Skip to content
This repository has been archived by the owner on Sep 16, 2023. It is now read-only.

Commit

Permalink
fix: Add shopt -s nullglob to dependencies script (#556)
Browse files Browse the repository at this point in the history
This PR was generated using Autosynth. 🌈

Synth log will be available here:
https://source.cloud.google.com/results/invocations/4f0c8683-6c90-4b30-b663-6b28da4d229a/targets

- [ ] To automatically regenerate this PR, check this box. (May take up to 24 hours.)

Source-Link: googleapis/synthtool@87254ac
  • Loading branch information
yoshi-automation committed Jul 6, 2021
1 parent 2d5676b commit 8014dd0
Show file tree
Hide file tree
Showing 4 changed files with 30 additions and 20 deletions.
1 change: 1 addition & 0 deletions .kokoro/dependencies.sh
Expand Up @@ -14,6 +14,7 @@
# limitations under the License.

set -eo pipefail
shopt -s nullglob

## Get the directory of the build script
scriptDir=$(realpath $(dirname "${BASH_SOURCE[0]}"))
Expand Down
Expand Up @@ -685,7 +685,7 @@ public final void deleteNotificationConfig(DeleteNotificationConfigRequest reque
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* ResourceName resource = ProjectName.of("[PROJECT]");
* ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
* Policy response = securityCenterClient.getIamPolicy(resource);
* }
* }</pre>
Expand All @@ -710,7 +710,8 @@ public final Policy getIamPolicy(ResourceName resource) {
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* String resource = ProjectName.of("[PROJECT]").toString();
* String resource =
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString();
* Policy response = securityCenterClient.getIamPolicy(resource);
* }
* }</pre>
Expand All @@ -734,7 +735,8 @@ public final Policy getIamPolicy(String resource) {
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* GetIamPolicyRequest request =
* GetIamPolicyRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .setOptions(GetPolicyOptions.newBuilder().build())
* .build();
* Policy response = securityCenterClient.getIamPolicy(request);
Expand All @@ -758,7 +760,8 @@ public final Policy getIamPolicy(GetIamPolicyRequest request) {
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* GetIamPolicyRequest request =
* GetIamPolicyRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .setOptions(GetPolicyOptions.newBuilder().build())
* .build();
* ApiFuture<Policy> future = securityCenterClient.getIamPolicyCallable().futureCall(request);
Expand Down Expand Up @@ -2203,7 +2206,7 @@ public final UnaryCallable<SetFindingStateRequest, Finding> setFindingStateCalla
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* ResourceName resource = ProjectName.of("[PROJECT]");
* ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
* Policy policy = Policy.newBuilder().build();
* Policy response = securityCenterClient.setIamPolicy(resource, policy);
* }
Expand Down Expand Up @@ -2233,7 +2236,8 @@ public final Policy setIamPolicy(ResourceName resource, Policy policy) {
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* String resource = ProjectName.of("[PROJECT]").toString();
* String resource =
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString();
* Policy policy = Policy.newBuilder().build();
* Policy response = securityCenterClient.setIamPolicy(resource, policy);
* }
Expand Down Expand Up @@ -2262,7 +2266,8 @@ public final Policy setIamPolicy(String resource, Policy policy) {
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* SetIamPolicyRequest request =
* SetIamPolicyRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .setPolicy(Policy.newBuilder().build())
* .build();
* Policy response = securityCenterClient.setIamPolicy(request);
Expand All @@ -2286,7 +2291,8 @@ public final Policy setIamPolicy(SetIamPolicyRequest request) {
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* SetIamPolicyRequest request =
* SetIamPolicyRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .setPolicy(Policy.newBuilder().build())
* .build();
* ApiFuture<Policy> future = securityCenterClient.setIamPolicyCallable().futureCall(request);
Expand All @@ -2307,7 +2313,7 @@ public final UnaryCallable<SetIamPolicyRequest, Policy> setIamPolicyCallable() {
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* ResourceName resource = ProjectName.of("[PROJECT]");
* ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
* List<String> permissions = new ArrayList<>();
* TestIamPermissionsResponse response =
* securityCenterClient.testIamPermissions(resource, permissions);
Expand Down Expand Up @@ -2339,7 +2345,8 @@ public final TestIamPermissionsResponse testIamPermissions(
*
* <pre>{@code
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* String resource = ProjectName.of("[PROJECT]").toString();
* String resource =
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString();
* List<String> permissions = new ArrayList<>();
* TestIamPermissionsResponse response =
* securityCenterClient.testIamPermissions(resource, permissions);
Expand Down Expand Up @@ -2373,7 +2380,8 @@ public final TestIamPermissionsResponse testIamPermissions(
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* TestIamPermissionsRequest request =
* TestIamPermissionsRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .addAllPermissions(new ArrayList<String>())
* .build();
* TestIamPermissionsResponse response = securityCenterClient.testIamPermissions(request);
Expand All @@ -2397,7 +2405,8 @@ public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsReq
* try (SecurityCenterClient securityCenterClient = SecurityCenterClient.create()) {
* TestIamPermissionsRequest request =
* TestIamPermissionsRequest.newBuilder()
* .setResource(ProjectName.of("[PROJECT]").toString())
* .setResource(
* SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]").toString())
* .addAllPermissions(new ArrayList<String>())
* .build();
* ApiFuture<TestIamPermissionsResponse> future =
Expand Down
Expand Up @@ -576,7 +576,7 @@ public void getIamPolicyTest() throws Exception {
.build();
mockSecurityCenter.addResponse(expectedResponse);

ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");

Policy actualResponse = client.getIamPolicy(resource);
Assert.assertEquals(expectedResponse, actualResponse);
Expand All @@ -598,7 +598,7 @@ public void getIamPolicyExceptionTest() throws Exception {
mockSecurityCenter.addException(exception);

try {
ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
client.getIamPolicy(resource);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
Expand Down Expand Up @@ -1685,7 +1685,7 @@ public void setIamPolicyTest() throws Exception {
.build();
mockSecurityCenter.addResponse(expectedResponse);

ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
Policy policy = Policy.newBuilder().build();

Policy actualResponse = client.setIamPolicy(resource, policy);
Expand All @@ -1709,7 +1709,7 @@ public void setIamPolicyExceptionTest() throws Exception {
mockSecurityCenter.addException(exception);

try {
ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
Policy policy = Policy.newBuilder().build();
client.setIamPolicy(resource, policy);
Assert.fail("No exception raised");
Expand Down Expand Up @@ -1767,7 +1767,7 @@ public void testIamPermissionsTest() throws Exception {
TestIamPermissionsResponse.newBuilder().addAllPermissions(new ArrayList<String>()).build();
mockSecurityCenter.addResponse(expectedResponse);

ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
List<String> permissions = new ArrayList<>();

TestIamPermissionsResponse actualResponse = client.testIamPermissions(resource, permissions);
Expand All @@ -1791,7 +1791,7 @@ public void testIamPermissionsExceptionTest() throws Exception {
mockSecurityCenter.addException(exception);

try {
ResourceName resource = ProjectName.of("[PROJECT]");
ResourceName resource = SourceName.ofOrganizationSourceName("[ORGANIZATION]", "[SOURCE]");
List<String> permissions = new ArrayList<>();
client.testIamPermissions(resource, permissions);
Assert.fail("No exception raised");
Expand Down
4 changes: 2 additions & 2 deletions synth.metadata
Expand Up @@ -4,7 +4,7 @@
"git": {
"name": ".",
"remote": "https://github.com/googleapis/java-securitycenter.git",
"sha": "0f09e7c4b671f04a3aa2cdaebb6bdbce2e9f0eda"
"sha": "4ec2592edd8cbb7430dd3005e5366b404ef219da"
}
},
{
Expand Down Expand Up @@ -35,7 +35,7 @@
"git": {
"name": "synthtool",
"remote": "https://github.com/googleapis/synthtool.git",
"sha": "1c0c698705e668ccb3d68556ae7260f16ce63a6e"
"sha": "87254ac89a9559864c0a245d6b150406439ce3d8"
}
}
],
Expand Down

0 comments on commit 8014dd0

Please sign in to comment.