| // Copyright 2019 Google LLC |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| // Code generated by gapic-generator. DO NOT EDIT. |
| |
| package kms |
| |
| import ( |
| "context" |
| "flag" |
| "fmt" |
| "io" |
| "log" |
| "net" |
| "os" |
| "strings" |
| "testing" |
| |
| "github.com/golang/protobuf/proto" |
| "github.com/golang/protobuf/ptypes" |
| durationpb "github.com/golang/protobuf/ptypes/duration" |
| timestamppb "github.com/golang/protobuf/ptypes/timestamp" |
| "google.golang.org/api/option" |
| kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1" |
| field_maskpb "google.golang.org/genproto/protobuf/field_mask" |
| |
| status "google.golang.org/genproto/googleapis/rpc/status" |
| "google.golang.org/grpc" |
| "google.golang.org/grpc/codes" |
| "google.golang.org/grpc/metadata" |
| |
| gstatus "google.golang.org/grpc/status" |
| ) |
| |
| var _ = io.EOF |
| var _ = ptypes.MarshalAny |
| var _ status.Status |
| |
| type mockKeyManagementServer struct { |
| // Embed for forward compatibility. |
| // Tests will keep working if more methods are added |
| // in the future. |
| kmspb.KeyManagementServiceServer |
| |
| reqs []proto.Message |
| |
| // If set, all calls return this error. |
| err error |
| |
| // responses to return if err == nil |
| resps []proto.Message |
| } |
| |
| func (s *mockKeyManagementServer) ListKeyRings(ctx context.Context, req *kmspb.ListKeyRingsRequest) (*kmspb.ListKeyRingsResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ListKeyRingsResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) ListCryptoKeys(ctx context.Context, req *kmspb.ListCryptoKeysRequest) (*kmspb.ListCryptoKeysResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ListCryptoKeysResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) ListCryptoKeyVersions(ctx context.Context, req *kmspb.ListCryptoKeyVersionsRequest) (*kmspb.ListCryptoKeyVersionsResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ListCryptoKeyVersionsResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) ListImportJobs(ctx context.Context, req *kmspb.ListImportJobsRequest) (*kmspb.ListImportJobsResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ListImportJobsResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) GetKeyRing(ctx context.Context, req *kmspb.GetKeyRingRequest) (*kmspb.KeyRing, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.KeyRing), nil |
| } |
| |
| func (s *mockKeyManagementServer) GetCryptoKey(ctx context.Context, req *kmspb.GetCryptoKeyRequest) (*kmspb.CryptoKey, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKey), nil |
| } |
| |
| func (s *mockKeyManagementServer) GetCryptoKeyVersion(ctx context.Context, req *kmspb.GetCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| func (s *mockKeyManagementServer) GetPublicKey(ctx context.Context, req *kmspb.GetPublicKeyRequest) (*kmspb.PublicKey, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.PublicKey), nil |
| } |
| |
| func (s *mockKeyManagementServer) GetImportJob(ctx context.Context, req *kmspb.GetImportJobRequest) (*kmspb.ImportJob, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ImportJob), nil |
| } |
| |
| func (s *mockKeyManagementServer) CreateKeyRing(ctx context.Context, req *kmspb.CreateKeyRingRequest) (*kmspb.KeyRing, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.KeyRing), nil |
| } |
| |
| func (s *mockKeyManagementServer) CreateCryptoKey(ctx context.Context, req *kmspb.CreateCryptoKeyRequest) (*kmspb.CryptoKey, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKey), nil |
| } |
| |
| func (s *mockKeyManagementServer) CreateCryptoKeyVersion(ctx context.Context, req *kmspb.CreateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| func (s *mockKeyManagementServer) ImportCryptoKeyVersion(ctx context.Context, req *kmspb.ImportCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| func (s *mockKeyManagementServer) CreateImportJob(ctx context.Context, req *kmspb.CreateImportJobRequest) (*kmspb.ImportJob, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.ImportJob), nil |
| } |
| |
| func (s *mockKeyManagementServer) UpdateCryptoKey(ctx context.Context, req *kmspb.UpdateCryptoKeyRequest) (*kmspb.CryptoKey, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKey), nil |
| } |
| |
| func (s *mockKeyManagementServer) UpdateCryptoKeyVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| func (s *mockKeyManagementServer) Encrypt(ctx context.Context, req *kmspb.EncryptRequest) (*kmspb.EncryptResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.EncryptResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) Decrypt(ctx context.Context, req *kmspb.DecryptRequest) (*kmspb.DecryptResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.DecryptResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest) (*kmspb.AsymmetricSignResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.AsymmetricSignResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest) (*kmspb.AsymmetricDecryptResponse, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.AsymmetricDecryptResponse), nil |
| } |
| |
| func (s *mockKeyManagementServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyPrimaryVersionRequest) (*kmspb.CryptoKey, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKey), nil |
| } |
| |
| func (s *mockKeyManagementServer) DestroyCryptoKeyVersion(ctx context.Context, req *kmspb.DestroyCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| func (s *mockKeyManagementServer) RestoreCryptoKeyVersion(ctx context.Context, req *kmspb.RestoreCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { |
| md, _ := metadata.FromIncomingContext(ctx) |
| if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { |
| return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) |
| } |
| s.reqs = append(s.reqs, req) |
| if s.err != nil { |
| return nil, s.err |
| } |
| return s.resps[0].(*kmspb.CryptoKeyVersion), nil |
| } |
| |
| // clientOpt is the option tests should use to connect to the test server. |
| // It is initialized by TestMain. |
| var clientOpt option.ClientOption |
| |
| var ( |
| mockKeyManagement mockKeyManagementServer |
| ) |
| |
| func TestMain(m *testing.M) { |
| flag.Parse() |
| |
| serv := grpc.NewServer() |
| kmspb.RegisterKeyManagementServiceServer(serv, &mockKeyManagement) |
| |
| lis, err := net.Listen("tcp", "localhost:0") |
| if err != nil { |
| log.Fatal(err) |
| } |
| go serv.Serve(lis) |
| |
| conn, err := grpc.Dial(lis.Addr().String(), grpc.WithInsecure()) |
| if err != nil { |
| log.Fatal(err) |
| } |
| clientOpt = option.WithGRPCConn(conn) |
| |
| os.Exit(m.Run()) |
| } |
| |
| func TestKeyManagementServiceListKeyRings(t *testing.T) { |
| var nextPageToken string = "" |
| var totalSize int32 = 705419236 |
| var keyRingsElement *kmspb.KeyRing = &kmspb.KeyRing{} |
| var keyRings = []*kmspb.KeyRing{keyRingsElement} |
| var expectedResponse = &kmspb.ListKeyRingsResponse{ |
| NextPageToken: nextPageToken, |
| TotalSize: totalSize, |
| KeyRings: keyRings, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") |
| var request = &kmspb.ListKeyRingsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListKeyRings(context.Background(), request).Next() |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| want := (interface{})(expectedResponse.KeyRings[0]) |
| got := (interface{})(resp) |
| var ok bool |
| |
| switch want := (want).(type) { |
| case proto.Message: |
| ok = proto.Equal(want, got.(proto.Message)) |
| default: |
| ok = want == got |
| } |
| if !ok { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceListKeyRingsError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") |
| var request = &kmspb.ListKeyRingsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListKeyRings(context.Background(), request).Next() |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceListImportJobs(t *testing.T) { |
| var nextPageToken string = "" |
| var totalSize int32 = 705419236 |
| var importJobsElement *kmspb.ImportJob = &kmspb.ImportJob{} |
| var importJobs = []*kmspb.ImportJob{importJobsElement} |
| var expectedResponse = &kmspb.ListImportJobsResponse{ |
| NextPageToken: nextPageToken, |
| TotalSize: totalSize, |
| ImportJobs: importJobs, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.ListImportJobsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListImportJobs(context.Background(), request).Next() |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| want := (interface{})(expectedResponse.ImportJobs[0]) |
| got := (interface{})(resp) |
| var ok bool |
| |
| switch want := (want).(type) { |
| case proto.Message: |
| ok = proto.Equal(want, got.(proto.Message)) |
| default: |
| ok = want == got |
| } |
| if !ok { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceListImportJobsError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.ListImportJobsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListImportJobs(context.Background(), request).Next() |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceListCryptoKeys(t *testing.T) { |
| var nextPageToken string = "" |
| var totalSize int32 = 705419236 |
| var cryptoKeysElement *kmspb.CryptoKey = &kmspb.CryptoKey{} |
| var cryptoKeys = []*kmspb.CryptoKey{cryptoKeysElement} |
| var expectedResponse = &kmspb.ListCryptoKeysResponse{ |
| NextPageToken: nextPageToken, |
| TotalSize: totalSize, |
| CryptoKeys: cryptoKeys, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.ListCryptoKeysRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListCryptoKeys(context.Background(), request).Next() |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| want := (interface{})(expectedResponse.CryptoKeys[0]) |
| got := (interface{})(resp) |
| var ok bool |
| |
| switch want := (want).(type) { |
| case proto.Message: |
| ok = proto.Equal(want, got.(proto.Message)) |
| default: |
| ok = want == got |
| } |
| if !ok { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceListCryptoKeysError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.ListCryptoKeysRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListCryptoKeys(context.Background(), request).Next() |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceListCryptoKeyVersions(t *testing.T) { |
| var nextPageToken string = "" |
| var totalSize int32 = 705419236 |
| var cryptoKeyVersionsElement *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} |
| var cryptoKeyVersions = []*kmspb.CryptoKeyVersion{cryptoKeyVersionsElement} |
| var expectedResponse = &kmspb.ListCryptoKeyVersionsResponse{ |
| NextPageToken: nextPageToken, |
| TotalSize: totalSize, |
| CryptoKeyVersions: cryptoKeyVersions, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var request = &kmspb.ListCryptoKeyVersionsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next() |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| want := (interface{})(expectedResponse.CryptoKeyVersions[0]) |
| got := (interface{})(resp) |
| var ok bool |
| |
| switch want := (want).(type) { |
| case proto.Message: |
| ok = proto.Equal(want, got.(proto.Message)) |
| default: |
| ok = want == got |
| } |
| if !ok { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceListCryptoKeyVersionsError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var request = &kmspb.ListCryptoKeyVersionsRequest{ |
| Parent: formattedParent, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next() |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceGetKeyRing(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var expectedResponse = &kmspb.KeyRing{ |
| Name: name2, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.GetKeyRingRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetKeyRing(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceGetKeyRingError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var request = &kmspb.GetKeyRingRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetKeyRing(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceGetImportJob(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var expectedResponse = &kmspb.ImportJob{ |
| Name: name2, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/importJobs/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[IMPORT_JOB]") |
| var request = &kmspb.GetImportJobRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetImportJob(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceGetImportJobError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/importJobs/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[IMPORT_JOB]") |
| var request = &kmspb.GetImportJobRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetImportJob(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceGetCryptoKey(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var expectedResponse = &kmspb.CryptoKey{ |
| Name: name2, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var request = &kmspb.GetCryptoKeyRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetCryptoKey(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceGetCryptoKeyError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var request = &kmspb.GetCryptoKeyRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetCryptoKey(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceGetCryptoKeyVersion(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var importJob string = "importJob2125587491" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name2, |
| ImportJob: importJob, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.GetCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceGetCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.GetCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceCreateKeyRing(t *testing.T) { |
| var name string = "name3373707" |
| var expectedResponse = &kmspb.KeyRing{ |
| Name: name, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") |
| var keyRingId string = "keyRingId-2056646742" |
| var keyRing *kmspb.KeyRing = &kmspb.KeyRing{} |
| var request = &kmspb.CreateKeyRingRequest{ |
