@@ -53,7 +53,7 @@ def setup_module(module):
53
53
except GoogleAPICallError :
54
54
# keyring already exists
55
55
pass
56
- s = create_key_helper (t .symId ,
56
+ s = create_key_helper (t .sym_id ,
57
57
enums .CryptoKey .CryptoKeyPurpose .ENCRYPT_DECRYPT ,
58
58
enums .CryptoKeyVersion .CryptoKeyVersionAlgorithm .
59
59
GOOGLE_SYMMETRIC_ENCRYPTION ,
@@ -71,9 +71,9 @@ class TestKMSSnippets:
71
71
keyring_path = '{}/keyRings/{}' .format (parent , keyring_id )
72
72
version = '1'
73
73
74
- symId = 'symmetric'
74
+ sym_id = 'symmetric'
75
75
76
- sym = '{}/cryptoKeys/{}' .format (keyring_path , symId )
76
+ sym = '{}/cryptoKeys/{}' .format (keyring_path , sym_id )
77
77
sym_version = '{}/cryptoKeyVersions/{}' .format (sym , version )
78
78
79
79
message = 'test message 123'
@@ -96,7 +96,7 @@ def test_create_key_ring(self):
96
96
@pytest .mark .skip (reason = "Deleting keys isn't instant, so we should avoid \
97
97
creating a large number of them in our tests" )
98
98
def test_create_crypto_key (self ):
99
- key_id = self .symId + '-test' + str (int (time .time ()))
99
+ key_id = self .sym_id + '-test' + str (int (time .time ()))
100
100
snippets .create_crypto_key (self .project_id , self .location ,
101
101
self .keyring_id , key_id )
102
102
c = kms_v1 .KeyManagementServiceClient ()
@@ -110,30 +110,30 @@ def test_create_crypto_key(self):
110
110
def test_key_change_version_state (self ):
111
111
client = kms_v1 .KeyManagementServiceClient ()
112
112
name = client .crypto_key_version_path (self .project_id , self .location ,
113
- self .keyring_id , self .symId ,
113
+ self .keyring_id , self .sym_id ,
114
114
self .version )
115
115
state_enum = enums .CryptoKeyVersion .CryptoKeyVersionState
116
116
# test disable
117
117
snippets .disable_crypto_key_version (self .project_id , self .location ,
118
- self .keyring_id , self .symId ,
118
+ self .keyring_id , self .sym_id ,
119
119
self .version )
120
120
response = client .get_crypto_key_version (name )
121
121
assert response .state == state_enum .DISABLED
122
122
# test destroy
123
123
snippets .destroy_crypto_key_version (self .project_id , self .location ,
124
- self .keyring_id , self .symId ,
124
+ self .keyring_id , self .sym_id ,
125
125
self .version )
126
126
response = client .get_crypto_key_version (name )
127
127
assert response .state == state_enum .DESTROY_SCHEDULED
128
128
# test restore
129
129
snippets .restore_crypto_key_version (self .project_id , self .location ,
130
- self .keyring_id , self .symId ,
130
+ self .keyring_id , self .sym_id ,
131
131
self .version )
132
132
response = client .get_crypto_key_version (name )
133
133
assert response .state == state_enum .DISABLED
134
134
# test re-enable
135
135
snippets .enable_crypto_key_version (self .project_id , self .location ,
136
- self .keyring_id , self .symId ,
136
+ self .keyring_id , self .sym_id ,
137
137
self .version )
138
138
response = client .get_crypto_key_version (name )
139
139
assert response .state == state_enum .ENABLED
@@ -176,15 +176,15 @@ def test_key_policy(self):
176
176
snippets .add_member_to_crypto_key_policy (self .project_id ,
177
177
self .location ,
178
178
self .keyring_id ,
179
- self .symId ,
179
+ self .sym_id ,
180
180
self .member ,
181
181
self .role )
182
182
183
183
def check_policy ():
184
184
policy = snippets .get_crypto_key_policy (self .project_id ,
185
185
self .location ,
186
186
self .keyring_id ,
187
- self .symId )
187
+ self .sym_id )
188
188
found = False
189
189
for b in list (policy .bindings ):
190
190
if b .role == self .role and self .member in b .members :
@@ -196,15 +196,15 @@ def check_policy():
196
196
snippets .remove_member_from_crypto_key_policy (self .project_id ,
197
197
self .location ,
198
198
self .keyring_id ,
199
- self .symId ,
199
+ self .sym_id ,
200
200
self .member ,
201
201
self .role )
202
202
203
203
def check_policy ():
204
204
policy = snippets .get_crypto_key_policy (self .project_id ,
205
205
self .location ,
206
206
self .keyring_id ,
207
- self .symId )
207
+ self .sym_id )
208
208
found = False
209
209
for b in list (policy .bindings ):
210
210
if b .role == self .role and self .member in b .members :
@@ -217,12 +217,12 @@ def test_symmetric_encrypt_decrypt(self):
217
217
cipher_bytes = snippets .encrypt_symmetric (self .project_id ,
218
218
self .location ,
219
219
self .keyring_id ,
220
- self .symId ,
220
+ self .sym_id ,
221
221
self .message_bytes )
222
222
plain_bytes = snippets .decrypt_symmetric (self .project_id ,
223
223
self .location ,
224
224
self .keyring_id ,
225
- self .symId ,
225
+ self .sym_id ,
226
226
cipher_bytes )
227
227
assert plain_bytes == self .message_bytes
228
228
assert cipher_bytes != self .message_bytes
0 commit comments