@@ -811,7 +811,7 @@ Configure with KMS providers as follows:
811811 "endpoint": "doesnotexist.invalid:443"
812812 },
813813 "kmip": {
814- "endpoint": "doesnotexist.local :5698"
814+ "endpoint": "doesnotexist.invalid :5698"
815815 }
816816}
817817` ` `
@@ -866,13 +866,12 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
866866 Expect this to succeed . Use the returned UUID of the key to explicitly encrypt and decrypt the string " test" to
867867 validate it works .
868868
869- 4. Call ` client_encryption.createDataKey() ` with " aws " as the provider and the following masterKey :
869+ 4. Call ` client_encryption.createDataKey() ` with " kmip " as the provider and the following masterKey :
870870
871871 ` ` ` javascript
872872 {
873- region: "us-east-1",
874- key: "arn:aws:kms:us-east-1:579766882180:key/89fcc2c4-08b0-4bd9-9f25-e30687b580d0",
875- endpoint: "kms.us-east-1.amazonaws.com:12345"
873+ "keyId": "1",
874+ "endpoint": "localhost:12345"
876875 }
877876 ` ` `
878877
@@ -961,7 +960,7 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
961960 validate it works .
962961
963962 Call ` client_encryption_invalid.createDataKey() ` with the same masterKey . Expect this to fail with a network
964- exception indicating failure to resolve " doesnotexist.local " .
963+ exception indicating failure to resolve " doesnotexist.invalid " .
965964
96696511. Call ` client_encryption.createDataKey() ` with " kmip" as the provider and the following masterKey :
967966
@@ -980,11 +979,11 @@ The method of passing TLS options for KMIP TLS connections is driver dependent.
980979 ` ` ` javascript
981980 {
982981 "keyId": "1",
983- "endpoint": "doesnotexist.local :5698"
982+ "endpoint": "doesnotexist.invalid :5698"
984983 }
985984 ` ` `
986985
987- Expect this to fail with a network exception indicating failure to resolve " doesnotexist.local " .
986+ Expect this to fail with a network exception indicating failure to resolve " doesnotexist.invalid " .
988987
989988### 8. Bypass Spawning mongocryptd
990989
@@ -1746,7 +1745,7 @@ Expect an error indicating TLS handshake failed due to an invalid hostname.
17461745Call ` client_encryption_no_client_cert.createDataKey() ` with " azure" as the provider and the following masterKey :
17471746
17481747` ` ` javascript
1749- { 'keyVaultEndpoint': 'doesnotexist.local ', 'keyName': 'foo' }
1748+ { 'keyVaultEndpoint': 'doesnotexist.invalid ', 'keyName': 'foo' }
17501749` ` `
17511750
17521751Expect an error indicating TLS handshake failed .
@@ -1858,7 +1857,7 @@ Call `client_encryption_with_names.createDataKey()` with "azure:no_client_cert"
18581857masterKey :
18591858
18601859` ` ` javascript
1861- { 'keyVaultEndpoint': 'doesnotexist.local ', 'keyName': 'foo' }
1860+ { 'keyVaultEndpoint': 'doesnotexist.invalid ', 'keyName': 'foo' }
18621861` ` `
18631862
18641863Expect an error indicating TLS handshake failed .
0 commit comments