mirror of
https://github.com/Luzifer/nginx-sso.git
synced 2024-12-21 05:11:17 +00:00
1569 lines
48 KiB
Go
1569 lines
48 KiB
Go
|
// Copyright 2019 Google LLC
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
// you may not use this file except in compliance with the License.
|
||
|
// You may obtain a copy of the License at
|
||
|
//
|
||
|
// https://www.apache.org/licenses/LICENSE-2.0
|
||
|
//
|
||
|
// Unless required by applicable law or agreed to in writing, software
|
||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
// See the License for the specific language governing permissions and
|
||
|
// limitations under the License.
|
||
|
|
||
|
// Code generated by gapic-generator. DO NOT EDIT.
|
||
|
|
||
|
package kms
|
||
|
|
||
|
import (
|
||
|
durationpb "github.com/golang/protobuf/ptypes/duration"
|
||
|
timestamppb "github.com/golang/protobuf/ptypes/timestamp"
|
||
|
kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1"
|
||
|
field_maskpb "google.golang.org/genproto/protobuf/field_mask"
|
||
|
)
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"flag"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"log"
|
||
|
"net"
|
||
|
"os"
|
||
|
"strings"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/golang/protobuf/proto"
|
||
|
"github.com/golang/protobuf/ptypes"
|
||
|
"google.golang.org/api/option"
|
||
|
status "google.golang.org/genproto/googleapis/rpc/status"
|
||
|
"google.golang.org/grpc"
|
||
|
"google.golang.org/grpc/codes"
|
||
|
"google.golang.org/grpc/metadata"
|
||
|
gstatus "google.golang.org/grpc/status"
|
||
|
)
|
||
|
|
||
|
var _ = io.EOF
|
||
|
var _ = ptypes.MarshalAny
|
||
|
var _ status.Status
|
||
|
|
||
|
type mockKeyManagementServer struct {
|
||
|
// Embed for forward compatibility.
|
||
|
// Tests will keep working if more methods are added
|
||
|
// in the future.
|
||
|
kmspb.KeyManagementServiceServer
|
||
|
|
||
|
reqs []proto.Message
|
||
|
|
||
|
// If set, all calls return this error.
|
||
|
err error
|
||
|
|
||
|
// responses to return if err == nil
|
||
|
resps []proto.Message
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) ListKeyRings(ctx context.Context, req *kmspb.ListKeyRingsRequest) (*kmspb.ListKeyRingsResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.ListKeyRingsResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) ListCryptoKeys(ctx context.Context, req *kmspb.ListCryptoKeysRequest) (*kmspb.ListCryptoKeysResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.ListCryptoKeysResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) ListCryptoKeyVersions(ctx context.Context, req *kmspb.ListCryptoKeyVersionsRequest) (*kmspb.ListCryptoKeyVersionsResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.ListCryptoKeyVersionsResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) GetKeyRing(ctx context.Context, req *kmspb.GetKeyRingRequest) (*kmspb.KeyRing, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.KeyRing), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) GetCryptoKey(ctx context.Context, req *kmspb.GetCryptoKeyRequest) (*kmspb.CryptoKey, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKey), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) GetCryptoKeyVersion(ctx context.Context, req *kmspb.GetCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKeyVersion), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) GetPublicKey(ctx context.Context, req *kmspb.GetPublicKeyRequest) (*kmspb.PublicKey, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.PublicKey), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) CreateKeyRing(ctx context.Context, req *kmspb.CreateKeyRingRequest) (*kmspb.KeyRing, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.KeyRing), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) CreateCryptoKey(ctx context.Context, req *kmspb.CreateCryptoKeyRequest) (*kmspb.CryptoKey, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKey), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) CreateCryptoKeyVersion(ctx context.Context, req *kmspb.CreateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKeyVersion), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) UpdateCryptoKey(ctx context.Context, req *kmspb.UpdateCryptoKeyRequest) (*kmspb.CryptoKey, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKey), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) UpdateCryptoKeyVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKeyVersion), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) Encrypt(ctx context.Context, req *kmspb.EncryptRequest) (*kmspb.EncryptResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.EncryptResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) Decrypt(ctx context.Context, req *kmspb.DecryptRequest) (*kmspb.DecryptResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.DecryptResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest) (*kmspb.AsymmetricSignResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.AsymmetricSignResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest) (*kmspb.AsymmetricDecryptResponse, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.AsymmetricDecryptResponse), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyPrimaryVersionRequest) (*kmspb.CryptoKey, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKey), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) DestroyCryptoKeyVersion(ctx context.Context, req *kmspb.DestroyCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKeyVersion), nil
|
||
|
}
|
||
|
|
||
|
func (s *mockKeyManagementServer) RestoreCryptoKeyVersion(ctx context.Context, req *kmspb.RestoreCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) {
|
||
|
md, _ := metadata.FromIncomingContext(ctx)
|
||
|
if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") {
|
||
|
return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg)
|
||
|
}
|
||
|
s.reqs = append(s.reqs, req)
|
||
|
if s.err != nil {
|
||
|
return nil, s.err
|
||
|
}
|
||
|
return s.resps[0].(*kmspb.CryptoKeyVersion), nil
|
||
|
}
|
||
|
|
||
|
// clientOpt is the option tests should use to connect to the test server.
