From fecf4844db8e44a12f3ea42af7663196177a6b1a Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 3 Feb 2022 14:15:09 +0000 Subject: [PATCH 1/6] chore: use gapic-generator-python 0.62.1 (#240) - [ ] Regenerate this pull request now. fix: resolve DuplicateCredentialArgs error when using credentials_file committer: parthea PiperOrigin-RevId: 425964861 Source-Link: https://github.com/googleapis/googleapis/commit/84b1a5a4f6fb2d04905be58e586b8a7a4310a8cf Source-Link: https://github.com/googleapis/googleapis-gen/commit/4fb761bbd8506ac156f49bac5f18306aa8eb3aa8 Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNGZiNzYxYmJkODUwNmFjMTU2ZjQ5YmFjNWYxODMwNmFhOGViM2FhOCJ9 --- .../container_analysis/async_client.py | 8 +- .../services/container_analysis/client.py | 8 +- .../container_analysis/transports/grpc.py | 5 +- .../transports/grpc_asyncio.py | 5 +- .../test_container_analysis.py | 79 ++++++++++++++++++- 5 files changed, 92 insertions(+), 13 deletions(-) diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py index 3969923..4285801 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py @@ -327,7 +327,7 @@ async def set_iam_policy( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource]) if request is not None and has_flattened_params: @@ -461,7 +461,7 @@ async def get_iam_policy( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource]) if request is not None and has_flattened_params: @@ -549,7 +549,7 @@ async def test_iam_permissions( Response message for TestIamPermissions method. """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource, permissions]) if request is not None and has_flattened_params: @@ -632,7 +632,7 @@ async def get_vulnerability_occurrences_summary( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent, filter]) if request is not None and has_flattened_params: diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py index f20929a..994b48a 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py @@ -512,7 +512,7 @@ def set_iam_policy( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource]) if request is not None and has_flattened_params: @@ -645,7 +645,7 @@ def get_iam_policy( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource]) if request is not None and has_flattened_params: @@ -732,7 +732,7 @@ def test_iam_permissions( Response message for TestIamPermissions method. """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([resource, permissions]) if request is not None and has_flattened_params: @@ -814,7 +814,7 @@ def get_vulnerability_occurrences_summary( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent, filter]) if request is not None and has_flattened_params: diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc.py index d74b00a..105d62d 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc.py @@ -174,8 +174,11 @@ def __init__( if not self._grpc_channel: self._grpc_channel = type(self).create_channel( self._host, + # use the credentials which are saved credentials=self._credentials, - credentials_file=credentials_file, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, scopes=self._scopes, ssl_credentials=self._ssl_channel_credentials, quota_project_id=quota_project_id, diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc_asyncio.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc_asyncio.py index d31bc85..234982c 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc_asyncio.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/transports/grpc_asyncio.py @@ -219,8 +219,11 @@ def __init__( if not self._grpc_channel: self._grpc_channel = type(self).create_channel( self._host, + # use the credentials which are saved credentials=self._credentials, - credentials_file=credentials_file, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, scopes=self._scopes, ssl_credentials=self._ssl_channel_credentials, quota_project_id=quota_project_id, diff --git a/tests/unit/gapic/containeranalysis_v1/test_container_analysis.py b/tests/unit/gapic/containeranalysis_v1/test_container_analysis.py index a8aafb0..3583384 100644 --- a/tests/unit/gapic/containeranalysis_v1/test_container_analysis.py +++ b/tests/unit/gapic/containeranalysis_v1/test_container_analysis.py @@ -528,21 +528,28 @@ def test_container_analysis_client_client_options_scopes( @pytest.mark.parametrize( - "client_class,transport_class,transport_name", + "client_class,transport_class,transport_name,grpc_helpers", [ - (ContainerAnalysisClient, transports.ContainerAnalysisGrpcTransport, "grpc"), + ( + ContainerAnalysisClient, + transports.ContainerAnalysisGrpcTransport, + "grpc", + grpc_helpers, + ), ( ContainerAnalysisAsyncClient, transports.ContainerAnalysisGrpcAsyncIOTransport, "grpc_asyncio", + grpc_helpers_async, ), ], ) def test_container_analysis_client_client_options_credentials_file( - client_class, transport_class, transport_name + client_class, transport_class, transport_name, grpc_helpers ): # Check the case credentials file is provided. options = client_options.ClientOptions(credentials_file="credentials.json") + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) @@ -578,6 +585,72 @@ def test_container_analysis_client_client_options_from_dict(): ) +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + ContainerAnalysisClient, + transports.ContainerAnalysisGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + ContainerAnalysisAsyncClient, + transports.ContainerAnalysisGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ], +) +def test_container_analysis_client_create_channel_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): + # Check the case credentials file is provided. + options = client_options.ClientOptions(credentials_file="credentials.json") + + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client.DEFAULT_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "containeranalysis.