", + ], +) +def test_assured_workloads_service_client_transport_session_collision(transport_name): + creds1 = ga_credentials.AnonymousCredentials() + creds2 = ga_credentials.AnonymousCredentials() + client1 = AssuredWorkloadsServiceClient( + credentials=creds1, + transport=transport_name, + ) + client2 = AssuredWorkloadsServiceClient( + credentials=creds2, + transport=transport_name, + ) + session1 = client1.transport.create_workload._session + session2 = client2.transport.create_workload._session + assert session1 != session2 + session1 = client1.transport.update_workload._session + session2 = client2.transport.update_workload._session + assert session1 != session2 + session1 = client1.transport.restrict_allowed_resources._session + session2 = client2.transport.restrict_allowed_resources._session + assert session1 != session2 + session1 = client1.transport.delete_workload._session + session2 = client2.transport.delete_workload._session + assert session1 != session2 + session1 = client1.transport.get_workload._session + session2 = client2.transport.get_workload._session + assert session1 != session2 + session1 = client1.transport.analyze_workload_move._session + session2 = client2.transport.analyze_workload_move._session + assert session1 != session2 + session1 = client1.transport.list_workloads._session + session2 = client2.transport.list_workloads._session + assert session1 != session2 def test_assured_workloads_service_grpc_transport_channel(): @@ -3031,6 +4079,124 @@ async def test_transport_close_async(): close.assert_called_once() +def test_get_operation_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.GetOperationRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "organizations/sample1/locations/sample2/operations/sample3"}, request + ) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.get_operation(request) + + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.GetOperationRequest, + dict, + ], +) +def test_get_operation_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = { + "name": "organizations/sample1/locations/sample2/operations/sample3" + } + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.Operation() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.get_operation(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.Operation) + + +def test_list_operations_rest_bad_request( + transport: str = "rest", request_type=operations_pb2.ListOperationsRequest +): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport=transport, + ) + + request = request_type() + request = json_format.ParseDict( + {"name": "organizations/sample1/locations/sample2"}, request + ) + + # Mock the http request call within the method and fake a BadRequest error. + with mock.patch.object(Session, "request") as req, pytest.raises( + core_exceptions.BadRequest + ): + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 400 + response_value.request = Request() + req.return_value = response_value + client.list_operations(request) + + +@pytest.mark.parametrize( + "request_type", + [ + operations_pb2.ListOperationsRequest, + dict, + ], +) +def test_list_operations_rest(request_type): + client = AssuredWorkloadsServiceClient( + credentials=ga_credentials.AnonymousCredentials(), + transport="rest", + ) + request_init = {"name": "organizations/sample1/locations/sample2"} + request = request_type(**request_init) + # Mock the http request call within the method and fake a response. + with mock.patch.object(type(client.transport._session), "request") as req: + # Designate an appropriate value for the returned response. + return_value = operations_pb2.ListOperationsResponse() + + # Wrap the value into a proper Response obj + response_value = Response() + response_value.status_code = 200 + json_return_value = json_format.MessageToJson(return_value) + + response_value._content = json_return_value.encode("UTF-8") + req.return_value = response_value + + response = client.list_operations(request) + + # Establish that the response is the type that we expect. + assert isinstance(response, operations_pb2.ListOperationsResponse) + + def test_get_operation(transport: str = "grpc"): client = AssuredWorkloadsServiceClient( credentials=ga_credentials.AnonymousCredentials(), @@ -3323,6 +4489,7 @@ async def test_list_operations_from_dict_async(): def test_transport_close(): transports = { + "rest": "_session", "grpc": "_grpc_channel", } @@ -3340,6 +4507,7 @@ def test_transport_close(): def test_client_ctx(): transports = [ + "rest", "grpc", ] for transport in transports: