11use std:: {
22 collections:: BTreeMap ,
3- env:: var ,
3+ env,
44 path:: PathBuf ,
55 sync:: {
66 atomic:: { AtomicBool , Ordering } ,
@@ -103,8 +103,8 @@ pub(crate) static AWS_KMS: Lazy<KmsInfo> = Lazy::new(|| {
103103 (
104104 KmsProvider :: aws ( ) ,
105105 doc ! {
106- "accessKeyId" : var( "FLE_AWS_KEY" ) . unwrap( ) ,
107- "secretAccessKey" : var( "FLE_AWS_SECRET" ) . unwrap( ) } ,
106+ "accessKeyId" : env :: var( "FLE_AWS_KEY" ) . unwrap( ) ,
107+ "secretAccessKey" : env :: var( "FLE_AWS_SECRET" ) . unwrap( ) } ,
108108 None ,
109109 )
110110} ) ;
@@ -116,8 +116,8 @@ pub(crate) static AWS_KMS_NAME2: Lazy<KmsInfo> = Lazy::new(|| {
116116 (
117117 KmsProvider :: aws ( ) . with_name ( "name2" ) ,
118118 doc ! {
119- "accessKeyId" : var( "FLE_AWS_KEY" ) . unwrap( ) ,
120- "secretAccessKey" : var( "FLE_AWS_SECRET" ) . unwrap( )
119+ "accessKeyId" : env :: var( "FLE_AWS_KEY" ) . unwrap( ) ,
120+ "secretAccessKey" : env :: var( "FLE_AWS_SECRET" ) . unwrap( )
121121 } ,
122122 None ,
123123 )
@@ -126,9 +126,9 @@ pub(crate) static AZURE_KMS: Lazy<KmsInfo> = Lazy::new(|| {
126126 (
127127 KmsProvider :: azure ( ) ,
128128 doc ! {
129- "tenantId" : var( "FLE_AZURE_TENANTID" ) . unwrap( ) ,
130- "clientId" : var( "FLE_AZURE_CLIENTID" ) . unwrap( ) ,
131- "clientSecret" : var( "FLE_AZURE_CLIENTSECRET" ) . unwrap( ) ,
129+ "tenantId" : env :: var( "FLE_AZURE_TENANTID" ) . unwrap( ) ,
130+ "clientId" : env :: var( "FLE_AZURE_CLIENTID" ) . unwrap( ) ,
131+ "clientSecret" : env :: var( "FLE_AZURE_CLIENTSECRET" ) . unwrap( ) ,
132132 } ,
133133 None ,
134134 )
@@ -141,8 +141,8 @@ pub(crate) static GCP_KMS: Lazy<KmsInfo> = Lazy::new(|| {
141141 (
142142 KmsProvider :: gcp ( ) ,
143143 doc ! {
144- "email" : var( "FLE_GCP_EMAIL" ) . unwrap( ) ,
145- "privateKey" : var( "FLE_GCP_PRIVATEKEY" ) . unwrap( ) ,
144+ "email" : env :: var( "FLE_GCP_EMAIL" ) . unwrap( ) ,
145+ "privateKey" : env :: var( "FLE_GCP_PRIVATEKEY" ) . unwrap( ) ,
146146 } ,
147147 None ,
148148 )
@@ -157,7 +157,7 @@ pub(crate) static LOCAL_KMS: Lazy<KmsInfo> = Lazy::new(|| {
157157 doc ! {
158158 "key" : bson:: Binary {
159159 subtype: bson:: spec:: BinarySubtype :: Generic ,
160- bytes: base64:: decode( var( "CSFLE_LOCAL_KEY" ) . unwrap( ) ) . unwrap( ) ,
160+ bytes: base64:: decode( env :: var( "CSFLE_LOCAL_KEY" ) . unwrap( ) ) . unwrap( ) ,
161161 } ,
162162 } ,
163163 None ,
@@ -168,7 +168,7 @@ pub(crate) static LOCAL_KMS_NAME1: Lazy<KmsInfo> = Lazy::new(|| {
168168 ( local_info. 0 . with_name ( "name1" ) , local_info. 1 , local_info. 2 )
169169} ) ;
170170pub ( crate ) static KMIP_KMS : Lazy < KmsInfo > = Lazy :: new ( || {
171- let cert_dir = PathBuf :: from ( var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
171+ let cert_dir = PathBuf :: from ( env :: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
172172 let tls_options = TlsOptions :: builder ( )
173173 . ca_file_path ( cert_dir. join ( "ca.pem" ) )
174174 . cert_key_file_path ( cert_dir. join ( "client.pem" ) )
@@ -212,14 +212,14 @@ pub(crate) static ALL_KMS_PROVIDERS: Lazy<KmsProviderList> = Lazy::new(|| {
212212} ) ;
213213
214214static EXTRA_OPTIONS : Lazy < Document > =
215- Lazy :: new ( || doc ! { "cryptSharedLibPath" : std :: env:: var( "CRYPT_SHARED_LIB_PATH" ) . unwrap( ) } ) ;
