async def test_create_submission_field_headers_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Any value that is part of the HTTP/1.1 URI should be sent as # a field header. Set these to a non-empty value. request = webrisk.CreateSubmissionRequest() request.parent = "parent/value" # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object(type(client._client._transport.create_submission), "__call__") as call: call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( webrisk.Submission()) await client.create_submission(request) # Establish that the underlying gRPC stub method was called. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] assert args[0] == request # Establish that the field header was sent. _, _, kw = call.mock_calls[0] assert ( "x-goog-request-params", "parent=parent/value", ) in kw["metadata"]
async def test_create_submission_flattened_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object(type(client._client._transport.create_submission), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = webrisk.Submission() call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( webrisk.Submission()) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.create_submission( parent="parent_value", submission=webrisk.Submission(uri="uri_value"), ) # Establish that the underlying call was made with the expected # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] assert args[0].parent == "parent_value" assert args[0].submission == webrisk.Submission(uri="uri_value")
async def test_create_submission_async(transport: str = "grpc_asyncio"): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), transport=transport, ) # Everything is optional in proto3 as far as the runtime is concerned, # and we are mocking out the actual API, so just send an empty request. request = webrisk.CreateSubmissionRequest() # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object(type(client._client._transport.create_submission), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( webrisk.Submission(uri="uri_value", )) response = await client.create_submission(request) # Establish that the underlying gRPC stub method was called. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] assert args[0] == request # Establish that the response is the type that we expect. assert isinstance(response, webrisk.Submission) assert response.uri == "uri_value"
async def test_search_hashes_flattened_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object(type(client._client._transport.search_hashes), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = webrisk.SearchHashesResponse() call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( webrisk.SearchHashesResponse()) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.search_hashes( hash_prefix=b"hash_prefix_blob", threat_types=[webrisk.ThreatType.MALWARE], ) # Establish that the underlying call was made with the expected # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] assert args[0].hash_prefix == b"hash_prefix_blob" assert args[0].threat_types == [webrisk.ThreatType.MALWARE]
async def test_compute_threat_list_diff_flattened_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Mock the actual call within the gRPC stub, and fake the request. with mock.patch.object( type(client._client._transport.compute_threat_list_diff), "__call__") as call: # Designate an appropriate return value for the call. call.return_value = webrisk.ComputeThreatListDiffResponse() call.return_value = grpc_helpers_async.FakeUnaryUnaryCall( webrisk.ComputeThreatListDiffResponse()) # Call the method with a truthy value for each flattened field, # using the keyword arguments to the method. response = await client.compute_threat_list_diff( threat_type=webrisk.ThreatType.MALWARE, version_token=b"version_token_blob", constraints=webrisk.ComputeThreatListDiffRequest.Constraints( max_diff_entries=1687), ) # Establish that the underlying call was made with the expected # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] assert args[0].threat_type == webrisk.ThreatType.MALWARE assert args[0].version_token == b"version_token_blob" assert args[ 0].constraints == webrisk.ComputeThreatListDiffRequest.Constraints( max_diff_entries=1687)
async def test_create_submission_flattened_error_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Attempting to call a method with both a request object and flattened # fields is an error. with pytest.raises(ValueError): await client.create_submission( webrisk.CreateSubmissionRequest(), parent="parent_value", submission=webrisk.Submission(uri="uri_value"), )
async def test_search_hashes_flattened_error_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Attempting to call a method with both a request object and flattened # fields is an error. with pytest.raises(ValueError): await client.search_hashes( webrisk.SearchHashesRequest(), hash_prefix=b"hash_prefix_blob", threat_types=[webrisk.ThreatType.MALWARE], )
async def test_compute_threat_list_diff_flattened_error_async(): client = WebRiskServiceAsyncClient( credentials=credentials.AnonymousCredentials(), ) # Attempting to call a method with both a request object and flattened # fields is an error. with pytest.raises(ValueError): await client.compute_threat_list_diff( webrisk.ComputeThreatListDiffRequest(), threat_type=webrisk.ThreatType.MALWARE, version_token=b"version_token_blob", constraints=webrisk.ComputeThreatListDiffRequest.Constraints( max_diff_entries=1687), )