Skip to content

Commit 006f5ef

Browse files
committed
fix use of placeholders
1 parent ea63fe4 commit 006f5ef

File tree

6 files changed

+82
-53
lines changed

6 files changed

+82
-53
lines changed

test/asynchronous/helpers.py

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,11 @@
120120
"privateKey": os.environ.get("FLE_GCP_PRIVATEKEY", ""),
121121
}
122122
KMIP_CREDS = {"endpoint": os.environ.get("FLE_KMIP_ENDPOINT", "localhost:5698")}
123+
AWS_TEMP_CREDS = {
124+
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
125+
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),
126+
"sessionToken": os.environ.get("CSFLE_AWS_TEMP_SESSION_TOKEN", ""),
127+
}
123128

124129
ALL_KMS_PROVIDERS = dict(
125130
aws=AWS_CREDS,

test/asynchronous/test_encryption.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@
5757
from test.asynchronous.helpers import (
5858
ALL_KMS_PROVIDERS,
5959
AWS_CREDS,
60+
AWS_TEMP_CREDS,
6061
AZURE_CREDS,
6162
CA_PEM,
6263
CLIENT_PEM,
@@ -618,12 +619,6 @@ async def test_with_statement(self):
618619

619620

620621
# Spec tests
621-
AWS_TEMP_CREDS = {
622-
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
623-
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),
624-
"sessionToken": os.environ.get("CSFLE_AWS_TEMP_SESSION_TOKEN", ""),
625-
}
626-
627622
AWS_TEMP_NO_SESSION_CREDS = {
628623
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
629624
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),

test/helpers.py

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,11 @@
120120
"privateKey": os.environ.get("FLE_GCP_PRIVATEKEY", ""),
121121
}
122122
KMIP_CREDS = {"endpoint": os.environ.get("FLE_KMIP_ENDPOINT", "localhost:5698")}
123+
AWS_TEMP_CREDS = {
124+
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
125+
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),
126+
"sessionToken": os.environ.get("CSFLE_AWS_TEMP_SESSION_TOKEN", ""),
127+
}
123128

124129
ALL_KMS_PROVIDERS = dict(
125130
aws=AWS_CREDS,

test/test_encryption.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@
5757
from test.helpers import (
5858
ALL_KMS_PROVIDERS,
5959
AWS_CREDS,
60+
AWS_TEMP_CREDS,
6061
AZURE_CREDS,
6162
CA_PEM,
6263
CLIENT_PEM,
@@ -616,12 +617,6 @@ def test_with_statement(self):
616617

617618

618619
# Spec tests
619-
AWS_TEMP_CREDS = {
620-
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
621-
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),
622-
"sessionToken": os.environ.get("CSFLE_AWS_TEMP_SESSION_TOKEN", ""),
623-
}
624-
625620
AWS_TEMP_NO_SESSION_CREDS = {
626621
"accessKeyId": os.environ.get("CSFLE_AWS_TEMP_ACCESS_KEY_ID", ""),
627622
"secretAccessKey": os.environ.get("CSFLE_AWS_TEMP_SECRET_ACCESS_KEY", ""),

test/unified_format_shared.py

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@
2828
from test.helpers import (
2929
AWS_CREDS,
3030
AWS_CREDS_2,
31+
AWS_TEMP_CREDS,
3132
AZURE_CREDS,
3233
CA_PEM,
3334
CLIENT_PEM,
@@ -118,10 +119,22 @@
118119
("kmip", KMIP_CREDS),
119120
("kmip:name1", KMIP_CREDS),
120121
]:
122+
# Use the temp aws creds for autoEncryptOpts.
123+
if provider_name == "aws":
124+
for key, value in AWS_TEMP_CREDS.items():
125+
placeholder = f"/autoEncryptOpts/kmsProviders/{provider_name}/{key}"
126+
PLACEHOLDER_MAP[placeholder] = value
127+
121128
for key, value in provider_data.items():
122129
placeholder = f"/clientEncryptionOpts/kmsProviders/{provider_name}/{key}"
123130
PLACEHOLDER_MAP[placeholder] = value
124131

132+
if provider_name == "aws":
133+
continue
134+
135+
placeholder = f"/autoEncryptOpts/kmsProviders/{provider_name}/{key}"
136+
PLACEHOLDER_MAP[placeholder] = value
137+
125138
OIDC_ENV = os.environ.get("OIDC_ENV", "test")
126139
if OIDC_ENV == "test":
127140
PLACEHOLDER_MAP["/uriOptions/authMechanismProperties"] = {"ENVIRONMENT": "test"}

0 commit comments

Comments
 (0)