Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 077e34c

Browse files
committed
snake case
1 parent 5145ef0 commit 077e34c

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

kms/api-client/snippets_test.py

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ def setup_module(module):
5353
except GoogleAPICallError:
5454
# keyring already exists
5555
pass
56-
s = create_key_helper(t.symId,
56+
s = create_key_helper(t.sym_id,
5757
enums.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT,
5858
enums.CryptoKeyVersion.CryptoKeyVersionAlgorithm.
5959
GOOGLE_SYMMETRIC_ENCRYPTION,
@@ -71,9 +71,9 @@ class TestKMSSnippets:
7171
keyring_path = '{}/keyRings/{}'.format(parent, keyring_id)
7272
version = '1'
7373

74-
symId = 'symmetric'
74+
sym_id = 'symmetric'
7575

76-
sym = '{}/cryptoKeys/{}'.format(keyring_path, symId)
76+
sym = '{}/cryptoKeys/{}'.format(keyring_path, sym_id)
7777
sym_version = '{}/cryptoKeyVersions/{}'.format(sym, version)
7878

7979
message = 'test message 123'
@@ -96,7 +96,7 @@ def test_create_key_ring(self):
9696
@pytest.mark.skip(reason="Deleting keys isn't instant, so we should avoid \
9797
creating a large number of them in our tests")
9898
def test_create_crypto_key(self):
99-
key_id = self.symId + '-test' + str(int(time.time()))
99+
key_id = self.sym_id + '-test' + str(int(time.time()))
100100
snippets.create_crypto_key(self.project_id, self.location,
101101
self.keyring_id, key_id)
102102
c = kms_v1.KeyManagementServiceClient()
@@ -110,30 +110,30 @@ def test_create_crypto_key(self):
110110
def test_key_change_version_state(self):
111111
client = kms_v1.KeyManagementServiceClient()
112112
name = client.crypto_key_version_path(self.project_id, self.location,
113-
self.keyring_id, self.symId,
113+
self.keyring_id, self.sym_id,
114114
self.version)
115115
state_enum = enums.CryptoKeyVersion.CryptoKeyVersionState
116116
# test disable
117117
snippets.disable_crypto_key_version(self.project_id, self.location,
118-
self.keyring_id, self.symId,
118+
self.keyring_id, self.sym_id,
119119
self.version)
120120
response = client.get_crypto_key_version(name)
121121
assert response.state == state_enum.DISABLED
122122
# test destroy
123123
snippets.destroy_crypto_key_version(self.project_id, self.location,
124-
self.keyring_id, self.symId,
124+
self.keyring_id, self.sym_id,
125125
self.version)
126126
response = client.get_crypto_key_version(name)
127127
assert response.state == state_enum.DESTROY_SCHEDULED
128128
# test restore
129129
snippets.restore_crypto_key_version(self.project_id, self.location,
130-
self.keyring_id, self.symId,
130+
self.keyring_id, self.sym_id,
131131
self.version)
132132
response = client.get_crypto_key_version(name)
133133
assert response.state == state_enum.DISABLED
134134
# test re-enable
135135
snippets.enable_crypto_key_version(self.project_id, self.location,
136-
self.keyring_id, self.symId,
136+
self.keyring_id, self.sym_id,
137137
self.version)
138138
response = client.get_crypto_key_version(name)
139139
assert response.state == state_enum.ENABLED
@@ -176,15 +176,15 @@ def test_key_policy(self):
176176
snippets.add_member_to_crypto_key_policy(self.project_id,
177177
self.location,
178178
self.keyring_id,
179-
self.symId,
179+
self.sym_id,
180180
self.member,
181181
self.role)
182182

183183
def check_policy():
184184
policy = snippets.get_crypto_key_policy(self.project_id,
185185
self.location,
186186
self.keyring_id,
187-
self.symId)
187+
self.sym_id)
188188
found = False
189189
for b in list(policy.bindings):
190190
if b.role == self.role and self.member in b.members:
@@ -196,15 +196,15 @@ def check_policy():
196196
snippets.remove_member_from_crypto_key_policy(self.project_id,
197197
self.location,
198198
self.keyring_id,
199-
self.symId,
199+
self.sym_id,
200200
self.member,
201201
self.role)
202202

203203
def check_policy():
204204
policy = snippets.get_crypto_key_policy(self.project_id,
205205
self.location,
206206
self.keyring_id,
207-
self.symId)
207+
self.sym_id)
208208
found = False
209209
for b in list(policy.bindings):
210210
if b.role == self.role and self.member in b.members:
@@ -217,12 +217,12 @@ def test_symmetric_encrypt_decrypt(self):
217217
cipher_bytes = snippets.encrypt_symmetric(self.project_id,
218218
self.location,
219219
self.keyring_id,
220-
self.symId,
220+
self.sym_id,
221221
self.message_bytes)
222222
plain_bytes = snippets.decrypt_symmetric(self.project_id,
223223
self.location,
224224
self.keyring_id,
225-
self.symId,
225+
self.sym_id,
226226
cipher_bytes)
227227
assert plain_bytes == self.message_bytes
228228
assert cipher_bytes != self.message_bytes

0 commit comments

Comments
 (0)