@@ -523,42 +523,6 @@ async fn too_large_client_error() {
523
523
assert ! ( error. is_invalid_argument( ) ) ;
524
524
}
525
525
526
- // CRUD prose test 13
527
- #[ cfg( feature = "in-use-encryption" ) ]
528
- #[ tokio:: test]
529
- async fn encryption_error ( ) {
530
- use crate :: {
531
- client:: csfle:: options:: { AutoEncryptionOptions , KmsProviders } ,
532
- mongocrypt:: ctx:: KmsProvider ,
533
- } ;
534
-
535
- let kms_providers = KmsProviders :: new ( vec ! [ (
536
- KmsProvider :: aws( ) ,
537
- doc! { "accessKeyId" : "foo" , "secretAccessKey" : "bar" } ,
538
- None ,
539
- ) ] )
540
- . unwrap ( ) ;
541
- let encrypted_options = AutoEncryptionOptions :: new ( Namespace :: new ( "db" , "coll" ) , kms_providers) ;
542
- let encrypted_client = Client :: for_test ( )
543
- . encrypted_options ( encrypted_options)
544
- . await ;
545
-
546
- let model = InsertOneModel :: builder ( )
547
- . namespace ( Namespace :: new ( "db" , "coll" ) )
548
- . document ( doc ! { "a" : "b" } )
549
- . build ( ) ;
550
- let error = encrypted_client. bulk_write ( vec ! [ model] ) . await . unwrap_err ( ) ;
551
-
552
- let ErrorKind :: Encryption ( encryption_error) = * error. kind else {
553
- panic ! ( "expected encryption error, got {error:?}" ) ;
554
- } ;
555
-
556
- assert_eq ! (
557
- encryption_error. message,
558
- Some ( "bulkWrite does not currently support automatic encryption" . to_string( ) )
559
- ) ;
560
- }
561
-
562
526
#[ tokio:: test]
563
527
async fn unsupported_server_client_error ( ) {
564
528
if server_version_gte ( 8 , 0 ) . await {
0 commit comments