From 728e5e08738e4954c3f1f9eecda5c1d1753501c3 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 24 Sep 2021 15:10:21 +0000 Subject: [PATCH] chore: use gapic-generator-python 0.51.2 (#178) - [ ] Regenerate this pull request now. fix: add 'dict' annotation type to 'request' Committer: @busunkim96 PiperOrigin-RevId: 398509016 Source-Link: https://github.com/googleapis/googleapis/commit/b224dfa52642a733ea64849d4e06d15c274bc08f Source-Link: https://github.com/googleapis/googleapis-gen/commit/63a1db7a38d74b9639592f521ed1daaf7299ad9a Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNjNhMWRiN2EzOGQ3NGI5NjM5NTkyZjUyMWVkMWRhYWY3Mjk5YWQ5YSJ9 --- .../services/key_management_service/client.py | 106 +++++++++--------- .../key_management_service/transports/base.py | 2 +- .../key_management_service/transports/grpc.py | 6 +- .../transports/grpc_asyncio.py | 6 +- scripts/fixup_kms_v1_keywords.py | 54 ++++----- 5 files changed, 87 insertions(+), 87 deletions(-) diff --git a/google/cloud/kms_v1/services/key_management_service/client.py b/google/cloud/kms_v1/services/key_management_service/client.py index ca78a45c..df0bea93 100644 --- a/google/cloud/kms_v1/services/key_management_service/client.py +++ b/google/cloud/kms_v1/services/key_management_service/client.py @@ -17,7 +17,7 @@ from distutils import util import os import re -from typing import Callable, Dict, Optional, Sequence, Tuple, Type, Union +from typing import Dict, Optional, Sequence, Tuple, Type, Union import pkg_resources from google.api_core import client_options as client_options_lib # type: ignore @@ -472,7 +472,7 @@ def __init__( def list_key_rings( self, - request: service.ListKeyRingsRequest = None, + request: Union[service.ListKeyRingsRequest, dict] = None, *, parent: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -483,7 +483,7 @@ def list_key_rings( Args: - request (google.cloud.kms_v1.types.ListKeyRingsRequest): + request (Union[google.cloud.kms_v1.types.ListKeyRingsRequest, dict]): The request object. Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. parent (str): @@ -554,7 +554,7 @@ def list_key_rings( def list_crypto_keys( self, - request: service.ListCryptoKeysRequest = None, + request: Union[service.ListCryptoKeysRequest, dict] = None, *, parent: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -565,7 +565,7 @@ def list_crypto_keys( Args: - request (google.cloud.kms_v1.types.ListCryptoKeysRequest): + request (Union[google.cloud.kms_v1.types.ListCryptoKeysRequest, dict]): The request object. Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. parent (str): @@ -636,7 +636,7 @@ def list_crypto_keys( def list_crypto_key_versions( self, - request: service.ListCryptoKeyVersionsRequest = None, + request: Union[service.ListCryptoKeyVersionsRequest, dict] = None, *, parent: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -647,7 +647,7 @@ def list_crypto_key_versions( Args: - request (google.cloud.kms_v1.types.ListCryptoKeyVersionsRequest): + request (Union[google.cloud.kms_v1.types.ListCryptoKeyVersionsRequest, dict]): The request object. Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. parent (str): @@ -719,7 +719,7 @@ def list_crypto_key_versions( def list_import_jobs( self, - request: service.ListImportJobsRequest = None, + request: Union[service.ListImportJobsRequest, dict] = None, *, parent: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -730,7 +730,7 @@ def list_import_jobs( Args: - request (google.cloud.kms_v1.types.ListImportJobsRequest): + request (Union[google.cloud.kms_v1.types.ListImportJobsRequest, dict]): The request object. Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. parent (str): @@ -801,7 +801,7 @@ def list_import_jobs( def get_key_ring( self, - request: service.GetKeyRingRequest = None, + request: Union[service.GetKeyRingRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -813,7 +813,7 @@ def get_key_ring( Args: - request (google.cloud.kms_v1.types.GetKeyRingRequest): + request (Union[google.cloud.kms_v1.types.GetKeyRingRequest, dict]): The request object. Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. name (str): @@ -875,7 +875,7 @@ def get_key_ring( def get_crypto_key( self, - request: service.GetCryptoKeyRequest = None, + request: Union[service.GetCryptoKeyRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -889,7 +889,7 @@ def get_crypto_key( Args: - request (google.cloud.kms_v1.types.GetCryptoKeyRequest): + request (Union[google.cloud.kms_v1.types.GetCryptoKeyRequest, dict]): The request object. Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. name (str): @@ -957,7 +957,7 @@ def get_crypto_key( def get_crypto_key_version( self, - request: service.GetCryptoKeyVersionRequest = None, + request: Union[service.GetCryptoKeyVersionRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -969,7 +969,7 @@ def get_crypto_key_version( Args: - request (google.cloud.kms_v1.types.GetCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.GetCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. name (str): @@ -1043,7 +1043,7 @@ def get_crypto_key_version( def get_public_key( self, - request: service.GetPublicKeyRequest = None, + request: Union[service.GetPublicKeyRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -1060,7 +1060,7 @@ def get_public_key( Args: - request (google.cloud.kms_v1.types.GetPublicKeyRequest): + request (Union[google.cloud.kms_v1.types.GetPublicKeyRequest, dict]): The request object. Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. name (str): @@ -1123,7 +1123,7 @@ def get_public_key( def get_import_job( self, - request: service.GetImportJobRequest = None, + request: Union[service.GetImportJobRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -1135,7 +1135,7 @@ def get_import_job( Args: - request (google.cloud.kms_v1.types.GetImportJobRequest): + request (Union[google.cloud.kms_v1.types.GetImportJobRequest, dict]): The request object. Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob]. name (str): @@ -1240,7 +1240,7 @@ def get_import_job( def create_key_ring( self, - request: service.CreateKeyRingRequest = None, + request: Union[service.CreateKeyRingRequest, dict] = None, *, parent: str = None, key_ring_id: str = None, @@ -1254,7 +1254,7 @@ def create_key_ring( Args: - request (google.cloud.kms_v1.types.CreateKeyRingRequest): + request (Union[google.cloud.kms_v1.types.CreateKeyRingRequest, dict]): The request object. Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. parent (str): @@ -1335,7 +1335,7 @@ def create_key_ring( def create_crypto_key( self, - request: service.CreateCryptoKeyRequest = None, + request: Union[service.CreateCryptoKeyRequest, dict] = None, *, parent: str = None, crypto_key_id: str = None, @@ -1353,7 +1353,7 @@ def create_crypto_key( Args: - request (google.cloud.kms_v1.types.CreateCryptoKeyRequest): + request (Union[google.cloud.kms_v1.types.CreateCryptoKeyRequest, dict]): The request object. Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. parent (str): @@ -1439,7 +1439,7 @@ def create_crypto_key( def create_crypto_key_version( self, - request: service.CreateCryptoKeyVersionRequest = None, + request: Union[service.CreateCryptoKeyVersionRequest, dict] = None, *, parent: str = None, crypto_key_version: resources.CryptoKeyVersion = None, @@ -1458,7 +1458,7 @@ def create_crypto_key_version( Args: - request (google.cloud.kms_v1.types.CreateCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.CreateCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. parent (str): @@ -1544,7 +1544,7 @@ def create_crypto_key_version( def import_crypto_key_version( self, - request: service.ImportCryptoKeyVersionRequest = None, + request: