1
1
use std:: {
2
2
collections:: BTreeMap ,
3
- env:: var ,
3
+ env,
4
4
path:: PathBuf ,
5
5
sync:: {
6
6
atomic:: { AtomicBool , Ordering } ,
@@ -103,8 +103,8 @@ pub(crate) static AWS_KMS: Lazy<KmsInfo> = Lazy::new(|| {
103
103
(
104
104
KmsProvider :: aws ( ) ,
105
105
doc ! {
106
- "accessKeyId" : var( "FLE_AWS_KEY" ) . unwrap( ) ,
107
- "secretAccessKey" : var( "FLE_AWS_SECRET" ) . unwrap( ) } ,
106
+ "accessKeyId" : env :: var( "FLE_AWS_KEY" ) . unwrap( ) ,
107
+ "secretAccessKey" : env :: var( "FLE_AWS_SECRET" ) . unwrap( ) } ,
108
108
None ,
109
109
)
110
110
} ) ;
@@ -116,8 +116,8 @@ pub(crate) static AWS_KMS_NAME2: Lazy<KmsInfo> = Lazy::new(|| {
116
116
(
117
117
KmsProvider :: aws ( ) . with_name ( "name2" ) ,
118
118
doc ! {
119
- "accessKeyId" : var( "FLE_AWS_KEY" ) . unwrap( ) ,
120
- "secretAccessKey" : var( "FLE_AWS_SECRET" ) . unwrap( )
119
+ "accessKeyId" : env :: var( "FLE_AWS_KEY" ) . unwrap( ) ,
120
+ "secretAccessKey" : env :: var( "FLE_AWS_SECRET" ) . unwrap( )
121
121
} ,
122
122
None ,
123
123
)
@@ -126,9 +126,9 @@ pub(crate) static AZURE_KMS: Lazy<KmsInfo> = Lazy::new(|| {
126
126
(
127
127
KmsProvider :: azure ( ) ,
128
128
doc ! {
129
- "tenantId" : var( "FLE_AZURE_TENANTID" ) . unwrap( ) ,
130
- "clientId" : var( "FLE_AZURE_CLIENTID" ) . unwrap( ) ,
131
- "clientSecret" : var( "FLE_AZURE_CLIENTSECRET" ) . unwrap( ) ,
129
+ "tenantId" : env :: var( "FLE_AZURE_TENANTID" ) . unwrap( ) ,
130
+ "clientId" : env :: var( "FLE_AZURE_CLIENTID" ) . unwrap( ) ,
131
+ "clientSecret" : env :: var( "FLE_AZURE_CLIENTSECRET" ) . unwrap( ) ,
132
132
} ,
133
133
None ,
134
134
)
@@ -141,8 +141,8 @@ pub(crate) static GCP_KMS: Lazy<KmsInfo> = Lazy::new(|| {
141
141
(
142
142
KmsProvider :: gcp ( ) ,
143
143
doc ! {
144
- "email" : var( "FLE_GCP_EMAIL" ) . unwrap( ) ,
145
- "privateKey" : var( "FLE_GCP_PRIVATEKEY" ) . unwrap( ) ,
144
+ "email" : env :: var( "FLE_GCP_EMAIL" ) . unwrap( ) ,
145
+ "privateKey" : env :: var( "FLE_GCP_PRIVATEKEY" ) . unwrap( ) ,
146
146
} ,
147
147
None ,
148
148
)
@@ -157,7 +157,7 @@ pub(crate) static LOCAL_KMS: Lazy<KmsInfo> = Lazy::new(|| {
157
157
doc ! {
158
158
"key" : bson:: Binary {
159
159
subtype: bson:: spec:: BinarySubtype :: Generic ,
160
- bytes: base64:: decode( var( "CSFLE_LOCAL_KEY" ) . unwrap( ) ) . unwrap( ) ,
160
+ bytes: base64:: decode( env :: var( "CSFLE_LOCAL_KEY" ) . unwrap( ) ) . unwrap( ) ,
161
161
} ,
162
162
} ,
163
163
None ,
@@ -168,7 +168,7 @@ pub(crate) static LOCAL_KMS_NAME1: Lazy<KmsInfo> = Lazy::new(|| {
168
168
( local_info. 0 . with_name ( "name1" ) , local_info. 1 , local_info. 2 )
169
169
} ) ;
170
170
pub ( crate ) static KMIP_KMS : Lazy < KmsInfo > = Lazy :: new ( || {
171
- let cert_dir = PathBuf :: from ( var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
171
+ let cert_dir = PathBuf :: from ( env :: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
172
172
let tls_options = TlsOptions :: builder ( )
173
173
. ca_file_path ( cert_dir. join ( "ca.pem" ) )
174
174
. cert_key_file_path ( cert_dir. join ( "client.pem" ) )
@@ -212,14 +212,14 @@ pub(crate) static ALL_KMS_PROVIDERS: Lazy<KmsProviderList> = Lazy::new(|| {
212
212
} ) ;
213
213
214
214
static EXTRA_OPTIONS : Lazy < Document > =
215
- Lazy :: new ( || doc ! { "cryptSharedLibPath" : std :: env:: var( "CRYPT_SHARED_LIB_PATH" ) . unwrap( ) } ) ;
