Skip to content

Commit 2d52481

Browse files
authored
DRIVERS-2191 Remove use of example.com in Client Side Encryption prose tests (#1136)
Updates test cases 6, 7, 8, and 9
1 parent f18ba13 commit 2d52481

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

source/client-side-encryption/tests/README.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -687,12 +687,12 @@ Configure with KMS providers as follows:
687687
"tenantId": <set from environment>,
688688
"clientId": <set from environment>,
689689
"clientSecret": <set from environment>,
690-
"identityPlatformEndpoint": "example.com:443"
690+
"identityPlatformEndpoint": "doesnotexist.invalid:443"
691691
},
692692
"gcp": {
693693
"email": <set from environment>,
694694
"privateKey": <set from environment>,
695-
"endpoint": "example.com:443"
695+
"endpoint": "doesnotexist.invalid:443"
696696
},
697697
"kmip": {
698698
"endpoint": "doesnotexist.local:5698"
@@ -775,10 +775,10 @@ Test cases
775775
{
776776
region: "us-east-1",
777777
key: "arn:aws:kms:us-east-1:579766882180:key/89fcc2c4-08b0-4bd9-9f25-e30687b580d0",
778-
endpoint: "example.com"
778+
endpoint: "doesnotexist.invalid"
779779
}
780780
781-
Expect this to fail with an exception with a message containing the string: "parse error"
781+
Expect this to fail with a network exception indicating failure to resolve "doesnotexist.invalid".
782782

783783
7. Call `client_encryption.createDataKey()` with "azure" as the provider and the following masterKey:
784784

@@ -791,7 +791,7 @@ Test cases
791791
792792
Expect this to succeed. Use the returned UUID of the key to explicitly encrypt and decrypt the string "test" to validate it works.
793793

794-
Call ``client_encryption_invalid.createDataKey()`` with the same masterKey. Expect this to fail with an exception with a message containing the string: "parse error".
794+
Call ``client_encryption_invalid.createDataKey()`` with the same masterKey. Expect this to fail with a network exception indicating failure to resolve "doesnotexist.invalid".
795795

796796
8. Call `client_encryption.createDataKey()` with "gcp" as the provider and the following masterKey:
797797

@@ -807,7 +807,7 @@ Test cases
807807
808808
Expect this to succeed. Use the returned UUID of the key to explicitly encrypt and decrypt the string "test" to validate it works.
809809

810-
Call ``client_encryption_invalid.createDataKey()`` with the same masterKey. Expect this to fail with an exception with a message containing the string: "parse error".
810+
Call ``client_encryption_invalid.createDataKey()`` with the same masterKey. Expect this to fail with a network exception indicating failure to resolve "doesnotexist.invalid".
811811

812812
9. Call `client_encryption.createDataKey()` with "gcp" as the provider and the following masterKey:
813813

@@ -818,7 +818,7 @@ Test cases
818818
"location": "global",
819819
"keyRing": "key-ring-csfle",
820820
"keyName": "key-name-csfle",
821-
"endpoint": "example.com:443"
821+
"endpoint": "doesnotexist.invalid:443"
822822
}
823823
824824
Expect this to fail with an exception with a message containing the string: "Invalid KMS response".

0 commit comments

Comments
 (0)