Skip to content

Commit aefe810

Browse files
committed
change the bucket name
1 parent 4475886 commit aefe810

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

google/cloud/storage/examples/storage_bucket_encryption_enforcement_samples.cc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ void SetBucketEncryptionEnforcementConfig(
9696
gmek_encryption.customer_supplied_encryption_enforcement_config
9797
.restriction_mode = "FullyRestricted";
9898
std::cout << "Bucket "
99-
<< create_bucket("g-" + bucket_name, gmek_encryption)->name()
99+
<< create_bucket("gmek-" + bucket_name, gmek_encryption)->name()
100100
<< " created with GMEK-only enforcement policy.\n";
101101

102102
// In GCS, a single project cannot create or delete buckets more often than
@@ -112,7 +112,7 @@ void SetBucketEncryptionEnforcementConfig(
112112
cmek_encryption.customer_supplied_encryption_enforcement_config
113113
.restriction_mode = "FullyRestricted";
114114
std::cout << "Bucket "
115-
<< create_bucket("c-" + bucket_name, cmek_encryption)->name()
115+
<< create_bucket("cmek-" + bucket_name, cmek_encryption)->name()
116116
<< " created with CMEK-only enforcement policy.\n";
117117

118118
// In GCS, a single project cannot create or delete buckets more often than
@@ -124,7 +124,7 @@ void SetBucketEncryptionEnforcementConfig(
124124
csek_encryption.customer_supplied_encryption_enforcement_config
125125
.restriction_mode = "FullyRestricted";
126126
std::cout << "Bucket "
127-
<< create_bucket("rc-" + bucket_name, csek_encryption)->name()
127+
<< create_bucket("csek-" + bucket_name, csek_encryption)->name()
128128
<< " created with a policy to restrict CSEK.\n";
129129
}
130130
//! [set bucket encryption enforcement config] [END

0 commit comments

Comments
 (0)