@@ -811,7 +811,7 @@ Configure with KMS providers as follows:
811
811
"endpoint": "doesnotexist.invalid:443"
812
812
},
813
813
"kmip": {
814
- "endpoint": "doesnotexist.local :5698"
814
+ "endpoint": "doesnotexist.invalid :5698"
815
815
}
816
816
}
817
817
` ` `
@@ -866,13 +866,12 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
866
866
Expect this to succeed . Use the returned UUID of the key to explicitly encrypt and decrypt the string " test" to
867
867
validate it works .
868
868
869
- 4. Call ` client_encryption.createDataKey() ` with " aws " as the provider and the following masterKey :
869
+ 4. Call ` client_encryption.createDataKey() ` with " kmip " as the provider and the following masterKey :
870
870
871
871
` ` ` javascript
872
872
{
873
- region: "us-east-1",
874
- key: "arn:aws:kms:us-east-1:579766882180:key/89fcc2c4-08b0-4bd9-9f25-e30687b580d0",
875
- endpoint: "kms.us-east-1.amazonaws.com:12345"
873
+ "keyId": "1",
874
+ "endpoint": "localhost:12345"
876
875
}
877
876
` ` `
878
877
@@ -961,7 +960,7 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
961
960
validate it works .
962
961
963
962
Call ` client_encryption_invalid.createDataKey() ` with the same masterKey . Expect this to fail with a network
964
- exception indicating failure to resolve " doesnotexist.local " .
963
+ exception indicating failure to resolve " doesnotexist.invalid " .
965
964
966
965
11. Call ` client_encryption.createDataKey() ` with " kmip" as the provider and the following masterKey :
967
966
@@ -980,11 +979,11 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
980
979
` ` ` javascript
981
980
{
982
981
"keyId": "1",
983
- "endpoint": "doesnotexist.local :5698"
982
+ "endpoint": "doesnotexist.invalid :5698"
984
983
}
985
984
` ` `
986
985
987
- Expect this to fail with a network exception indicating failure to resolve " doesnotexist.local " .
986
+ Expect this to fail with a network exception indicating failure to resolve " doesnotexist.invalid " .
988
987
989
988
### 8. Bypass Spawning mongocryptd
990
989
@@ -1746,7 +1745,7 @@ Expect an error indicating TLS handshake failed due to an invalid hostname.
1746
1745
Call ` client_encryption_no_client_cert.createDataKey() ` with " azure" as the provider and the following masterKey :
1747
1746
1748
1747
` ` ` javascript
1749
- { 'keyVaultEndpoint': 'doesnotexist.local ', 'keyName': 'foo' }
1748
+ { 'keyVaultEndpoint': 'doesnotexist.invalid ', 'keyName': 'foo' }
1750
1749
` ` `
1751
1750
1752
1751
Expect an error indicating TLS handshake failed .
@@ -1858,7 +1857,7 @@ Call `client_encryption_with_names.createDataKey()` with "azure:no_client_cert"
1858
1857
masterKey :
1859
1858
1860
1859
` ` ` javascript
1861
- { 'keyVaultEndpoint': 'doesnotexist.local ', 'keyName': 'foo' }
1860
+ { 'keyVaultEndpoint': 'doesnotexist.invalid ', 'keyName': 'foo' }
1862
1861
` ` `
1863
1862
1864
1863
Expect an error indicating TLS handshake failed .
0 commit comments