20
20
from google .cloud import kms_v1
21
21
from google .cloud .kms_v1 import enums
22
22
from google .iam .v1 .policy_pb2 import Policy
23
-
23
+ import backoff
24
24
import pytest
25
25
26
26
import snippets
27
27
28
- from gcp_devrel .testing import eventually_consistent
29
-
30
28
31
29
def create_key_helper (key_id , purpose , algorithm , t ):
32
30
try :
@@ -181,6 +179,8 @@ def test_key_policy(self):
181
179
self .member ,
182
180
self .role )
183
181
182
+ @backoff .on_exception (
183
+ backoff .expo , (Aborted , AssertionError ), max_time = 60 )
184
184
def check_policy ():
185
185
policy = snippets .get_crypto_key_policy (
186
186
self .project_id ,
@@ -192,8 +192,9 @@ def check_policy():
192
192
if b .role == self .role and self .member in b .members :
193
193
found = True
194
194
assert found
195
- eventually_consistent .call (check_policy ,
196
- exceptions = (Aborted , AssertionError ))
195
+
196
+ check_policy ()
197
+
197
198
# remove member
198
199
snippets .remove_member_from_crypto_key_policy (
199
200
self .project_id ,
@@ -203,7 +204,9 @@ def check_policy():
203
204
self .member ,
204
205
self .role )
205
206
206
- def check_policy ():
207
+ @backoff .on_exception (
208
+ backoff .expo , (Aborted , AssertionError ), max_time = 60 )
209
+ def check_policy_again ():
207
210
policy = snippets .get_crypto_key_policy (
208
211
self .project_id ,
209
212
self .location ,
@@ -214,9 +217,8 @@ def check_policy():
214
217
if b .role == self .role and self .member in b .members :
215
218
found = True
216
219
assert not found
217
- eventually_consistent .call (
218
- check_policy ,
219
- exceptions = (Aborted , AssertionError ))
220
+
221
+ check_policy_again ()
220
222
221
223
def test_symmetric_encrypt_decrypt (self ):
222
224
cipher_bytes = snippets .encrypt_symmetric (self .project_id ,
0 commit comments