Union[service.ImportCryptoKeyVersionRequest, dict] = None, *, retry: retries.Retry = gapic_v1.method.DEFAULT, timeout: float = None, @@ -1563,7 +1563,7 @@ def import_crypto_key_version( Args: - request (google.cloud.kms_v1.types.ImportCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.ImportCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]. retry (google.api_core.retry.Retry): Designation of what errors, if any, @@ -1617,7 +1617,7 @@ def import_crypto_key_version( def create_import_job( self, - request: service.CreateImportJobRequest = None, + request: Union[service.CreateImportJobRequest, dict] = None, *, parent: str = None, import_job_id: str = None, @@ -1634,7 +1634,7 @@ def create_import_job( Args: - request (google.cloud.kms_v1.types.CreateImportJobRequest): + request (Union[google.cloud.kms_v1.types.CreateImportJobRequest, dict]): The request object. Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob]. parent (str): @@ -1757,7 +1757,7 @@ def create_import_job( def update_crypto_key( self, - request: service.UpdateCryptoKeyRequest = None, + request: Union[service.UpdateCryptoKeyRequest, dict] = None, *, crypto_key: resources.CryptoKey = None, update_mask: field_mask_pb2.FieldMask = None, @@ -1769,7 +1769,7 @@ def update_crypto_key( Args: - request (google.cloud.kms_v1.types.UpdateCryptoKeyRequest): + request (Union[google.cloud.kms_v1.types.UpdateCryptoKeyRequest, dict]): The request object. Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. crypto_key (google.cloud.kms_v1.types.CryptoKey): @@ -1847,7 +1847,7 @@ def update_crypto_key( def update_crypto_key_version( self, - request: service.UpdateCryptoKeyVersionRequest = None, + request: Union[service.UpdateCryptoKeyVersionRequest, dict] = None, *, crypto_key_version: resources.CryptoKeyVersion = None, update_mask: field_mask_pb2.FieldMask = None, @@ -1872,7 +1872,7 @@ def update_crypto_key_version( Args: - request (google.cloud.kms_v1.types.UpdateCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.UpdateCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. crypto_key_version (google.cloud.kms_v1.types.CryptoKeyVersion): @@ -1958,7 +1958,7 @@ def update_crypto_key_version( def update_crypto_key_primary_version( self, - request: service.UpdateCryptoKeyPrimaryVersionRequest = None, + request: Union[service.UpdateCryptoKeyPrimaryVersionRequest, dict] = None, *, name: str = None, crypto_key_version_id: str = None, @@ -1975,7 +1975,7 @@ def update_crypto_key_primary_version( Args: - request (google.cloud.kms_v1.types.UpdateCryptoKeyPrimaryVersionRequest): + request (Union[google.cloud.kms_v1.types.UpdateCryptoKeyPrimaryVersionRequest, dict]): The request object. Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. name (str): @@ -2054,7 +2054,7 @@ def update_crypto_key_primary_version( def destroy_crypto_key_version( self, - request: service.DestroyCryptoKeyVersionRequest = None, + request: Union[service.DestroyCryptoKeyVersionRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -2087,7 +2087,7 @@ def destroy_crypto_key_version( Args: - request (google.cloud.kms_v1.types.DestroyCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.DestroyCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. name (str): @@ -2162,7 +2162,7 @@ def destroy_crypto_key_version( def restore_crypto_key_version( self, - request: service.RestoreCryptoKeyVersionRequest = None, + request: Union[service.RestoreCryptoKeyVersionRequest, dict] = None, *, name: str = None, retry: retries.Retry = gapic_v1.method.DEFAULT, @@ -2184,7 +2184,7 @@ def restore_crypto_key_version( Args: - request (google.cloud.kms_v1.types.RestoreCryptoKeyVersionRequest): + request (Union[google.cloud.kms_v1.types.RestoreCryptoKeyVersionRequest, dict]): The request object. Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. name (str): @@ -2259,7 +2259,7 @@ def restore_crypto_key_version( def encrypt( self, - request: service.EncryptRequest = None, + request: Union[service.EncryptRequest, dict] = None, *, name: str = None, plaintext: bytes = None, @@ -2275,7 +2275,7 @@ def encrypt( Args: - request (google.cloud.kms_v1.types.EncryptRequest): + request (Union[google.cloud.kms_v1.types.EncryptRequest, dict]): The request object. Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. name (str): @@ -2361,7 +2361,7 @@ def encrypt( def decrypt( self, - request: service.DecryptRequest = None, + request: Union[service.DecryptRequest, dict] = None, *, name: str = None, ciphertext: bytes = None, @@ -2377,7 +2377,7 @@ def decrypt( Args: - request (google.cloud.kms_v1.types.DecryptRequest): + request (Union[google.cloud.kms_v1.types.DecryptRequest, dict]): The request object. Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. name (str): @@ -2449,7 +2449,7 @@ def decrypt( def asymmetric_sign( self, - request: service.AsymmetricSignRequest = None, + request: Union[service.AsymmetricSignRequest, dict] = None, *, name: str = None, digest: service.Digest = None, @@ -2466,7 +2466,7 @@ def asymmetric_sign( Args: - request (google.cloud.kms_v1.types.AsymmetricSignRequest): + request (Union[google.cloud.kms_v1.types.AsymmetricSignRequest, dict]): The request object. Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. name (str): @@ -2539,7 +2539,7 @@ def asymmetric_sign( def asymmetric_decrypt( self, - request: service.AsymmetricDecryptRequest = None, + request: Union[service.AsymmetricDecryptRequest, dict] = None, *, name: str = None, ciphertext: bytes = None, @@ -2557,7 +2557,7 @@ def asymmetric_decrypt( Args: - request (google.cloud.kms_v1.types.AsymmetricDecryptRequest): + request (Union[google.cloud.kms_v1.types.AsymmetricDecryptRequest, dict]): The request object. Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. name (str): @@ -2629,7 +2629,7 @@ def asymmetric_decrypt( def mac_sign( self, - request: service.MacSignRequest = None, + request: Union[service.MacSignRequest, dict] = None, *, name: str = None, data: bytes = None, @@ -2645,7 +2645,7 @@ def mac_sign( Args: - request (google.cloud.kms_v1.types.MacSignRequest): + request (Union[google.cloud.kms_v1.types.MacSignRequest, dict]): The request object. Request message for [KeyManagementService.MacSign][google.cloud.kms.v1.KeyManagementService.MacSign]. name (str): @@ -2717,7 +2717,7 @@ def mac_sign( def mac_verify( self, - request: service.MacVerifyRequest = None, + request: Union[service.MacVerifyRequest, dict] = None, *, name: str = None, data: bytes = None, @@ -2734,7 +2734,7 @@ def mac_verify( Args: - request (google.cloud.kms_v1.types.MacVerifyRequest): + request (Union[google.cloud.kms_v1.types.MacVerifyRequest, dict]): The request object. Request message for [KeyManagementService.MacVerify][google.cloud.kms.v1.KeyManagementService.MacVerify]. name (str): @@ -2813,7 +2813,7 @@ def mac_verify( def generate_random_bytes( self, - request: service.GenerateRandomBytesRequest = None, + request: Union[service.GenerateRandomBytesRequest, dict] = None, *, location: str = None, length_bytes: int = None, @@ -2827,7 +2827,7 @@ def generate_random_bytes( Args: - request (google.cloud.kms_v1.types.GenerateRandomBytesRequest): + request (Union[google.cloud.kms_v1.types.GenerateRandomBytesRequest, dict]): The request object. Request message for [KeyManagementService.GenerateRandomBytes][google.cloud.kms.v1.KeyManagementService.GenerateRandomBytes]. location (str): diff --git a/google/cloud/kms_v1/services/key_management_service/transports/base.py b/google/cloud/kms_v1/services/key_management_service/transports/base.py index b1287138..076d5495 100644 --- a/google/cloud/kms_v1/services/key_management_service/transports/base.py +++ b/google/cloud/kms_v1/services/key_management_service/transports/base.py @@ -121,7 +121,7 @@ def __init__( **scopes_kwargs, quota_project_id=quota_project_id ) - # If the credentials is service account credentials, then always try to use self signed JWT. + # If the credentials are service account credentials, then always try to use self signed JWT. if ( always_use_jwt_access and isinstance(credentials, service_account.Credentials) diff --git a/google/cloud/kms_v1/services/key_management_service/transports/grpc.py b/google/cloud/kms_v1/services/key_management_service/transports/grpc.py index 5b72a38a..b2df25a4 100644 --- a/google/cloud/kms_v1/services/key_management_service/transports/grpc.py +++ b/google/cloud/kms_v1/services/key_management_service/transports/grpc.py @@ -94,16 +94,16 @@ def __init__( api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. If provided, it overrides the ``host`` argument and tries to create a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or applicatin default SSL credentials. + ``client_cert_source`` or application default SSL credentials. client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): Deprecated. A callback to provide client SSL certificate bytes and private key bytes, both in PEM format. It is ignored if ``api_mtls_endpoint`` is None. ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for grpc channel. It is ignored if ``channel`` is provided. + for the grpc channel. It is ignored if ``channel`` is provided. client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure mutual TLS channel. It is + both in PEM format. It is used to configure a mutual TLS channel. It is ignored if ``channel`` or ``ssl_channel_credentials`` is provided. quota_project_id (Optional[str]): An optional project to use for billing and quota. diff --git a/google/cloud/kms_v1/services/key_management_service/transports/grpc_asyncio.py b/google/cloud/kms_v1/services/key_management_service/transports/grpc_asyncio.py index 654f7529..f1970001 100644 --- a/google/cloud/kms_v1/services/key_management_service/transports/grpc_asyncio.py +++ b/google/cloud/kms_v1/services/key_management_service/transports/grpc_asyncio.py @@ -141,16 +141,16 @@ def __init__( api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint. If provided, it overrides the ``host`` argument and tries to create a mutual TLS channel with client SSL credentials from - ``client_cert_source`` or applicatin default SSL credentials. + ``client_cert_source`` or application default SSL credentials. client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]): Deprecated. A callback to provide client SSL certificate bytes and private key bytes, both in PEM format. It is ignored if ``api_mtls_endpoint`` is None. ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials - for grpc channel. It is ignored if ``channel`` is provided. + for the grpc channel. It is ignored if ``channel`` is provided. client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]): A callback to provide client certificate bytes and private key bytes, - both in PEM format. It is used to configure mutual TLS channel. It is + both in PEM format. It is used to configure a mutual TLS channel. It is ignored if ``channel`` or ``ssl_channel_credentials`` is provided. quota_project_id (Optional[str]): An optional project to use for billing and quota. diff --git a/scripts/fixup_kms_v1_keywords.py b/scripts/fixup_kms_v1_keywords.py index ffd7304c..9ee8a97d 100644 --- a/scripts/fixup_kms_v1_keywords.py +++ b/scripts/fixup_kms_v1_keywords.py @@ -39,32 +39,32 @@ def partition( class kmsCallTransformer(cst.CSTTransformer): CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata') METHOD_TO_PARAMS: Dict[str, Tuple[str]] = { - 'asymmetric_decrypt': ('name', 'ciphertext', 'ciphertext_crc32c', ), - 'asymmetric_sign': ('name', 'digest', 'digest_crc32c', ), - 'create_crypto_key': ('parent', 'crypto_key_id', 