|
||
|
// It is initialized by TestMain.
|
||
|
var clientOpt option.ClientOption
|
||
|
|
||
|
var (
|
||
|
mockKeyManagement mockKeyManagementServer
|
||
|
)
|
||
|
|
||
|
func TestMain(m *testing.M) {
|
||
|
flag.Parse()
|
||
|
|
||
|
serv := grpc.NewServer()
|
||
|
kmspb.RegisterKeyManagementServiceServer(serv, &mockKeyManagement)
|
||
|
|
||
|
lis, err := net.Listen("tcp", "localhost:0")
|
||
|
if err != nil {
|
||
|
log.Fatal(err)
|
||
|
}
|
||
|
go serv.Serve(lis)
|
||
|
|
||
|
conn, err := grpc.Dial(lis.Addr().String(), grpc.WithInsecure())
|
||
|
if err != nil {
|
||
|
log.Fatal(err)
|
||
|
}
|
||
|
clientOpt = option.WithGRPCConn(conn)
|
||
|
|
||
|
os.Exit(m.Run())
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceListKeyRings(t *testing.T) {
|
||
|
var nextPageToken string = ""
|
||
|
var totalSize int32 = 705419236
|
||
|
var keyRingsElement *kmspb.KeyRing = &kmspb.KeyRing{}
|
||
|
var keyRings = []*kmspb.KeyRing{keyRingsElement}
|
||
|
var expectedResponse = &kmspb.ListKeyRingsResponse{
|
||
|
NextPageToken: nextPageToken,
|
||
|
TotalSize: totalSize,
|
||
|
KeyRings: keyRings,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]")
|
||
|
var request = &kmspb.ListKeyRingsRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListKeyRings(context.Background(), request).Next()
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
want := (interface{})(expectedResponse.KeyRings[0])
|
||
|
got := (interface{})(resp)
|
||
|
var ok bool
|
||
|
|
||
|
switch want := (want).(type) {
|
||
|
case proto.Message:
|
||
|
ok = proto.Equal(want, got.(proto.Message))
|
||
|
default:
|
||
|
ok = want == got
|
||
|
}
|
||
|
if !ok {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceListKeyRingsError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]")
|
||
|
var request = &kmspb.ListKeyRingsRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListKeyRings(context.Background(), request).Next()
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceListCryptoKeys(t *testing.T) {
|
||
|
var nextPageToken string = ""
|
||
|
var totalSize int32 = 705419236
|
||
|
var cryptoKeysElement *kmspb.CryptoKey = &kmspb.CryptoKey{}
|
||
|
var cryptoKeys = []*kmspb.CryptoKey{cryptoKeysElement}
|
||
|
var expectedResponse = &kmspb.ListCryptoKeysResponse{
|
||
|
NextPageToken: nextPageToken,
|
||
|
TotalSize: totalSize,
|
||
|
CryptoKeys: cryptoKeys,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var request = &kmspb.ListCryptoKeysRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListCryptoKeys(context.Background(), request).Next()
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
want := (interface{})(expectedResponse.CryptoKeys[0])
|
||
|
got := (interface{})(resp)
|
||
|
var ok bool
|
||
|
|
||
|
switch want := (want).(type) {
|
||
|
case proto.Message:
|
||
|
ok = proto.Equal(want, got.(proto.Message))
|
||
|
default:
|
||
|
ok = want == got
|
||
|
}
|
||
|
if !ok {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceListCryptoKeysError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var request = &kmspb.ListCryptoKeysRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListCryptoKeys(context.Background(), request).Next()
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceListCryptoKeyVersions(t *testing.T) {
|
||
|
var nextPageToken string = ""
|
||
|
var totalSize int32 = 705419236
|
||
|
var cryptoKeyVersionsElement *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{}
|
||
|
var cryptoKeyVersions = []*kmspb.CryptoKeyVersion{cryptoKeyVersionsElement}
|
||
|
var expectedResponse = &kmspb.ListCryptoKeyVersionsResponse{
|
||
|
NextPageToken: nextPageToken,
|
||
|
TotalSize: totalSize,
|
||
|
CryptoKeyVersions: cryptoKeyVersions,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var request = &kmspb.ListCryptoKeyVersionsRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next()
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
want := (interface{})(expectedResponse.CryptoKeyVersions[0])
|
||
|
got := (interface{})(resp)
|
||
|
var ok bool
|
||
|
|
||
|
switch want := (want).(type) {
|
||
|
case proto.Message:
|
||
|
ok = proto.Equal(want, got.(proto.Message))
|
||
|
default:
|
||
|
ok = want == got
|
||
|
}
|
||
|
if !ok {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceListCryptoKeyVersionsError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var request = &kmspb.ListCryptoKeyVersionsRequest{
|
||
|
Parent: formattedParent,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next()
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceGetKeyRing(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.KeyRing{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var request = &kmspb.GetKeyRingRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetKeyRing(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceGetKeyRingError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var request = &kmspb.GetKeyRingRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetKeyRing(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceGetCryptoKey(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.CryptoKey{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var request = &kmspb.GetCryptoKeyRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetCryptoKey(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceGetCryptoKeyError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var request = &kmspb.GetCryptoKeyRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetCryptoKey(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceGetCryptoKeyVersion(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.CryptoKeyVersion{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.GetCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceGetCryptoKeyVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.GetCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceCreateKeyRing(t *testing.T) {
|
||
|
var name string = "name3373707"
|
||
|
var expectedResponse = &kmspb.KeyRing{
|
||
|
Name: name,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]")
|
||
|
var keyRingId string = "keyRingId-2056646742"
|
||
|
var keyRing *kmspb.KeyRing = &kmspb.KeyRing{}
|
||
|
var request = &kmspb.CreateKeyRingRequest{
|
||
|
Parent: formattedParent,
|
||
|
KeyRingId: keyRingId,
|
||
|
KeyRing: keyRing,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateKeyRing(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceCreateKeyRingError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]")
|
||
|
var keyRingId string = "keyRingId-2056646742"
|
||
|
var keyRing *kmspb.KeyRing = &kmspb.KeyRing{}
|
||
|
var request = &kmspb.CreateKeyRingRequest{
|
||
|
Parent: formattedParent,
|
||
|
KeyRingId: keyRingId,
|
||
|
KeyRing: keyRing,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateKeyRing(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceCreateCryptoKey(t *testing.T) {
|
||
|
var name string = "name3373707"
|
||
|
var expectedResponse = &kmspb.CryptoKey{
|
||
|
Name: name,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var cryptoKeyId string = "my-app-key"
|
||
|
var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT
|
||
|
var seconds int64 = 2147483647
|
||
|
var nextRotationTime = ×tamppb.Timestamp{
|
||
|
Seconds: seconds,
|
||
|
}
|
||
|
var seconds2 int64 = 604800
|
||
|
var rotationPeriod = &durationpb.Duration{
|
||
|
Seconds: seconds2,
|
||
|
}
|
||
|
var cryptoKey = &kmspb.CryptoKey{
|
||
|
Purpose: purpose,
|
||
|
NextRotationTime: nextRotationTime,
|
||
|
RotationSchedule: &kmspb.CryptoKey_RotationPeriod{
|
||
|
RotationPeriod: rotationPeriod,
|
||
|
},
|
||
|
}
|
||
|
var request = &kmspb.CreateCryptoKeyRequest{
|
||
|
Parent: formattedParent,
|
||
|
CryptoKeyId: cryptoKeyId,
|
||
|
CryptoKey: cryptoKey,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateCryptoKey(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceCreateCryptoKeyError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]")
|
||
|
var cryptoKeyId string = "my-app-key"
|
||
|
var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT
|
||
|
var seconds int64 = 2147483647
|
||
|
var nextRotationTime = ×tamppb.Timestamp{
|
||
|
Seconds: seconds,
|
||
|
}
|
||
|
var seconds2 int64 = 604800
|
||
|
var rotationPeriod = &durationpb.Duration{
|
||
|
Seconds: seconds2,
|
||
|
}
|
||
|
var cryptoKey = &kmspb.CryptoKey{
|
||
|
Purpose: purpose,
|
||
|
NextRotationTime: nextRotationTime,
|
||
|
RotationSchedule: &kmspb.CryptoKey_RotationPeriod{
|
||
|
RotationPeriod: rotationPeriod,
|
||
|
},
|
||
|
}
|
||
|
var request = &kmspb.CreateCryptoKeyRequest{
|
||
|
Parent: formattedParent,
|
||
|
CryptoKeyId: cryptoKeyId,
|
||
|
CryptoKey: cryptoKey,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateCryptoKey(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceCreateCryptoKeyVersion(t *testing.T) {
