Skip to content

Commit e822c86

Browse files
committed
fix tests
1 parent a51f840 commit e822c86

File tree

3 files changed

+10
-7
lines changed

3 files changed

+10
-7
lines changed

.evergreen/config.yml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -554,6 +554,14 @@ functions:
554554
args: [*task-runner, evg-test-kmip]
555555

556556
start-kms-failpoint-server:
557+
- command: subprocess.exec
558+
params:
559+
working_dir: src/go.mongodb.org/mongo-driver
560+
binary: bash
561+
background: true
562+
include_expansions_in_env: ["AWS_ACCESS_KEY_ID", "AWS_SECRET_ACCESS_KEY", "AWS_SESSION_TOKEN", "DRIVERS_TOOLS"]
563+
# This cannot use task because it will hang on Windows.
564+
args: [etc/setup-encryption.sh]
557565
- command: subprocess.exec
558566
params:
559567
binary: python3
@@ -563,9 +571,6 @@ functions:
563571
args: ["-u", "${DRIVERS_TOOLS}/.evergreen/csfle/kms_failpoint_server.py", "--port", "9003"]
564572

565573
run-retry-kms-requests:
566-
- command: ec2.assume_role
567-
params:
568-
role_arn: ${aws_test_secrets_role}
569574
- command: subprocess.exec
570575
type: test
571576
params:
@@ -581,7 +586,6 @@ functions:
581586
binary: "bash"
582587
env:
583588
CSFLE_TLS_CA_FILE: "${PARENT_DIR}/x509gen/ca.pem"
584-
include_expansions_in_env: ["AWS_ACCESS_KEY_ID", "AWS_SECRET_ACCESS_KEY", "AWS_SESSION_TOKEN", "DRIVERS_TOOLS"]
585589
args: [*task-runner, evg-test-retry-kms-requests]
586590

587591
run-fuzz-tests:

internal/integration/client_side_encryption_prose_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1637,11 +1637,11 @@ func TestClientSideEncryptionProse(t *testing.T) {
16371637
_, err = cpt.clientEnc.CreateDataKey(context.Background(), tc.name, dkOpts)
16381638
// check if current test case is KMIP, which should pass
16391639
if tc.name == "kmip" {
1640-
assert.Nil(mt, err, "expected no error, got err: %v, %s", err, tlsCAFileKMIP)
1640+
assert.Nil(mt, err, "expected no error, got err: %v", err)
16411641
} else {
16421642
assert.NotNil(mt, err, "expected error, got nil")
16431643
assert.True(mt, strings.Contains(err.Error(), tc.tlsError),
1644-
"expected error '%s' to contain '%s', %s", err.Error(), tc.tlsError, tlsCAFileKMIP)
1644+
"expected error '%s' to contain '%s'", err.Error(), tc.tlsError)
16451645
}
16461646

16471647
// call CreateDataKey with expired CEO each provider and same masterKey

mongo/options/clientoptions.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1252,7 +1252,6 @@ func (c *ClientOptionsBuilder) SetSRVServiceName(srvName string) *ClientOptionsB
12521252
// addCACertFromFile adds a root CA certificate to the configuration given a path
12531253
// to the containing file.
12541254
func addCACertFromFile(cfg *tls.Config, file string) error {
1255-
fmt.Println("adding CA file", file)
12561255
data, err := ioutil.ReadFile(file)
12571256
if err != nil {
12581257
return err

0 commit comments

Comments
 (0)