215+ Lazy :: new ( || doc ! { "cryptSharedLibPath" : env:: var( "CRYPT_SHARED_LIB_PATH" ) . unwrap( ) } ) ;
216216static KV_NAMESPACE : Lazy < Namespace > =
217217 Lazy :: new ( || Namespace :: from_str ( "keyvault.datakeys" ) . unwrap ( ) ) ;
218218static DISABLE_CRYPT_SHARED : Lazy < bool > =
219- Lazy :: new ( || std :: env:: var ( "DISABLE_CRYPT_SHARED" ) . map_or ( false , |s| s == "true" ) ) ;
219+ Lazy :: new ( || env:: var ( "DISABLE_CRYPT_SHARED" ) . map_or ( false , |s| s == "true" ) ) ;
220220
221221fn check_env ( name : & str , kmip : bool ) -> bool {
222- if std :: env:: var ( "CSFLE_LOCAL_KEY" ) . is_err ( ) {
222+ if env:: var ( "CSFLE_LOCAL_KEY" ) . is_err ( ) {
223223 log_uncaptured ( format ! (
224224 "skipping csfle test {}: no kms providers configured" ,
225225 name
@@ -1757,7 +1757,7 @@ async fn kms_tls_options() -> Result<()> {
17571757 base_providers
17581758 }
17591759
1760- let cert_dir = PathBuf :: from ( std :: env:: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
1760+ let cert_dir = PathBuf :: from ( env:: var ( "CSFLE_TLS_CERT_DIR" ) . unwrap ( ) ) ;
17611761 let ca_path = cert_dir. join ( "ca.pem" ) ;
17621762 let key_path = cert_dir. join ( "client.pem" ) ;
17631763
@@ -2731,8 +2731,7 @@ async fn on_demand_aws_failure() -> Result<()> {
27312731 if !check_env ( "on_demand_aws_failure" , false ) {
27322732 return Ok ( ( ) ) ;
27332733 }
2734- if std:: env:: var ( "AWS_ACCESS_KEY_ID" ) . is_ok ( ) && std:: env:: var ( "AWS_SECRET_ACCESS_KEY" ) . is_ok ( )
2735- {
2734+ if env:: var ( "AWS_ACCESS_KEY_ID" ) . is_ok ( ) && env:: var ( "AWS_SECRET_ACCESS_KEY" ) . is_ok ( ) {
27362735 log_uncaptured ( "Skipping on_demand_aws_failure: credentials set" ) ;
27372736 return Ok ( ( ) ) ;
27382737 }
@@ -2803,7 +2802,7 @@ async fn on_demand_gcp_credentials() -> Result<()> {
28032802 )
28042803 . await ;
28052804
2806- if std :: env:: var ( "ON_DEMAND_GCP_CREDS_SHOULD_SUCCEED" ) . is_ok ( ) {
2805+ if env:: var ( "ON_DEMAND_GCP_CREDS_SHOULD_SUCCEED" ) . is_ok ( ) {
28072806 result. unwrap ( ) ;
28082807 } else {
28092808 let error = result. unwrap_err ( ) ;
@@ -2830,10 +2829,7 @@ async fn azure_imds() -> Result<()> {
28302829 let mut azure_exec = crate :: client:: csfle:: state_machine:: azure:: ExecutorState :: new ( ) ?;
28312830 azure_exec. test_host = Some ( (
28322831 "localhost" ,
2833- std:: env:: var ( "AZURE_IMDS_MOCK_PORT" )
2834- . unwrap ( )
2835- . parse ( )
2836- . unwrap ( ) ,
2832+ env:: var ( "AZURE_IMDS_MOCK_PORT" ) . unwrap ( ) . parse ( ) . unwrap ( ) ,
28372833 ) ) ;
28382834
28392835 // Case 1: Success
@@ -3220,6 +3216,7 @@ async fn range_explicit_encryption_test(
32203216 KV_NAMESPACE . clone ( ) ,
32213217 vec ! [ LOCAL_KMS . clone( ) ] ,
32223218 ) ?
3219+ . extra_options ( EXTRA_OPTIONS . clone ( ) )
32233220 . bypass_query_analysis ( true )
32243221 . build ( )
32253222 . await ?;
@@ -3564,6 +3561,7 @@ async fn fle2_example() -> Result<()> {
35643561 KV_NAMESPACE . clone ( ) ,
35653562 vec ! [ LOCAL_KMS . clone( ) ] ,
35663563 ) ?
3564+ . extra_options ( EXTRA_OPTIONS . clone ( ) )
35673565 . encrypted_fields_map ( encrypted_fields_map)
35683566 . build ( )
35693567 . await ?;
0 commit comments