|
||
|
var name string = "name3373707"
|
||
|
var expectedResponse = &kmspb.CryptoKeyVersion{
|
||
|
Name: name,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{}
|
||
|
var request = &kmspb.CreateCryptoKeyVersionRequest{
|
||
|
Parent: formattedParent,
|
||
|
CryptoKeyVersion: cryptoKeyVersion,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceCreateCryptoKeyVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{}
|
||
|
var request = &kmspb.CreateCryptoKeyVersionRequest{
|
||
|
Parent: formattedParent,
|
||
|
CryptoKeyVersion: cryptoKeyVersion,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.CreateCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceUpdateCryptoKey(t *testing.T) {
|
||
|
var name string = "name3373707"
|
||
|
var expectedResponse = &kmspb.CryptoKey{
|
||
|
Name: name,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{}
|
||
|
var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{}
|
||
|
var request = &kmspb.UpdateCryptoKeyRequest{
|
||
|
CryptoKey: cryptoKey,
|
||
|
UpdateMask: updateMask,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKey(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceUpdateCryptoKeyError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{}
|
||
|
var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{}
|
||
|
var request = &kmspb.UpdateCryptoKeyRequest{
|
||
|
CryptoKey: cryptoKey,
|
||
|
UpdateMask: updateMask,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKey(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceUpdateCryptoKeyVersion(t *testing.T) {
|
||
|
var name string = "name3373707"
|
||
|
var expectedResponse = &kmspb.CryptoKeyVersion{
|
||
|
Name: name,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{}
|
||
|
var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{}
|
||
|
var request = &kmspb.UpdateCryptoKeyVersionRequest{
|
||
|
CryptoKeyVersion: cryptoKeyVersion,
|
||
|
UpdateMask: updateMask,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceUpdateCryptoKeyVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{}
|
||
|
var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{}
|
||
|
var request = &kmspb.UpdateCryptoKeyVersionRequest{
|
||
|
CryptoKeyVersion: cryptoKeyVersion,
|
||
|
UpdateMask: updateMask,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceEncrypt(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var ciphertext []byte = []byte("-72")
|
||
|
var expectedResponse = &kmspb.EncryptResponse{
|
||
|
Name: name2,
|
||
|
Ciphertext: ciphertext,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]")
|
||
|
var plaintext []byte = []byte("-9")
|
||
|
var request = &kmspb.EncryptRequest{
|
||
|
Name: formattedName,
|
||
|
Plaintext: plaintext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.Encrypt(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceEncryptError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]")
|
||
|
var plaintext []byte = []byte("-9")
|
||
|
var request = &kmspb.EncryptRequest{
|
||
|
Name: formattedName,
|
||
|
Plaintext: plaintext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.Encrypt(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceDecrypt(t *testing.T) {
|
||
|
var plaintext []byte = []byte("-9")
|
||
|
var expectedResponse = &kmspb.DecryptResponse{
|
||
|
Plaintext: plaintext,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var ciphertext []byte = []byte("-72")
|
||
|
var request = &kmspb.DecryptRequest{
|
||
|
Name: formattedName,
|
||
|
Ciphertext: ciphertext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.Decrypt(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceDecryptError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var ciphertext []byte = []byte("-72")
|
||
|
var request = &kmspb.DecryptRequest{
|
||
|
Name: formattedName,
|
||
|
Ciphertext: ciphertext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.Decrypt(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersion(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.CryptoKey{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var cryptoKeyVersionId string = "cryptoKeyVersionId729489152"
|
||
|
var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{
|
||
|
Name: formattedName,
|
||
|
CryptoKeyVersionId: cryptoKeyVersionId,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
|
||
|
var cryptoKeyVersionId string = "cryptoKeyVersionId729489152"
|
||
|
var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{