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + scopes=None, + default_host="containeranalysis.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + @pytest.mark.parametrize("request_type", [iam_policy_pb2.SetIamPolicyRequest, dict,]) def test_set_iam_policy(request_type, transport: str = "grpc"): client = ContainerAnalysisClient( From d2ec9e04494f2598e6dcd78ab73ed0208ef6f20b Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Mon, 7 Feb 2022 17:21:15 +0100 Subject: [PATCH 2/6] chore(deps): update dependency google-cloud-containeranalysis to v2.7.0 (#238) Co-authored-by: Anthonios Partheniou --- samples/snippets/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/samples/snippets/requirements.txt b/samples/snippets/requirements.txt index 67f01a1..cb2276d 100644 --- a/samples/snippets/requirements.txt +++ b/samples/snippets/requirements.txt @@ -1,5 +1,5 @@ google-cloud-pubsub==2.9.0 -google-cloud-containeranalysis==2.6.3 +google-cloud-containeranalysis==2.7.0 grafeas==1.4.1 pytest==6.2.5 flaky==3.7.0 From a85c782d1428b41d3181ed5c05538a4844406b73 Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Tue, 8 Feb 2022 23:11:11 +0100 Subject: [PATCH 3/6] chore(deps): update dependency pytest to v7 (#243) --- samples/snippets/requirements-test.txt | 2 +- samples/snippets/requirements.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/samples/snippets/requirements-test.txt b/samples/snippets/requirements-test.txt index 9270945..4a46ff6 100644 --- a/samples/snippets/requirements-test.txt +++ b/samples/snippets/requirements-test.txt @@ -1 +1 @@ -pytest==6.2.5 +pytest==7.0.0 diff --git a/samples/snippets/requirements.txt b/samples/snippets/requirements.txt index cb2276d..c282392 100644 --- a/samples/snippets/requirements.txt +++ b/samples/snippets/requirements.txt @@ -1,6 +1,6 @@ google-cloud-pubsub==2.9.0 google-cloud-containeranalysis==2.7.0 grafeas==1.4.1 -pytest==6.2.5 +pytest==7.0.0 flaky==3.7.0 mock==4.0.3 From 65721352034f1235770c295600ccd31949c96185 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 11 Feb 2022 14:23:11 -0700 Subject: [PATCH 4/6] chore: use gapic-generator-python 0.63.2 (#244) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: use gapic-generator-python 0.63.2 docs: add generated snippets PiperOrigin-RevId: 427792504 Source-Link: https://github.com/googleapis/googleapis/commit/55b9e1e0b3106c850d13958352bc0751147b6b15 Source-Link: https://github.com/googleapis/googleapis-gen/commit/bf4e86b753f42cb0edb1fd51fbe840d7da0a1cde Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiYmY0ZTg2Yjc1M2Y0MmNiMGVkYjFmZDUxZmJlODQwZDdkYTBhMWNkZSJ9 * 🦉 Updates from OwlBot See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot --- .../container_analysis/async_client.py | 81 ++++ .../services/container_analysis/client.py | 85 +++++ ...container_analysis_get_iam_policy_async.py | 45 +++ ..._container_analysis_get_iam_policy_sync.py | 45 +++ ...vulnerability_occurrences_summary_async.py | 45 +++ ..._vulnerability_occurrences_summary_sync.py | 45 +++ ...container_analysis_set_iam_policy_async.py | 45 +++ ..._container_analysis_set_iam_policy_sync.py | 45 +++ ...ner_analysis_test_iam_permissions_async.py | 46 +++ ...iner_analysis_test_iam_permissions_sync.py | 46 +++ ...snippet_metadata_containeranalysis_v1.json | 360 ++++++++++++++++++ 11 files changed, 888 insertions(+) create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_async.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_sync.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_async.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_sync.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_async.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_sync.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_async.py create mode 100644 samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_sync.py create mode 100644 samples/generated_samples/snippet_metadata_containeranalysis_v1.json diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py index 4285801..5c9a872 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/async_client.py @@ -248,6 +248,26 @@ async def set_iam_policy( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_set_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): The request object. Request message for `SetIamPolicy` @@ -382,6 +402,26 @@ async def get_iam_policy( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_get_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): The request object. Request message for `GetIamPolicy` @@ -516,6 +556,27 @@ async def