// Copyright 2019 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // Code generated by gapic-generator. DO NOT EDIT. package kms import ( durationpb "github.com/golang/protobuf/ptypes/duration" timestamppb "github.com/golang/protobuf/ptypes/timestamp" kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1" iampb "google.golang.org/genproto/googleapis/iam/v1" field_maskpb "google.golang.org/genproto/protobuf/field_mask" ) import ( "context" "flag" "fmt" "io" "log" "net" "os" "strings" "testing" "github.com/golang/protobuf/proto" "github.com/golang/protobuf/ptypes" "google.golang.org/api/option" status "google.golang.org/genproto/googleapis/rpc/status" "google.golang.org/grpc" "google.golang.org/grpc/codes" "google.golang.org/grpc/metadata" gstatus "google.golang.org/grpc/status" ) var _ = io.EOF var _ = ptypes.MarshalAny var _ status.Status type mockKeyManagementServer struct { // Embed for forward compatibility. // Tests will keep working if more methods are added // in the future. kmspb.KeyManagementServiceServer reqs []proto.Message // If set, all calls return this error. err error // responses to return if err == nil resps []proto.Message } func (s *mockKeyManagementServer) ListKeyRings(ctx context.Context, req *kmspb.ListKeyRingsRequest) (*kmspb.ListKeyRingsResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.ListKeyRingsResponse), nil } func (s *mockKeyManagementServer) ListCryptoKeys(ctx context.Context, req *kmspb.ListCryptoKeysRequest) (*kmspb.ListCryptoKeysResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.ListCryptoKeysResponse), nil } func (s *mockKeyManagementServer) ListCryptoKeyVersions(ctx context.Context, req *kmspb.ListCryptoKeyVersionsRequest) (*kmspb.ListCryptoKeyVersionsResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.ListCryptoKeyVersionsResponse), nil } func (s *mockKeyManagementServer) GetKeyRing(ctx context.Context, req *kmspb.GetKeyRingRequest) (*kmspb.KeyRing, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.KeyRing), nil } func (s *mockKeyManagementServer) GetCryptoKey(ctx context.Context, req *kmspb.GetCryptoKeyRequest) (*kmspb.CryptoKey, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKey), nil } func (s *mockKeyManagementServer) GetCryptoKeyVersion(ctx context.Context, req *kmspb.GetCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKeyVersion), nil } func (s *mockKeyManagementServer) GetPublicKey(ctx context.Context, req *kmspb.GetPublicKeyRequest) (*kmspb.PublicKey, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.PublicKey), nil } func (s *mockKeyManagementServer) CreateKeyRing(ctx context.Context, req *kmspb.CreateKeyRingRequest) (*kmspb.KeyRing, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.KeyRing), nil } func (s *mockKeyManagementServer) CreateCryptoKey(ctx context.Context, req *kmspb.CreateCryptoKeyRequest) (*kmspb.CryptoKey, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKey), nil } func (s *mockKeyManagementServer) CreateCryptoKeyVersion(ctx context.Context, req *kmspb.CreateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKeyVersion), nil } func (s *mockKeyManagementServer) UpdateCryptoKey(ctx context.Context, req *kmspb.UpdateCryptoKeyRequest) (*kmspb.CryptoKey, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKey), nil } func (s *mockKeyManagementServer) UpdateCryptoKeyVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKeyVersion), nil } func (s *mockKeyManagementServer) Encrypt(ctx context.Context, req *kmspb.EncryptRequest) (*kmspb.EncryptResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.EncryptResponse), nil } func (s *mockKeyManagementServer) Decrypt(ctx context.Context, req *kmspb.DecryptRequest) (*kmspb.DecryptResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.DecryptResponse), nil } func (s *mockKeyManagementServer) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest) (*kmspb.AsymmetricSignResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.AsymmetricSignResponse), nil } func (s *mockKeyManagementServer) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest) (*kmspb.AsymmetricDecryptResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.AsymmetricDecryptResponse), nil } func (s *mockKeyManagementServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyPrimaryVersionRequest) (*kmspb.CryptoKey, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKey), nil } func (s *mockKeyManagementServer) DestroyCryptoKeyVersion(ctx context.Context, req *kmspb.DestroyCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKeyVersion), nil } func (s *mockKeyManagementServer) RestoreCryptoKeyVersion(ctx context.Context, req *kmspb.RestoreCryptoKeyVersionRequest) (*kmspb.CryptoKeyVersion, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*kmspb.CryptoKeyVersion), nil } type mockIamPolicyServer struct { // Embed for forward compatibility. // Tests will keep working if more methods are added // in the future. iampb.IAMPolicyServer reqs []proto.Message // If set, all calls return this error. err error // responses to return if err == nil resps []proto.Message } func (s *mockIamPolicyServer) SetIamPolicy(ctx context.Context, req *iampb.SetIamPolicyRequest) (*iampb.Policy, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*iampb.Policy), nil } func (s *mockIamPolicyServer) GetIamPolicy(ctx context.Context, req *iampb.GetIamPolicyRequest) (*iampb.Policy, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*iampb.Policy), nil } func (s *mockIamPolicyServer) TestIamPermissions(ctx context.Context, req *iampb.TestIamPermissionsRequest) (*iampb.TestIamPermissionsResponse, error) { md, _ := metadata.FromIncomingContext(ctx) if xg := md["x-goog-api-client"]; len(xg) == 0 || !strings.Contains(xg[0], "gl-go/") { return nil, fmt.Errorf("x-goog-api-client = %v, expected gl-go key", xg) } s.reqs = append(s.reqs, req) if s.err != nil { return nil, s.err } return s.resps[0].