@@ -256,7 +256,7 @@ functions:
256
256
. ./activate-authawsvenv.sh
257
257
python ./lib/aws_assign_instance_profile.py
258
258
fi
259
-
259
+
260
260
" run tests " :
261
261
- command : shell.exec
262
262
type : test
@@ -277,9 +277,9 @@ functions:
277
277
AZUREKMS_KEY_NAME : ${testazurekms_keyname}
278
278
script : |
279
279
${PREPARE_SHELL}
280
-
280
+
281
281
. ${DRIVERS_TOOLS}/.evergreen/csfle/set-temp-creds.sh
282
-
282
+
283
283
export AWS_TEMP_ACCESS_KEY_ID=$CSFLE_AWS_TEMP_ACCESS_KEY_ID
284
284
export AWS_TEMP_SECRET_ACCESS_KEY=$CSFLE_AWS_TEMP_SECRET_ACCESS_KEY
285
285
export AWS_TEMP_SESSION_TOKEN=$CSFLE_AWS_TEMP_SESSION_TOKEN
@@ -375,7 +375,7 @@ functions:
375
375
STREAM_TYPE="netty" AUTH="${AUTH}" SSL="${SSL}" NETTY_SSL_PROVIDER="${NETTY_SSL_PROVIDER}" MONGODB_URI="${MONGODB_URI}" \
376
376
TOPOLOGY="${TOPOLOGY}" COMPRESSOR="${COMPRESSOR}" JAVA_VERSION="${JAVA_VERSION}" \
377
377
AZUREKMS_KEY_VAULT_ENDPOINT=${testazurekms_keyvaultendpoint} AZUREKMS_KEY_NAME=${testazurekms_keyname} \
378
- .evergreen/run-tests.sh
378
+ .evergreen/run-tests.sh
379
379
380
380
" run plain auth test " :
381
381
- command : shell.exec
@@ -683,11 +683,11 @@ functions:
683
683
script : |
684
684
${PREPARE_SHELL}
685
685
. ${DRIVERS_TOOLS}/.evergreen/csfle/set-temp-creds.sh
686
-
686
+
687
687
export AWS_TEMP_ACCESS_KEY_ID=$CSFLE_AWS_TEMP_ACCESS_KEY_ID
688
688
export AWS_TEMP_SECRET_ACCESS_KEY=$CSFLE_AWS_TEMP_SECRET_ACCESS_KEY
689
689
export AWS_TEMP_SESSION_TOKEN=$CSFLE_AWS_TEMP_SESSION_TOKEN
690
-
690
+
691
691
MONGODB_URI="${MONGODB_URI}" JAVA_VERSION="${JAVA_VERSION}" .evergreen/run-csfle-tests-with-mongocryptd.sh
692
692
693
693
" trace artifacts " :
@@ -811,7 +811,6 @@ functions:
811
811
812
812
echo "Response Body: $response_body"
813
813
echo "HTTP Status: $http_status"
814
- add_expansions_to_env : true
815
814
816
815
" run graalvm native image app " :
817
816
- command : shell.exec
0 commit comments