test_iam_permissions( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_test_iam_permissions(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value_1', 'permissions_value_2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): The request object. Request message for @@ -602,6 +663,26 @@ async def get_vulnerability_occurrences_summary( r"""Gets a summary of the number and severity of occurrences. + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_get_vulnerability_occurrences_summary(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetVulnerabilityOccurrencesSummaryRequest( + parent="parent_value", + ) + + # Make the request + response = client.get_vulnerability_occurrences_summary(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.devtools.containeranalysis_v1.types.GetVulnerabilityOccurrencesSummaryRequest, dict]): The request object. Request to get a vulnerability diff --git a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py index 994b48a..d3f952b 100644 --- a/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py +++ b/google/cloud/devtools/containeranalysis_v1/services/container_analysis/client.py @@ -433,6 +433,27 @@ def set_iam_policy( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_set_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.SetIamPolicyRequest, dict]): The request object. Request message for `SetIamPolicy` @@ -566,6 +587,27 @@ def get_iam_policy( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_get_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.GetIamPolicyRequest, dict]): The request object. Request message for `GetIamPolicy` @@ -699,6 +741,28 @@ def test_iam_permissions( ``projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`` for occurrences. + + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_test_iam_permissions(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value_1', 'permissions_value_2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + Args: request (Union[google.iam.v1.iam_policy_pb2.TestIamPermissionsRequest, dict]): The request object. Request message for @@ -784,6 +848,27 @@ def get_vulnerability_occurrences_summary( r"""Gets a summary of the number and severity of occurrences. + + + .. code-block:: + + from google.cloud.devtools import containeranalysis_v1 + + def sample_get_vulnerability_occurrences_summary(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetVulnerabilityOccurrencesSummaryRequest( + parent="parent_value", + ) + + # Make the request + response = client.get_vulnerability_occurrences_summary(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.devtools.containeranalysis_v1.types.GetVulnerabilityOccurrencesSummaryRequest, dict]): The request object. Request to get a vulnerability diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_async.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_async.py new file mode 100644 index 0000000..2b0eb56 --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_async.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_async] +from google.cloud.devtools import containeranalysis_v1 + + +async def sample_get_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisAsyncClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_async] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_sync.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_sync.py new file mode 100644 index 0000000..6f34fc4 --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_sync.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_sync] +from google.cloud.devtools import containeranalysis_v1 + + +def sample_get_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.get_iam_policy(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_sync] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_async.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_async.py new file mode 100644 index 0000000..5c5a3cf --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_async.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetVulnerabilityOccurrencesSummary +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_async] +from google.cloud.devtools import containeranalysis_v1 + + +async def sample_get_vulnerability_occurrences_summary(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisAsyncClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetVulnerabilityOccurrencesSummaryRequest( + parent="parent_value", + ) + + # Make the request + response = await client.get_vulnerability_occurrences_summary(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_async] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_sync.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_sync.py new file mode 100644 index 0000000..61b32c5 --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_sync.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetVulnerabilityOccurrencesSummary +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_sync] +from google.cloud.devtools import containeranalysis_v1 + + +def sample_get_vulnerability_occurrences_summary(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.GetVulnerabilityOccurrencesSummaryRequest( + parent="parent_value", + ) + + # Make the request + response = client.get_vulnerability_occurrences_summary(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_sync] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_async.