(*iampb.TestIamPermissionsResponse), nil } // clientOpt is the option tests should use to connect to the test server. // It is initialized by TestMain. var clientOpt option.ClientOption var ( mockKeyManagement mockKeyManagementServer mockIamPolicy mockIamPolicyServer ) func TestMain(m *testing.M) { flag.Parse() serv := grpc.NewServer() kmspb.RegisterKeyManagementServiceServer(serv, &mockKeyManagement) iampb.RegisterIAMPolicyServer(serv, &mockIamPolicy) lis, err := net.Listen("tcp", "localhost:0") if err != nil { log.Fatal(err) } go serv.Serve(lis) conn, err := grpc.Dial(lis.Addr().String(), grpc.WithInsecure()) if err != nil { log.Fatal(err) } clientOpt = option.WithGRPCConn(conn) os.Exit(m.Run()) } func TestKeyManagementServiceListKeyRings(t *testing.T) { var nextPageToken string = "" var totalSize int32 = 705419236 var keyRingsElement *kmspb.KeyRing = &kmspb.KeyRing{} var keyRings = []*kmspb.KeyRing{keyRingsElement} var expectedResponse = &kmspb.ListKeyRingsResponse{ NextPageToken: nextPageToken, TotalSize: totalSize, KeyRings: keyRings, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") var request = &kmspb.ListKeyRingsRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListKeyRings(context.Background(), request).Next() if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } want := (interface{})(expectedResponse.KeyRings[0]) got := (interface{})(resp) var ok bool switch want := (want).(type) { case proto.Message: ok = proto.Equal(want, got.(proto.Message)) default: ok = want == got } if !ok { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceListKeyRingsError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") var request = &kmspb.ListKeyRingsRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListKeyRings(context.Background(), request).Next() if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceListCryptoKeys(t *testing.T) { var nextPageToken string = "" var totalSize int32 = 705419236 var cryptoKeysElement *kmspb.CryptoKey = &kmspb.CryptoKey{} var cryptoKeys = []*kmspb.CryptoKey{cryptoKeysElement} var expectedResponse = &kmspb.ListCryptoKeysResponse{ NextPageToken: nextPageToken, TotalSize: totalSize, CryptoKeys: cryptoKeys, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var request = &kmspb.ListCryptoKeysRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListCryptoKeys(context.Background(), request).Next() if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } want := (interface{})(expectedResponse.CryptoKeys[0]) got := (interface{})(resp) var ok bool switch want := (want).(type) { case proto.Message: ok = proto.Equal(want, got.(proto.Message)) default: ok = want == got } if !ok { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceListCryptoKeysError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var request = &kmspb.ListCryptoKeysRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListCryptoKeys(context.Background(), request).Next() if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceListCryptoKeyVersions(t *testing.T) { var nextPageToken string = "" var totalSize int32 = 705419236 var cryptoKeyVersionsElement *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} var cryptoKeyVersions = []*kmspb.CryptoKeyVersion{cryptoKeyVersionsElement} var expectedResponse = &kmspb.ListCryptoKeyVersionsResponse{ NextPageToken: nextPageToken, TotalSize: totalSize, CryptoKeyVersions: cryptoKeyVersions, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var request = &kmspb.ListCryptoKeyVersionsRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next() if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } want := (interface{})(expectedResponse.CryptoKeyVersions[0]) got := (interface{})(resp) var ok bool switch want := (want).(type) { case proto.Message: ok = proto.Equal(want, got.(proto.Message)) default: ok = want == got } if !ok { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceListCryptoKeyVersionsError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var request = &kmspb.ListCryptoKeyVersionsRequest{ Parent: formattedParent, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.ListCryptoKeyVersions(context.Background(), request).Next() if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceGetKeyRing(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.KeyRing{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var request = &kmspb.GetKeyRingRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetKeyRing(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceGetKeyRingError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var request = &kmspb.GetKeyRingRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetKeyRing(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceGetCryptoKey(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.CryptoKey{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var request = &kmspb.GetCryptoKeyRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetCryptoKey(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceGetCryptoKeyError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var request = &kmspb.GetCryptoKeyRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetCryptoKey(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceGetCryptoKeyVersion(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.CryptoKeyVersion{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.GetCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetCryptoKeyVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceGetCryptoKeyVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.GetCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetCryptoKeyVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceCreateKeyRing(t *testing.T) { var name string = "name3373707" var expectedResponse = &kmspb.KeyRing{ Name: name, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") var keyRingId string = "keyRingId-2056646742" var keyRing *kmspb.KeyRing = &kmspb.KeyRing{} var request = &kmspb.CreateKeyRingRequest{ Parent: formattedParent, KeyRingId: keyRingId, KeyRing: keyRing, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateKeyRing(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceCreateKeyRingError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s", "[PROJECT]", "[LOCATION]") var keyRingId string = "keyRingId-2056646742" var keyRing *kmspb.KeyRing = &kmspb.KeyRing{} var request = &kmspb.CreateKeyRingRequest{ Parent: formattedParent, KeyRingId: keyRingId, KeyRing: keyRing, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateKeyRing(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceCreateCryptoKey(t *testing.T) { var name string = "name3373707" var expectedResponse = &kmspb.CryptoKey{ Name: name, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var cryptoKeyId string = "my-app-key" var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT var seconds int64 = 2147483647 var nextRotationTime = ×tamppb.Timestamp{ Seconds: seconds, } var seconds2 int64 = 604800 var rotationPeriod = &durationpb.Duration{ Seconds: seconds2, } var cryptoKey = &kmspb.CryptoKey{ Purpose: purpose, NextRotationTime: nextRotationTime, RotationSchedule: &kmspb.CryptoKey_RotationPeriod{ RotationPeriod: rotationPeriod, }, } var request = &kmspb.CreateCryptoKeyRequest{ Parent: formattedParent, CryptoKeyId: cryptoKeyId, CryptoKey: cryptoKey, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateCryptoKey(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceCreateCryptoKeyError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]") var cryptoKeyId string = "my-app-key" var purpose kmspb.CryptoKey_CryptoKeyPurpose = kmspb.CryptoKey_ENCRYPT_DECRYPT var seconds int64 = 2147483647 var nextRotationTime = ×tamppb.Timestamp{ Seconds: seconds, } var seconds2 int64 = 604800 var rotationPeriod = &durationpb.Duration{ Seconds: seconds2, } var cryptoKey = &kmspb.CryptoKey{ Purpose: purpose, NextRotationTime: nextRotationTime, RotationSchedule: &kmspb.CryptoKey_RotationPeriod{ RotationPeriod: rotationPeriod, }, } var request = &kmspb.CreateCryptoKeyRequest{ Parent: formattedParent, CryptoKeyId: cryptoKeyId, CryptoKey: cryptoKey, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateCryptoKey(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceCreateCryptoKeyVersion(t *testing.T) { var name string = "name3373707" var expectedResponse = &kmspb.CryptoKeyVersion{ Name: name, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} var request = &kmspb.CreateCryptoKeyVersionRequest{ Parent: formattedParent, CryptoKeyVersion: cryptoKeyVersion, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateCryptoKeyVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceCreateCryptoKeyVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedParent string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} var request = &kmspb.CreateCryptoKeyVersionRequest{ Parent: formattedParent, CryptoKeyVersion: cryptoKeyVersion, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.CreateCryptoKeyVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceUpdateCryptoKey(t *testing.T) { var name string = "name3373707" var expectedResponse = &kmspb.CryptoKey{ Name: name, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{} var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} var request = &kmspb.UpdateCryptoKeyRequest{ CryptoKey: cryptoKey, UpdateMask: updateMask, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKey(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceUpdateCryptoKeyError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var cryptoKey *kmspb.CryptoKey = &kmspb.CryptoKey{} var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} var request = &kmspb.UpdateCryptoKeyRequest{ CryptoKey: cryptoKey, UpdateMask: updateMask, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKey(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceUpdateCryptoKeyVersion(t *testing.T) { var name string = "name3373707" var expectedResponse = &kmspb.CryptoKeyVersion{ Name: name, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} var request = &kmspb.UpdateCryptoKeyVersionRequest{ CryptoKeyVersion: cryptoKeyVersion, UpdateMask: updateMask, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKeyVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceUpdateCryptoKeyVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var cryptoKeyVersion *kmspb.CryptoKeyVersion = &kmspb.CryptoKeyVersion{} var updateMask *field_maskpb.FieldMask = &field_maskpb.FieldMask{} var request = &kmspb.UpdateCryptoKeyVersionRequest{ CryptoKeyVersion: cryptoKeyVersion, UpdateMask: updateMask, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKeyVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceEncrypt(t *testing.T) { var name2 string = "name2-1052831874" var ciphertext []byte = []byte("-72") var expectedResponse = &kmspb.EncryptResponse{ Name: name2, Ciphertext: ciphertext, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]") var plaintext []byte = []byte("-9") var request = &kmspb.EncryptRequest{ Name: formattedName, Plaintext: plaintext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.Encrypt(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceEncryptError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY_PATH]") var plaintext []byte = []byte("-9") var request = &kmspb.EncryptRequest{ Name: formattedName, Plaintext: plaintext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.Encrypt(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceDecrypt(t *testing.T) { var plaintext []byte = []byte("-9") var expectedResponse = &kmspb.DecryptResponse{ Plaintext: plaintext, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var ciphertext []byte = []byte("-72") var request = &kmspb.DecryptRequest{ Name: formattedName, Ciphertext: ciphertext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.Decrypt(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceDecryptError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var ciphertext []byte = []byte("-72") var request = &kmspb.DecryptRequest{ Name: formattedName, Ciphertext: ciphertext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.Decrypt(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersion(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.CryptoKey{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var cryptoKeyVersionId string = "cryptoKeyVersionId729489152" var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ Name: formattedName, CryptoKeyVersionId: cryptoKeyVersionId, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceUpdateCryptoKeyPrimaryVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]") var cryptoKeyVersionId string = "cryptoKeyVersionId729489152" var request = &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ Name: formattedName, CryptoKeyVersionId: cryptoKeyVersionId, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.UpdateCryptoKeyPrimaryVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceDestroyCryptoKeyVersion(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.CryptoKeyVersion{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.DestroyCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.DestroyCryptoKeyVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceDestroyCryptoKeyVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.DestroyCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.DestroyCryptoKeyVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceRestoreCryptoKeyVersion(t *testing.T) { var name2 string = "name2-1052831874" var expectedResponse = &kmspb.CryptoKeyVersion{ Name: name2, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.RestoreCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.RestoreCryptoKeyVersion(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceRestoreCryptoKeyVersionError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.RestoreCryptoKeyVersionRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.RestoreCryptoKeyVersion(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceGetPublicKey(t *testing.T) { var pem string = "pem110872" var expectedResponse = &kmspb.PublicKey{ Pem: pem, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.GetPublicKeyRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetPublicKey(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceGetPublicKeyError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var request = &kmspb.GetPublicKeyRequest{ Name: formattedName, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.GetPublicKey(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceAsymmetricDecrypt(t *testing.T) { var plaintext []byte = []byte("-9") var expectedResponse = &kmspb.AsymmetricDecryptResponse{ Plaintext: plaintext, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var ciphertext []byte = []byte("-72") var request = &kmspb.AsymmetricDecryptRequest{ Name: formattedName, Ciphertext: ciphertext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.AsymmetricDecrypt(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceAsymmetricDecryptError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var ciphertext []byte = []byte("-72") var request = &kmspb.AsymmetricDecryptRequest{ Name: formattedName, Ciphertext: ciphertext, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.AsymmetricDecrypt(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp } func TestKeyManagementServiceAsymmetricSign(t *testing.T) { var signature []byte = []byte("106") var expectedResponse = &kmspb.AsymmetricSignResponse{ Signature: signature, } mockKeyManagement.err = nil mockKeyManagement.reqs = nil mockKeyManagement.resps = append(mockKeyManagement.resps[:0], expectedResponse) var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var digest *kmspb.Digest = &kmspb.Digest{} var request = &kmspb.AsymmetricSignRequest{ Name: formattedName, Digest: digest, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.AsymmetricSign(context.Background(), request) if err != nil { t.Fatal(err) } if want, got := request, mockKeyManagement.reqs[0]; !proto.Equal(want, got) { t.Errorf("wrong request %q, want %q", got, want) } if want, got := expectedResponse, resp; !proto.Equal(want, got) { t.Errorf("wrong response %q, want %q)", got, want) } } func TestKeyManagementServiceAsymmetricSignError(t *testing.T) { errCode := codes.PermissionDenied mockKeyManagement.err = gstatus.Error(errCode, "test error") var formattedName string = fmt.Sprintf("projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s/cryptoKeyVersions/%s", "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]") var digest *kmspb.Digest = &kmspb.Digest{} var request = &kmspb.AsymmetricSignRequest{ Name: formattedName, Digest: digest, } c, err := NewKeyManagementClient(context.Background(), clientOpt) if err != nil { t.Fatal(err) } resp, err := c.AsymmetricSign(context.Background(), request) if st, ok := gstatus.FromError(err); !ok { t.Errorf("got error %v, expected grpc error", err) } else if c := st.Code(); c != errCode { t.Errorf("got error code %q, want %q", c, errCode) } _ = resp }