|
||
|
Name: formattedName,
|
||
|
CryptoKeyVersionId: cryptoKeyVersionId,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceDestroyCryptoKeyVersion(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.CryptoKeyVersion{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.DestroyCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.DestroyCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceDestroyCryptoKeyVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.DestroyCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.DestroyCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceRestoreCryptoKeyVersion(t *testing.T) {
|
||
|
var name2 string = "name2-1052831874"
|
||
|
var expectedResponse = &kmspb.CryptoKeyVersion{
|
||
|
Name: name2,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.RestoreCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.RestoreCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceRestoreCryptoKeyVersionError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.RestoreCryptoKeyVersionRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.RestoreCryptoKeyVersion(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceGetPublicKey(t *testing.T) {
|
||
|
var pem string = "pem110872"
|
||
|
var expectedResponse = &kmspb.PublicKey{
|
||
|
Pem: pem,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.GetPublicKeyRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetPublicKey(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceGetPublicKeyError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var request = &kmspb.GetPublicKeyRequest{
|
||
|
Name: formattedName,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.GetPublicKey(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceAsymmetricDecrypt(t *testing.T) {
|
||
|
var plaintext []byte = []byte("-9")
|
||
|
var expectedResponse = &kmspb.AsymmetricDecryptResponse{
|
||
|
Plaintext: plaintext,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var ciphertext []byte = []byte("-72")
|
||
|
var request = &kmspb.AsymmetricDecryptRequest{
|
||
|
Name: formattedName,
|
||
|
Ciphertext: ciphertext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.AsymmetricDecrypt(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceAsymmetricDecryptError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var ciphertext []byte = []byte("-72")
|
||
|
var request = &kmspb.AsymmetricDecryptRequest{
|
||
|
Name: formattedName,
|
||
|
Ciphertext: ciphertext,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.AsymmetricDecrypt(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|
||
|
func TestKeyManagementServiceAsymmetricSign(t *testing.T) {
|
||
|
var signature []byte = []byte("106")
|
||
|
var expectedResponse = &kmspb.AsymmetricSignResponse{
|
||
|
Signature: signature,
|
||
|
}
|
||
|
|
||
|
mockKeyManagement.err = nil
|
||
|
mockKeyManagement.reqs = nil
|
||
|
|
||
|
mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse)
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var digest *kmspb.Digest = &kmspb.Digest{}
|
||
|
var request = &kmspb.AsymmetricSignRequest{
|
||
|
Name: formattedName,
|
||
|
Digest: digest,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.AsymmetricSign(context.Background(), request)
|
||
|
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong request %q, want %q", got, want)
|
||
|
}
|
||
|
|
||
|
if want, got := expectedResponse, resp; !proto.Equal(want, got) {
|
||
|
t.Errorf("wrong response %q, want %q)", got, want)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyManagementServiceAsymmetricSignError(t *testing.T) {
|
||
|
errCode := codes.PermissionDenied
|
||
|
mockKeyManagement.err = gstatus.Error(errCode, "test error")
|
||
|
|
||
|
var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
|
||
|
var digest *kmspb.Digest = &kmspb.Digest{}
|
||
|
var request = &kmspb.AsymmetricSignRequest{
|
||
|
Name: formattedName,
|
||
|
Digest: digest,
|
||
|
}
|
||
|
|
||
|
c, err := NewKeyManagementClient(context.Background(), clientOpt)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
resp, err := c.AsymmetricSign(context.Background(), request)
|
||
|
|
||
|
if st, ok := gstatus.FromError(err); !ok {
|
||
|
t.Errorf("got error %v, expected grpc error", err)
|
||
|
} else if c := st.Code(); c != errCode {
|
||
|
t.Errorf("got error code %q, want %q", c, errCode)
|
||
|
}
|
||
|
_ = resp
|
||
|
}
|