@@ -3023,6 +3023,24 @@ func TestClientSideEncryptionProse(t *testing.T) {
30233023 return res .Body .Close ()
30243024 }
30253025
3026+ kmsProviders := map [string ]map [string ]interface {}{
3027+ "aws" : {
3028+ "accessKeyId" : awsAccessKeyID ,
3029+ "secretAccessKey" : awsSecretAccessKey ,
3030+ },
3031+ "azure" : {
3032+ "tenantId" : azureTenantID ,
3033+ "clientId" : azureClientID ,
3034+ "clientSecret" : azureClientSecret ,
3035+ "identityPlatformEndpoint" : "127.0.0.1:9003" ,
3036+ },
3037+ "gcp" : {
3038+ "email" : gcpEmail ,
3039+ "privateKey" : gcpPrivateKey ,
3040+ "endpoint" : "127.0.0.1:9003" ,
3041+ },
3042+ }
3043+
30263044 dataKeys := []struct {
30273045 provider string
30283046 masterKey interface {}
@@ -3056,15 +3074,12 @@ func TestClientSideEncryptionProse(t *testing.T) {
30563074 for _ , tc := range testCases {
30573075 for _ , dataKey := range dataKeys {
30583076 mt .Run (fmt .Sprintf ("%s_%s" , tc .name , dataKey .provider ), func (mt * mtest.T ) {
3059- if dataKey .provider == "azure" || dataKey .provider == "gcp" {
3060- mt .Skipf ("For some reason libmongocrypt ignores custom endpoints for Azure and CGP" )
3061- }
30623077 keyVaultClient , err := mongo .Connect (options .Client ().ApplyURI (mtest .ClusterURI ()))
30633078 require .NoError (mt , err , "error on Connect: %v" , err )
30643079
30653080 ceo := options .ClientEncryption ().
30663081 SetKeyVaultNamespace (kvNamespace ).
3067- SetKmsProviders (fullKmsProvidersMap ).
3082+ SetKmsProviders (kmsProviders ).
30683083 SetTLSConfig (map [string ]* tls.Config {dataKey .provider : tlsCfg })
30693084 clientEncryption , err := mongo .NewClientEncryption (keyVaultClient , ceo )
30703085 require .NoError (mt , err , "error on NewClientEncryption: %v" , err )
0 commit comments