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_async.py new file mode 100644 index 0000000..a93e73b --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_async.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_async] +from google.cloud.devtools import containeranalysis_v1 + + +async def sample_set_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisAsyncClient() + + # Initialize request argument(s) + request = containeranalysis_v1.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = await client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_async] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_sync.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_sync.py new file mode 100644 index 0000000..9651d81 --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_sync.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for SetIamPolicy +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_sync] +from google.cloud.devtools import containeranalysis_v1 + + +def sample_set_iam_policy(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.SetIamPolicyRequest( + resource="resource_value", + ) + + # Make the request + response = client.set_iam_policy(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_sync] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_async.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_async.py new file mode 100644 index 0000000..614918c --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_async.py @@ -0,0 +1,46 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_async] +from google.cloud.devtools import containeranalysis_v1 + + +async def sample_test_iam_permissions(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisAsyncClient() + + # Initialize request argument(s) + request = containeranalysis_v1.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value_1', 'permissions_value_2'], + ) + + # Make the request + response = await client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_async] diff --git a/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_sync.py b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_sync.py new file mode 100644 index 0000000..af34e08 --- /dev/null +++ b/samples/generated_samples/containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_sync.py @@ -0,0 +1,46 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for TestIamPermissions +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-devtools-containeranalysis + + +# [START containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_sync] +from google.cloud.devtools import containeranalysis_v1 + + +def sample_test_iam_permissions(): + # Create a client + client = containeranalysis_v1.ContainerAnalysisClient() + + # Initialize request argument(s) + request = containeranalysis_v1.TestIamPermissionsRequest( + resource="resource_value", + permissions=['permissions_value_1', 'permissions_value_2'], + ) + + # Make the request + response = client.test_iam_permissions(request=request) + + # Handle the response + print(response) + +# [END containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_sync] diff --git a/samples/generated_samples/snippet_metadata_containeranalysis_v1.json b/samples/generated_samples/snippet_metadata_containeranalysis_v1.json new file mode 100644 index 0000000..7e86c69 --- /dev/null +++ b/samples/generated_samples/snippet_metadata_containeranalysis_v1.json @@ -0,0 +1,360 @@ +{ + "snippets": [ + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "GetIamPolicy" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_async.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_async", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "GetIamPolicy" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_get_iam_policy_sync.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetIamPolicy_sync", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "GetVulnerabilityOccurrencesSummary" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_async.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_async", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "GetVulnerabilityOccurrencesSummary" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_get_vulnerability_occurrences_summary_sync.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_GetVulnerabilityOccurrencesSummary_sync", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "SetIamPolicy" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_async.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_async", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "SetIamPolicy" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_set_iam_policy_sync.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_SetIamPolicy_sync", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "TestIamPermissions" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_async.