13
13
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
14
# See the License for the specific language governing permissions and
15
15
16
+ import os
16
17
import random
17
18
import string
18
19
19
20
import googleapiclient .discovery
20
21
21
22
import snippets
22
23
24
+ PROJECT = os .environ ['GCLOUD_PROJECT' ]
23
25
24
26
# Your Google Cloud Platform Key Location
25
27
LOCATION = 'global'
42
44
ROLE = 'roles/owner'
43
45
44
46
45
- def test_create_keyring (capsys , cloud_config ):
46
- snippets .create_keyring (cloud_config . project , LOCATION , KEYRING )
47
+ def test_create_keyring (capsys ):
48
+ snippets .create_keyring (PROJECT , LOCATION , KEYRING )
47
49
out , _ = capsys .readouterr ()
48
50
expected = 'Created KeyRing projects/{}/locations/{}/keyRings/{}.' .format (
49
- cloud_config . project , LOCATION , KEYRING )
51
+ PROJECT , LOCATION , KEYRING )
50
52
assert expected in out
51
53
52
54
53
- def test_create_cryptokey (capsys , cloud_config ):
55
+ def test_create_cryptokey (capsys ):
54
56
snippets .create_cryptokey (
55
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY )
57
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY )
56
58
out , _ = capsys .readouterr ()
57
59
expected = (
58
60
'Created CryptoKey projects/{}/locations/{}/keyRings/{}/cryptoKeys/{}.'
59
- .format (cloud_config . project , LOCATION , KEYRING , CRYPTOKEY ))
61
+ .format (PROJECT , LOCATION , KEYRING , CRYPTOKEY ))
60
62
assert expected in out
61
63
62
64
63
- def test_encrypt_decrypt (capsys , cloud_config , tmpdir ):
65
+ def test_encrypt_decrypt (capsys , tmpdir ):
64
66
# Write to a plaintext file.
65
67
tmpdir .join ('in.txt' ).write ('SampleText' )
66
68
@@ -71,10 +73,10 @@ def test_encrypt_decrypt(capsys, cloud_config, tmpdir):
71
73
72
74
# Encrypt text and then decrypt it.
73
75
snippets .encrypt (
74
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY ,
76
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY ,
75
77
str (plaintext_file ), str (encrypted_file ))
76
78
snippets .decrypt (
77
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY ,
79
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY ,
78
80
str (encrypted_file ), str (decrypted_file ))
79
81
80
82
# Make sure the decrypted text matches the original text.
@@ -87,35 +89,35 @@ def test_encrypt_decrypt(capsys, cloud_config, tmpdir):
87
89
assert 'Saved decrypted text to {}.' .format (str (decrypted_file )) in out
88
90
89
91
90
- def test_disable_cryptokey_version (capsys , cloud_config ):
92
+ def test_disable_cryptokey_version (capsys ):
91
93
snippets .disable_cryptokey_version (
92
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY , VERSION )
94
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY , VERSION )
93
95
out , _ = capsys .readouterr ()
94
96
expected = (
95
97
'CryptoKeyVersion projects/{}/locations/{}/keyRings/{}/cryptoKeys/{}/'
96
98
'cryptoKeyVersions/{}\' s state has been set to {}.'
97
99
.format (
98
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY , VERSION ,
100
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY , VERSION ,
99
101
'DISABLED' ))
100
102
assert expected in out
101
103
102
104
103
- def test_destroy_cryptokey_version (capsys , cloud_config ):
105
+ def test_destroy_cryptokey_version (capsys ):
104
106
snippets .destroy_cryptokey_version (
105
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY , VERSION )
107
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY , VERSION )
106
108
out , _ = capsys .readouterr ()
107
109
expected = (
108
110
'CryptoKeyVersion projects/{}/locations/{}/keyRings/{}/cryptoKeys/{}/'
109
111
'cryptoKeyVersions/{}\' s state has been set to {}.'
110
112
.format (
111
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY , VERSION ,
113
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY , VERSION ,
112
114
'DESTROY_SCHEDULED' ))
113
115
assert expected in out
114
116
115
117
116
- def test_add_member_to_cryptokey_policy (capsys , cloud_config ):
118
+ def test_add_member_to_cryptokey_policy (capsys ):
117
119
snippets .add_member_to_cryptokey_policy (
118
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY , MEMBER , ROLE )
120
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY , MEMBER , ROLE )
119
121
out , _ = capsys .readouterr ()
120
122
expected = (
121
123
'Member {} added with role {} to policy for CryptoKey {} in KeyRing {}'
@@ -124,7 +126,7 @@ def test_add_member_to_cryptokey_policy(capsys, cloud_config):
124
126
125
127
kms_client = googleapiclient .discovery .build ('cloudkms' , 'v1' )
126
128
parent = 'projects/{}/locations/{}/keyRings/{}/cryptoKeys/{}' .format (
127
- cloud_config . project , LOCATION , KEYRING , CRYPTOKEY )
129
+ PROJECT , LOCATION , KEYRING , CRYPTOKEY )
128
130
cryptokeys = kms_client .projects ().locations ().keyRings ().cryptoKeys ()
129
131
policy_request = cryptokeys .getIamPolicy (resource = parent )
130
132
policy_response = policy_request .execute ()
@@ -139,8 +141,8 @@ def test_add_member_to_cryptokey_policy(capsys, cloud_config):
139
141
assert found_member_role_pair
140
142
141
143
142
- def test_get_keyring_policy (capsys , cloud_config ):
143
- project_id = cloud_config . project
144
+ def test_get_keyring_policy (capsys ):
145
+ project_id = PROJECT
144
146
snippets .get_keyring_policy (project_id , LOCATION , KEYRING )
145
147
out , _ = capsys .readouterr ()
146
148
expected_roles_exist = (
0 commit comments