| Parent: formattedParent, |
| KeyRingId: keyRingId, |
| KeyRing: keyRing, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateKeyRing(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceCreateKeyRingError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") |
| var keyRingId string = "keyRingId-2056646742" |
| var keyRing *kmspb.KeyRing = &kmspb.KeyRing{} |
| var request = &kmspb.CreateKeyRingRequest{ |
| Parent: formattedParent, |
| KeyRingId: keyRingId, |
| KeyRing: keyRing, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateKeyRing(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceCreateImportJob(t *testing.T) { |
| var name string = "name3373707" |
| var expectedResponse = &kmspb.ImportJob{ |
| Name: name, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var importJobId string = "my-import-job" |
| var importMethod kmspb.ImportJob_ImportMethod = kmspb.ImportJob_RSA_OAEP_3072_SHA1_AES_256 |
| var protectionLevel kmspb.ProtectionLevel = kmspb.ProtectionLevel_HSM |
| var importJob = &kmspb.ImportJob{ |
| ImportMethod: importMethod, |
| ProtectionLevel: protectionLevel, |
| } |
| var request = &kmspb.CreateImportJobRequest{ |
| Parent: formattedParent, |
| ImportJobId: importJobId, |
| ImportJob: importJob, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateImportJob(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceCreateImportJobError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var importJobId string = "my-import-job" |
| var importMethod kmspb.ImportJob_ImportMethod = kmspb.ImportJob_RSA_OAEP_3072_SHA1_AES_256 |
| var protectionLevel kmspb.ProtectionLevel = kmspb.ProtectionLevel_HSM |
| var importJob = &kmspb.ImportJob{ |
| ImportMethod: importMethod, |
| ProtectionLevel: protectionLevel, |
| } |
| var request = &kmspb.CreateImportJobRequest{ |
| Parent: formattedParent, |
| ImportJobId: importJobId, |
| ImportJob: importJob, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateImportJob(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceCreateCryptoKey(t *testing.T) { |
| var name string = "name3373707" |
| var expectedResponse = &kmspb.CryptoKey{ |
| Name: name, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var cryptoKeyId string = "my-app-key" |
| var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT |
| var seconds int64 = 2147483647 |
| var nextRotationTime = ×tamppb.Timestamp{ |
| Seconds: seconds, |
| } |
| var seconds2 int64 = 604800 |
| var rotationPeriod = &durationpb.Duration{ |
| Seconds: seconds2, |
| } |
| var cryptoKey = &kmspb.CryptoKey{ |
| Purpose: purpose, |
| NextRotationTime: nextRotationTime, |
| RotationSchedule: &kmspb.CryptoKey_RotationPeriod{ |
| RotationPeriod: rotationPeriod, |
| }, |
| } |
| var request = &kmspb.CreateCryptoKeyRequest{ |
| Parent: formattedParent, |
| CryptoKeyId: cryptoKeyId, |
| CryptoKey: cryptoKey, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateCryptoKey(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceCreateCryptoKeyError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") |
| var cryptoKeyId string = "my-app-key" |
| var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT |
| var seconds int64 = 2147483647 |
| var nextRotationTime = ×tamppb.Timestamp{ |
| Seconds: seconds, |
| } |
| var seconds2 int64 = 604800 |
| var rotationPeriod = &durationpb.Duration{ |
| Seconds: seconds2, |
| } |
| var cryptoKey = &kmspb.CryptoKey{ |
| Purpose: purpose, |
| NextRotationTime: nextRotationTime, |
| RotationSchedule: &kmspb.CryptoKey_RotationPeriod{ |
| RotationPeriod: rotationPeriod, |
| }, |
| } |
| var request = &kmspb.CreateCryptoKeyRequest{ |
| Parent: formattedParent, |
| CryptoKeyId: cryptoKeyId, |
| CryptoKey: cryptoKey, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateCryptoKey(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceCreateCryptoKeyVersion(t *testing.T) { |
| var name string = "name3373707" |
| var importJob string = "importJob2125587491" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name, |
| ImportJob: importJob, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} |
| var request = &kmspb.CreateCryptoKeyVersionRequest{ |
| Parent: formattedParent, |
| CryptoKeyVersion: cryptoKeyVersion, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceCreateCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} |
| var request = &kmspb.CreateCryptoKeyVersionRequest{ |
| Parent: formattedParent, |
| CryptoKeyVersion: cryptoKeyVersion, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.CreateCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceImportCryptoKeyVersion(t *testing.T) { |
| var name string = "name3373707" |