215
+ Lazy :: new ( || doc ! { "cryptSharedLibPath" : env:: var( "CRYPT_SHARED_LIB_PATH" ) . unwrap( ) } ) ;
216
216
static KV_NAMESPACE : Lazy < Namespace > =
217
217
Lazy :: new ( || Namespace :: from_str ( "keyvault.datakeys" ) . unwrap ( ) ) ;
218
218
static DISABLE_CRYPT_SHARED : Lazy < bool > =
219
- Lazy :: new ( || std :: env:: var ( "DISABLE_CRYPT_SHARED" ) . map_or ( false , |s| s == "true" ) ) ;
219
+ Lazy :: new ( || env:: var ( "DISABLE_CRYPT_SHARED" ) . map_or ( false , |s| s == "true" ) ) ;
220
220
221
221
fn check_env ( name : & str , kmip : bool ) -> bool {
222
- if std :: env:: var ( "CSFLE_LOCAL_KEY" ) . is_err ( ) {
222
+ if env:: var ( "CSFLE_LOCAL_KEY" ) . is_err ( ) {
223
223
log_uncaptured ( format ! (
224
224
"skipping csfle test {}: no kms providers configured" ,
225
225
name
@@ -1757,7 +1757,7 @@ async fn kms_tls_options() -> Result<()> {
1757
1757
base_providers
1758
1758
}
1759
1759
1760
- let cert_dir = PathBuf :: from ( std :: env:: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
1760
+ let cert_dir = PathBuf :: from ( env:: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
1761
1761
let ca_path = cert_dir. join ( "ca.pem" ) ;
1762
1762
let key_path = cert_dir. join ( "client.pem" ) ;
1763
1763
@@ -2731,8 +2731,7 @@ async fn on_demand_aws_failure() -> Result<()> {
2731
2731
if !check_env ( "on_demand_aws_failure" , false ) {
2732
2732
return Ok ( ( ) ) ;
2733
2733
}
2734
- if std:: env:: var ( "AWS_ACCESS_KEY_ID" ) . is_ok ( ) && std:: env:: var ( "AWS_SECRET_ACCESS_KEY" ) . is_ok ( )
2735
- {
2734
+ if env:: var ( "AWS_ACCESS_KEY_ID" ) . is_ok ( ) && env:: var ( "AWS_SECRET_ACCESS_KEY" ) . is_ok ( ) {
2736
2735
log_uncaptured ( "Skipping on_demand_aws_failure: credentials set" ) ;
2737
2736
return Ok ( ( ) ) ;
2738
2737
}
@@ -2803,7 +2802,7 @@ async fn on_demand_gcp_credentials() -> Result<()> {
2803
2802
)
2804
2803
. await ;
2805
2804
2806
- if std :: env:: var ( "ON_DEMAND_GCP_CREDS_SHOULD_SUCCEED" ) . is_ok ( ) {
2805
+ if env:: var ( "ON_DEMAND_GCP_CREDS_SHOULD_SUCCEED" ) . is_ok ( ) {
2807
2806
result. unwrap ( ) ;
2808
2807
} else {
2809
2808
let error = result. unwrap_err ( ) ;
@@ -2830,10 +2829,7 @@ async fn azure_imds() -> Result<()> {
2830
2829
let mut azure_exec = crate :: client:: csfle:: state_machine:: azure:: ExecutorState :: new ( ) ?;
2831
2830
azure_exec. test_host = Some ( (
2832
2831
"localhost" ,
2833
- std:: env:: var ( "AZURE_IMDS_MOCK_PORT" )
2834
- . unwrap ( )
2835
- . parse ( )
2836
- . unwrap ( ) ,
2832
+ env:: var ( "AZURE_IMDS_MOCK_PORT" ) . unwrap ( ) . parse ( ) . unwrap ( ) ,
2837
2833
) ) ;
2838
2834
2839
2835
// Case 1: Success
@@ -3220,6 +3216,7 @@ async fn range_explicit_encryption_test(
3220
3216
KV_NAMESPACE . clone ( ) ,
3221
3217
vec ! [ LOCAL_KMS . clone( ) ] ,
3222
3218
) ?
3219
+ . extra_options ( EXTRA_OPTIONS . clone ( ) )
3223
3220
. bypass_query_analysis ( true )
3224
3221
. build ( )
3225
3222
. await ?;
@@ -3564,6 +3561,7 @@ async fn fle2_example() -> Result<()> {
3564
3561
KV_NAMESPACE . clone ( ) ,
3565
3562
vec ! [ LOCAL_KMS . clone( ) ] ,
3566
3563
) ?
3564
+ . extra_options ( EXTRA_OPTIONS . clone ( ) )
3567
3565
. encrypted_fields_map ( encrypted_fields_map)
3568
3566
. build ( )
3569
3567
. await ?;
0 commit comments