@@ -91,25 +91,25 @@ static KMS_PROVIDERS: Lazy<KmsProviderList> = Lazy::new(|| {
91
91
(
92
92
KmsProvider :: Aws ,
93
93
doc! {
94
- "accessKeyId" : env( "AWS_ACCESS_KEY_ID " ) ,
95
- "secretAccessKey" : env( "AWS_SECRET_ACCESS_KEY " ) ,
94
+ "accessKeyId" : env( "FLE_AWS_KEY " ) ,
95
+ "secretAccessKey" : env( "FLE_AWS_SECRET " ) ,
96
96
} ,
97
97
None ,
98
98
) ,
99
99
(
100
100
KmsProvider :: Azure ,
101
101
doc! {
102
- "tenantId" : env( "AZURE_TENANT_ID " ) ,
103
- "clientId" : env( "AZURE_CLIENT_ID " ) ,
104
- "clientSecret" : env( "AZURE_CLIENT_SECRET " ) ,
102
+ "tenantId" : env( "FLE_AZURE_TENANTID " ) ,
103
+ "clientId" : env( "FLE_AZURE_CLIENTID " ) ,
104
+ "clientSecret" : env( "FLE_AZURE_CLIENTSECRET " ) ,
105
105
} ,
106
106
None ,
107
107
) ,
108
108
(
109
109
KmsProvider :: Gcp ,
110
110
doc! {
111
- "email" : env( "GCP_EMAIL " ) ,
112
- "privateKey" : env( "GCP_PRIVATE_KEY " ) ,
111
+ "email" : env( "FLE_GCP_EMAIL " ) ,
112
+ "privateKey" : env( "FLE_GCP_PRIVATEKEY " ) ,
113
113
} ,
114
114
None ,
115
115
) ,
@@ -1641,6 +1641,10 @@ impl DeadlockExpectation {
1641
1641
}
1642
1642
}
1643
1643
1644
+ const KMS_EXPIRED : & str = "127.0.0.1:9000" ;
1645
+ const KMS_WRONG_HOST : & str = "127.0.0.1:9001" ;
1646
+ const KMS_CORRECT : & str = "127.0.0.1:9002" ;
1647
+
1644
1648
// Prose test 10. KMS TLS Tests
1645
1649
#[ tokio:: test]
1646
1650
async fn kms_tls ( ) -> Result < ( ) > {
@@ -1649,15 +1653,15 @@ async fn kms_tls() -> Result<()> {
1649
1653
}
1650
1654
1651
1655
// Invalid KMS Certificate
1652
- let err = run_kms_tls_test ( "127.0.0.1:9000" ) . await . unwrap_err ( ) ;
1656
+ let err = run_kms_tls_test ( KMS_EXPIRED ) . await . unwrap_err ( ) ;
1653
1657
assert ! (
1654
1658
err. to_string( ) . contains( "certificate verify failed" ) ,
1655
1659
"unexpected error: {}" ,
1656
1660
err
1657
1661
) ;
1658
1662
1659
1663
// Invalid Hostname in KMS Certificate
1660
- let err = run_kms_tls_test ( "127.0.0.1:9001" ) . await . unwrap_err ( ) ;
1664
+ let err = run_kms_tls_test ( KMS_WRONG_HOST ) . await . unwrap_err ( ) ;
1661
1665
assert ! (
1662
1666
err. to_string( ) . contains( "certificate verify failed" ) ,
1663
1667
"unexpected error: {}" ,
@@ -1716,12 +1720,12 @@ async fn kms_tls_options() -> Result<()> {
1716
1720
. get_mut ( & KmsProvider :: Azure )
1717
1721
. unwrap ( )
1718
1722
. 0
1719
- . insert ( "identityPlatformEndpoint" , "127.0.0.1:9002" ) ;
1723
+ . insert ( "identityPlatformEndpoint" , KMS_CORRECT ) ;
1720
1724
base_providers
1721
1725
. get_mut ( & KmsProvider :: Gcp )
1722
1726
. unwrap ( )
1723
1727
. 0
1724
- . insert ( "endpoint" , "127.0.0.1:9002" ) ;
1728
+ . insert ( "endpoint" , KMS_CORRECT ) ;
1725
1729
1726
1730