| var importJob2 string = "importJob2-1714851050" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name, |
| ImportJob: importJob2, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var algorithm kmspb.CryptoKeyVersion_CryptoKeyVersionAlgorithm = kmspb.CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| var importJob string = "importJob2125587491" |
| var request = &kmspb.ImportCryptoKeyVersionRequest{ |
| Parent: formattedParent, |
| Algorithm: algorithm, |
| ImportJob: importJob, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ImportCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceImportCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var algorithm kmspb.CryptoKeyVersion_CryptoKeyVersionAlgorithm = kmspb.CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| var importJob string = "importJob2125587491" |
| var request = &kmspb.ImportCryptoKeyVersionRequest{ |
| Parent: formattedParent, |
| Algorithm: algorithm, |
| ImportJob: importJob, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.ImportCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceUpdateCryptoKey(t *testing.T) { |
| var name string = "name3373707" |
| var expectedResponse = &kmspb.CryptoKey{ |
| Name: name, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{} |
| var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} |
| var request = &kmspb.UpdateCryptoKeyRequest{ |
| CryptoKey: cryptoKey, |
| UpdateMask: updateMask, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKey(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceUpdateCryptoKeyError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{} |
| var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} |
| var request = &kmspb.UpdateCryptoKeyRequest{ |
| CryptoKey: cryptoKey, |
| UpdateMask: updateMask, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKey(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceUpdateCryptoKeyVersion(t *testing.T) { |
| var name string = "name3373707" |
| var importJob string = "importJob2125587491" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name, |
| ImportJob: importJob, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} |
| var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} |
| var request = &kmspb.UpdateCryptoKeyVersionRequest{ |
| CryptoKeyVersion: cryptoKeyVersion, |
| UpdateMask: updateMask, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceUpdateCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} |
| var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} |
| var request = &kmspb.UpdateCryptoKeyVersionRequest{ |
| CryptoKeyVersion: cryptoKeyVersion, |
| UpdateMask: updateMask, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceEncrypt(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var ciphertext []byte = []byte("-72") |
| var expectedResponse = &kmspb.EncryptResponse{ |
| Name: name2, |
| Ciphertext: ciphertext, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]") |
| var plaintext []byte = []byte("-9") |
| var request = &kmspb.EncryptRequest{ |
| Name: formattedName, |
| Plaintext: plaintext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.Encrypt(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceEncryptError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]") |
| var plaintext []byte = []byte("-9") |
| var request = &kmspb.EncryptRequest{ |
| Name: formattedName, |
| Plaintext: plaintext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.Encrypt(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceDecrypt(t *testing.T) { |
| var plaintext []byte = []byte("-9") |
| var expectedResponse = &kmspb.DecryptResponse{ |
| Plaintext: plaintext, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var ciphertext []byte = []byte("-72") |
| var request = &kmspb.DecryptRequest{ |
| Name: formattedName, |
| Ciphertext: ciphertext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.Decrypt(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceDecryptError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var ciphertext []byte = []byte("-72") |
| var request = &kmspb.DecryptRequest{ |
| Name: formattedName, |
| Ciphertext: ciphertext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.Decrypt(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersion(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var expectedResponse = &kmspb.CryptoKey{ |
| Name: name2, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var cryptoKeyVersionId string = "cryptoKeyVersionId729489152" |
| var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ |
| Name: formattedName, |
| CryptoKeyVersionId: cryptoKeyVersionId, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") |
