@@ -260,6 +260,7 @@ public void cekCacheShouldBeDisabledWhenAkvProviderIsRegisteredGlobally() throws
260
260
261
261
@ Test
262
262
@ Tag (Constants .reqExternalSetup )
263
+ @ Tag (Constants .requireSecret )
263
264
public void testLocalCekCacheIsScopedToProvider () throws Exception {
264
265
SQLServerColumnEncryptionAzureKeyVaultProvider provider = akvProvider ;
265
266
@@ -272,14 +273,13 @@ public void testLocalCekCacheIsScopedToProvider() throws Exception {
272
273
fail ((new MessageFormat (TestResource .getResource ("R_objectNullOrEmpty" ))).format (msgArg ));
273
274
}
274
275
275
- Map <String , SQLServerColumnEncryptionKeyStoreProvider > providerMap = new HashMap <String , SQLServerColumnEncryptionKeyStoreProvider >();
276
- ManagedIdentityCredential credential ;
276
+ SQLServerConnection .unregisterColumnEncryptionKeyStoreProviders ();
277
277
278
278
SQLServerConnection .unregisterColumnEncryptionKeyStoreProviders ();
279
+ Map <String , SQLServerColumnEncryptionKeyStoreProvider > providerMap = new HashMap <String , SQLServerColumnEncryptionKeyStoreProvider >();
279
280
providerMap .put (Constants .AZURE_KEY_VAULT_NAME , akvProvider );
280
281
SQLServerConnection .registerColumnEncryptionKeyStoreProviders (providerMap );
281
282
282
- System .out .println ("one" );
283
283
int customerId = 10 ;
284
284
String customerName = "Microsoft" ;
285
285
createTableForCustomProvider (AETestConnectionString , customProviderTableName , cekAkv );
@@ -303,7 +303,6 @@ public void testLocalCekCacheIsScopedToProvider() throws Exception {
303
303
304
304
// Clean up global custom providers
305
305
SQLServerConnection .unregisterColumnEncryptionKeyStoreProviders ();
306
- System .out .println ("two" );
307
306
308
307
// Register key store provider on statement level
309
308
providerMap .put (Constants .AZURE_KEY_VAULT_NAME , provider );
@@ -317,14 +316,12 @@ public void testLocalCekCacheIsScopedToProvider() throws Exception {
317
316
assertTrue ((customerId == intValue ) && strValue .equalsIgnoreCase (customerName ));
318
317
}
319
318
}
320
- System .out .println ("three" );
321
319
322
320
// Register invalid key store provider on statement level. This will overwrite the previous one.
323
321
SQLServerColumnEncryptionAzureKeyVaultProvider providerWithBadCred = new SQLServerColumnEncryptionAzureKeyVaultProvider (
324
322
"badApplicationID" , "badApplicationKey" );
325
323
providerMap .put (Constants .AZURE_KEY_VAULT_NAME , providerWithBadCred );
326
324
pstmt .registerColumnEncryptionKeyStoreProvidersOnStatement (providerMap );
327
- System .out .println ("four" );
328
325
329
326
// The following query should fail due to an empty cek cache and invalid credentials
330
327
try (ResultSet rs3 = pstmt .executeQuery ()) {
0 commit comments