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_async", + "segments": [ + { + "end": 45, + "start": 27, + "type": "FULL" + }, + { + "end": 45, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 39, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 42, + "start": 40, + "type": "REQUEST_EXECUTION" + }, + { + "end": 46, + "start": 43, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ContainerAnalysis" + }, + "shortName": "TestIamPermissions" + } + }, + "file": "containeranalysis_generated_containeranalysis_v1_container_analysis_test_iam_permissions_sync.py", + "regionTag": "containeranalysis_generated_containeranalysis_v1_ContainerAnalysis_TestIamPermissions_sync", + "segments": [ + { + "end": 45, + "start": 27, + "type": "FULL" + }, + { + "end": 45, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 39, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 42, + "start": 40, + "type": "REQUEST_EXECUTION" + }, + { + "end": 46, + "start": 43, + "type": "RESPONSE_HANDLING" + } + ] + } + ] +} From bb4d3e0bc4f316b80d21f07929e7ae30858a8abd Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Sat, 12 Feb 2022 00:26:54 +0100 Subject: [PATCH 5/6] chore(deps): update dependency pytest to v7.0.1 (#245) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![WhiteSource Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [pytest](https://docs.pytest.org/en/latest/) ([source](https://togithub.com/pytest-dev/pytest), [changelog](https://docs.pytest.org/en/stable/changelog.html)) | `==7.0.0` -> `==7.0.1` | [![age](https://badges.renovateapi.com/packages/pypi/pytest/7.0.1/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/pypi/pytest/7.0.1/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/pypi/pytest/7.0.1/compatibility-slim/7.0.0)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/pypi/pytest/7.0.1/confidence-slim/7.0.0)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
pytest-dev/pytest ### [`v7.0.1`](https://togithub.com/pytest-dev/pytest/releases/7.0.1) [Compare Source](https://togithub.com/pytest-dev/pytest/compare/7.0.0...7.0.1) # pytest 7.0.1 (2022-02-11) ## Bug Fixes - [#​9608](https://togithub.com/pytest-dev/pytest/issues/9608): Fix invalid importing of `importlib.readers` in Python 3.9. - [#​9610](https://togithub.com/pytest-dev/pytest/issues/9610): Restore \[UnitTestFunction.obj]{.title-ref} to return unbound rather than bound method. Fixes a crash during a failed teardown in unittest TestCases with non-default \[\__init\_\_]{.title-ref}. Regressed in pytest 7.0.0. - [#​9636](https://togithub.com/pytest-dev/pytest/issues/9636): The `pythonpath` plugin was renamed to `python_path`. This avoids a conflict with the `pytest-pythonpath` plugin. - [#​9642](https://togithub.com/pytest-dev/pytest/issues/9642): Fix running tests by id with `::` in the parametrize portion. - [#​9643](https://togithub.com/pytest-dev/pytest/issues/9643): Delay issuing a `~pytest.PytestWarning`{.interpreted-text role="class"} about diamond inheritance involving `~pytest.Item`{.interpreted-text role="class"} and `~pytest.Collector`{.interpreted-text role="class"} so it can be filtered using `standard warning filters `{.interpreted-text role="ref"}.
--- ### Configuration 📅 **Schedule**: At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [WhiteSource Renovate](https://renovate.whitesourcesoftware.com). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/python-containeranalysis). --- samples/snippets/requirements-test.txt | 2 +- samples/snippets/requirements.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/samples/snippets/requirements-test.txt b/samples/snippets/requirements-test.txt index 4a46ff6..c2845bf 100644 --- a/samples/snippets/requirements-test.txt +++ b/samples/snippets/requirements-test.txt @@ -1 +1 @@ -pytest==7.0.0 +pytest==7.0.1 diff --git a/samples/snippets/requirements.txt b/samples/snippets/requirements.txt index c282392..d12d241 100644 --- a/samples/snippets/requirements.txt +++ b/samples/snippets/requirements.txt @@ -1,6 +1,6 @@ google-cloud-pubsub==2.9.0 google-cloud-containeranalysis==2.7.0 grafeas==1.4.1 -pytest==7.0.0 +pytest==7.0.1 flaky==3.7.0 mock==4.0.3 From a0125436b8abd8531e162e060db6d0a4048d076c Mon Sep 17 00:00:00 2001 From: "release-please[bot]" <55107282+release-please[bot]@users.noreply.github.com> Date: Thu, 17 Feb 2022 12:42:43 -0700 Subject: [PATCH 6/6] chore(main): release 2.7.1 (#241) Co-authored-by: release-please[bot] <55107282+release-please[bot]@users.noreply.github.com> Co-authored-by: Ace Nassri --- CHANGELOG.md | 7 +++++++ setup.py | 2 +- 2 files changed, 8 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 7573edc..37e60f8 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,12 @@ # Changelog +### [2.7.1](https://github.com/googleapis/python-containeranalysis/compare/v2.7.0...v2.7.1) (2022-02-11) + + +### Bug Fixes + +* resolve DuplicateCredentialArgs error when using credentials_file ([fecf484](https://github.com/googleapis/python-containeranalysis/commit/fecf4844db8e44a12f3ea42af7663196177a6b1a)) + ## [2.7.0](https://github.com/googleapis/python-containeranalysis/compare/v2.6.3...v2.7.0) (2022-01-25) diff --git a/setup.py b/setup.py index c08edb6..842ee5b 100644 --- a/setup.py +++ b/setup.py @@ -22,7 +22,7 @@ name = "google-cloud-containeranalysis" description = "Container Analysis API API client library" -version = "2.7.0" +version = "2.7.1" release_status = "Development Status :: 5 - Production/Stable" dependencies = [ # NOTE: Maintainers, please do not require google-api-core>=2.x.x