'crypto_key', 'skip_initial_version_creation', ), - 'create_crypto_key_version': ('parent', 'crypto_key_version', ), - 'create_import_job': ('parent', 'import_job_id', 'import_job', ), - 'create_key_ring': ('parent', 'key_ring_id', 'key_ring', ), - 'decrypt': ('name', 'ciphertext', 'additional_authenticated_data', 'ciphertext_crc32c', 'additional_authenticated_data_crc32c', ), - 'destroy_crypto_key_version': ('name', ), - 'encrypt': ('name', 'plaintext', 'additional_authenticated_data', 'plaintext_crc32c', 'additional_authenticated_data_crc32c', ), - 'generate_random_bytes': ('location', 'length_bytes', 'protection_level', ), - 'get_crypto_key': ('name', ), - 'get_crypto_key_version': ('name', ), - 'get_import_job': ('name', ), - 'get_key_ring': ('name', ), - 'get_public_key': ('name', ), - 'import_crypto_key_version': ('parent', 'algorithm', 'import_job', 'crypto_key_version', 'rsa_aes_wrapped_key', ), - 'list_crypto_keys': ('parent', 'page_size', 'page_token', 'version_view', 'filter', 'order_by', ), - 'list_crypto_key_versions': ('parent', 'page_size', 'page_token', 'view', 'filter', 'order_by', ), - 'list_import_jobs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ), - 'list_key_rings': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ), - 'mac_sign': ('name', 'data', 'data_crc32c', ), - 'mac_verify': ('name', 'data', 'mac', 'data_crc32c', 'mac_crc32c', ), - 'restore_crypto_key_version': ('name', ), - 'update_crypto_key': ('crypto_key', 'update_mask', ), - 'update_crypto_key_primary_version': ('name', 'crypto_key_version_id', ), - 'update_crypto_key_version': ('crypto_key_version', 'update_mask', ), + 'asymmetric_decrypt': ('name', 'ciphertext', 'ciphertext_crc32c', ), + 'asymmetric_sign': ('name', 'digest', 'digest_crc32c', ), + 'create_crypto_key': ('parent', 'crypto_key_id', 'crypto_key', 'skip_initial_version_creation', ), + 'create_crypto_key_version': ('parent', 'crypto_key_version', ), + 'create_import_job': ('parent', 'import_job_id', 'import_job', ), + 'create_key_ring': ('parent', 'key_ring_id', 'key_ring', ), + 'decrypt': ('name', 'ciphertext', 'additional_authenticated_data', 'ciphertext_crc32c', 'additional_authenticated_data_crc32c', ), + 'destroy_crypto_key_version': ('name', ), + 'encrypt': ('name', 'plaintext', 'additional_authenticated_data', 'plaintext_crc32c', 'additional_authenticated_data_crc32c', ), + 'generate_random_bytes': ('location', 'length_bytes', 'protection_level', ), + 'get_crypto_key': ('name', ), + 'get_crypto_key_version': ('name', ), + 'get_import_job': ('name', ), + 'get_key_ring': ('name', ), + 'get_public_key': ('name', ), + 'import_crypto_key_version': ('parent', 'algorithm', 'import_job', 'crypto_key_version', 'rsa_aes_wrapped_key', ), + 'list_crypto_keys': ('parent', 'page_size', 'page_token', 'version_view', 'filter', 'order_by', ), + 'list_crypto_key_versions': ('parent', 'page_size', 'page_token', 'view', 'filter', 'order_by', ), + 'list_import_jobs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ), + 'list_key_rings': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ), + 'mac_sign': ('name', 'data', 'data_crc32c', ), + 'mac_verify': ('name', 'data', 'mac', 'data_crc32c', 'mac_crc32c', ), + 'restore_crypto_key_version': ('name', ), + 'update_crypto_key': ('crypto_key', 'update_mask', ), + 'update_crypto_key_primary_version': ('name', 'crypto_key_version_id', ), + 'update_crypto_key_version': ('crypto_key_version', 'update_mask', ), 'get_iam_policy': ('resource', 'options', ), 'set_iam_policy': ('resource', 'policy', ), 'test_iam_permissions': ('resource', 'permissions', ), @@ -86,7 +86,7 @@ def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode: return updated kwargs, ctrl_kwargs = partition( - lambda a: not a.keyword.value in self.CTRL_PARAMS, + lambda a: a.keyword.value not in self.CTRL_PARAMS, kwargs )