let cert_dir = PathBuf :: from ( std:: env:: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
1727
1731
let ca_path = cert_dir. join ( "ca.pem" ) ;
@@ -1754,17 +1758,17 @@ async fn kms_tls_options() -> Result<()> {
1754
1758
. get_mut ( & KmsProvider :: Azure )
1755
1759
. unwrap ( )
1756
1760
. 0
1757
- . insert ( "identityPlatformEndpoint" , "127.0.0.1:9000" ) ;
1761
+ . insert ( "identityPlatformEndpoint" , KMS_EXPIRED ) ;
1758
1762
providers
1759
1763
. get_mut ( & KmsProvider :: Gcp )
1760
1764
. unwrap ( )
1761
1765
. 0
1762
- . insert ( "endpoint" , "127.0.0.1:9000" ) ;
1766
+ . insert ( "endpoint" , KMS_EXPIRED ) ;
1763
1767
providers
1764
1768
. get_mut ( & KmsProvider :: Kmip )
1765
1769
. unwrap ( )
1766
1770
. 0
1767
- . insert ( "endpoint" , "127.0.0.1:9000" ) ;
1771
+ . insert ( "endpoint" , KMS_EXPIRED ) ;
1768
1772
1769
1773
ClientEncryption :: new (
1770
1774
TestClient :: new ( ) . await . into_client ( ) ,
@@ -1782,17 +1786,17 @@ async fn kms_tls_options() -> Result<()> {
1782
1786
. get_mut ( & KmsProvider :: Azure )
1783
1787
. unwrap ( )
1784
1788
. 0
1785
- . insert ( "identityPlatformEndpoint" , "127.0.0.1:9001" ) ;
1789
+ . insert ( "identityPlatformEndpoint" , KMS_WRONG_HOST ) ;
1786
1790
providers
1787
1791
. get_mut ( & KmsProvider :: Gcp )
1788
1792
. unwrap ( )
1789
1793
. 0
1790
- . insert ( "endpoint" , "127.0.0.1:9001" ) ;
1794
+ . insert ( "endpoint" , KMS_WRONG_HOST ) ;
1791
1795
providers
1792
1796
. get_mut ( & KmsProvider :: Kmip )
1793
1797
. unwrap ( )
1794
1798
. 0
1795
- . insert ( "endpoint" , "127.0.0.1:9001" ) ;
1799
+ . insert ( "endpoint" , KMS_WRONG_HOST ) ;
1796
1800
1797
1801
ClientEncryption :: new (
1798
1802
TestClient :: new ( ) . await . into_client ( ) ,
@@ -1832,25 +1836,25 @@ async fn kms_tls_options() -> Result<()> {
1832
1836
1833
1837
provider_test (
1834
1838
& client_encryption_no_client_cert,
1835
- aws_key ( "127.0.0.1:9002" ) ,
1839
+ aws_key ( KMS_CORRECT ) ,
1836
1840
& [ "SSL routines" , "connection was forcibly closed" ] ,
1837
1841
)
1838
1842
. await ?;
1839
1843
provider_test (
1840
1844
& client_encryption_with_tls,
1841
- aws_key ( "127.0.0.1:9002" ) ,
1845
+ aws_key ( KMS_CORRECT ) ,
1842
1846
& [ "parse error" ] ,
1843
1847
)
1844
1848
. await ?;
1845
1849
provider_test (
1846
1850
& client_encryption_expired,
1847
- aws_key ( "127.0.0.1:9000" ) ,
1851
+ aws_key ( KMS_EXPIRED ) ,
1848
1852
& [ "certificate verify failed" ] ,
1849
1853
)
1850
1854
. await ?;
1851
1855
provider_test (
1852
1856
& client_encryption_invalid_hostname,
1853
- aws_key ( "127.0.0.1:9001" ) ,
1857
+ aws_key ( KMS_WRONG_HOST ) ,
1854
1858
& [ "certificate verify failed" ] ,
1855
1859
)
1856
1860
. await ?;
0 commit comments