| var cryptoKeyVersionId string = "cryptoKeyVersionId729489152" |
| var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ |
| Name: formattedName, |
| CryptoKeyVersionId: cryptoKeyVersionId, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceDestroyCryptoKeyVersion(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var importJob string = "importJob2125587491" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name2, |
| ImportJob: importJob, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.DestroyCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.DestroyCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceDestroyCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.DestroyCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.DestroyCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceRestoreCryptoKeyVersion(t *testing.T) { |
| var name2 string = "name2-1052831874" |
| var importJob string = "importJob2125587491" |
| var importFailureReason string = "importFailureReason-494073229" |
| var expectedResponse = &kmspb.CryptoKeyVersion{ |
| Name: name2, |
| ImportJob: importJob, |
| ImportFailureReason: importFailureReason, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.RestoreCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.RestoreCryptoKeyVersion(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceRestoreCryptoKeyVersionError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.RestoreCryptoKeyVersionRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.RestoreCryptoKeyVersion(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceGetPublicKey(t *testing.T) { |
| var pem string = "pem110872" |
| var expectedResponse = &kmspb.PublicKey{ |
| Pem: pem, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.GetPublicKeyRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetPublicKey(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceGetPublicKeyError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var request = &kmspb.GetPublicKeyRequest{ |
| Name: formattedName, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.GetPublicKey(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceAsymmetricDecrypt(t *testing.T) { |
| var plaintext []byte = []byte("-9") |
| var expectedResponse = &kmspb.AsymmetricDecryptResponse{ |
| Plaintext: plaintext, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var ciphertext []byte = []byte("-72") |
| var request = &kmspb.AsymmetricDecryptRequest{ |
| Name: formattedName, |
| Ciphertext: ciphertext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.AsymmetricDecrypt(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceAsymmetricDecryptError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var ciphertext []byte = []byte("-72") |
| var request = &kmspb.AsymmetricDecryptRequest{ |
| Name: formattedName, |
| Ciphertext: ciphertext, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.AsymmetricDecrypt(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |
| func TestKeyManagementServiceAsymmetricSign(t *testing.T) { |
| var signature []byte = []byte("106") |
| var expectedResponse = &kmspb.AsymmetricSignResponse{ |
| Signature: signature, |
| } |
| |
| mockKeyManagement.err = nil |
| mockKeyManagement.reqs = nil |
| |
| mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var digest *kmspb.Digest = &kmspb.Digest{} |
| var request = &kmspb.AsymmetricSignRequest{ |
| Name: formattedName, |
| Digest: digest, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.AsymmetricSign(context.Background(), request) |
| |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { |
| t.Errorf("wrong request %q, want %q", got, want) |
| } |
| |
| if want, got := expectedResponse, resp; !proto.Equal(want, got) { |
| t.Errorf("wrong response %q, want %q)", got, want) |
| } |
| } |
| |
| func TestKeyManagementServiceAsymmetricSignError(t *testing.T) { |
| errCode := codes.PermissionDenied |
| mockKeyManagement.err = gstatus.Error(errCode, "test error") |
| |
| var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") |
| var digest *kmspb.Digest = &kmspb.Digest{} |
| var request = &kmspb.AsymmetricSignRequest{ |
| Name: formattedName, |
| Digest: digest, |
| } |
| |
| c, err := NewKeyManagementClient(context.Background(), clientOpt) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| resp, err := c.AsymmetricSign(context.Background(), request) |
| |
| if st, ok := gstatus.FromError(err); !ok { |
| t.Errorf("got error %v, expected grpc error", err) |
| } else if c := st.Code(); c != errCode { |
| t.Errorf("got error code %q, want %q", c, errCode) |
| } |
| _ = resp |
| } |