Skip to content

Commit c196d3a

Browse files
authored
DRIVERS-3181 fix timeouts in CSE custom endpoint test (#1791)
1 parent 335848d commit c196d3a

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

source/client-side-encryption/tests/README.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -811,7 +811,7 @@ Configure with KMS providers as follows:
811811
"endpoint": "doesnotexist.invalid:443"
812812
},
813813
"kmip": {
814-
"endpoint": "doesnotexist.local:5698"
814+
"endpoint": "doesnotexist.invalid:5698"
815815
}
816816
}
817817
```
@@ -866,13 +866,12 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
866866
Expect this to succeed. Use the returned UUID of the key to explicitly encrypt and decrypt the string "test" to
867867
validate it works.
868868

869-
4. Call `client_encryption.createDataKey()` with "aws" as the provider and the following masterKey:
869+
4. Call `client_encryption.createDataKey()` with "kmip" as the provider and the following masterKey:
870870

871871
```javascript
872872
{
873-
region: "us-east-1",
874-
key: "arn:aws:kms:us-east-1:579766882180:key/89fcc2c4-08b0-4bd9-9f25-e30687b580d0",
875-
endpoint: "kms.us-east-1.amazonaws.com:12345"
873+
"keyId": "1",
874+
"endpoint": "localhost:12345"
876875
}
877876
```
878877

@@ -961,7 +960,7 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
961960
validate it works.
962961

963962
Call `client_encryption_invalid.createDataKey()` with the same masterKey. Expect this to fail with a network
964-
exception indicating failure to resolve "doesnotexist.local".
963+
exception indicating failure to resolve "doesnotexist.invalid".
965964

966965
11. Call `client_encryption.createDataKey()` with "kmip" as the provider and the following masterKey:
967966

@@ -980,11 +979,11 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
980979
```javascript
981980
{
982981
"keyId": "1",
983-
"endpoint": "doesnotexist.local:5698"
982+
"endpoint": "doesnotexist.invalid:5698"
984983
}
985984
```
986985

987-
Expect this to fail with a network exception indicating failure to resolve "doesnotexist.local".
986+
Expect this to fail with a network exception indicating failure to resolve "doesnotexist.invalid".
988987

989988
### 8. Bypass Spawning mongocryptd
990989

@@ -1746,7 +1745,7 @@ Expect an error indicating TLS handshake failed due to an invalid hostname.
17461745
Call `client_encryption_no_client_cert.createDataKey()` with "azure" as the provider and the following masterKey:
17471746

17481747
```javascript
1749-
{ 'keyVaultEndpoint': 'doesnotexist.local', 'keyName': 'foo' }
1748+
{ 'keyVaultEndpoint': 'doesnotexist.invalid', 'keyName': 'foo' }
17501749
```
17511750

17521751
Expect an error indicating TLS handshake failed.
@@ -1858,7 +1857,7 @@ Call `client_encryption_with_names.createDataKey()` with "azure:no_client_cert"
18581857
masterKey:
18591858

18601859
```javascript
1861-
{ 'keyVaultEndpoint': 'doesnotexist.local', 'keyName': 'foo' }
1860+
{ 'keyVaultEndpoint': 'doesnotexist.invalid', 'keyName': 'foo' }
18621861
```
18631862

18641863
Expect an error indicating TLS handshake failed.

0 commit comments

Comments
 (0)