From f0f3074e0a32df268dcd10e8f60411891eb544c3 Mon Sep 17 00:00:00 2001 From: Preston Vasquez Date: Fri, 2 May 2025 10:05:45 -0600 Subject: [PATCH] GODRIVER-3549 Fix timeouts in CSE custom endpoint test (#2028) (#2031) --- .../client_side_encryption_prose_test.go | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/internal/integration/client_side_encryption_prose_test.go b/internal/integration/client_side_encryption_prose_test.go index cb9ee2a89d..40f0783a5d 100644 --- a/internal/integration/client_side_encryption_prose_test.go +++ b/internal/integration/client_side_encryption_prose_test.go @@ -795,7 +795,7 @@ func TestClientSideEncryptionProse(t *testing.T) { "endpoint": "doesnotexist.invalid:443", }, "kmip": { - "endpoint": "doesnotexist.local:5698", + "endpoint": "doesnotexist.invalid:5698", }, } @@ -819,9 +819,8 @@ func TestClientSideEncryptionProse(t *testing.T) { "endpoint": "kms.us-east-1.amazonaws.com:443", } awsFailureConnectionError := map[string]interface{}{ - "region": "us-east-1", - "key": "arn:aws:kms:us-east-1:579766882180:key/89fcc2c4-08b0-4bd9-9f25-e30687b580d0", - "endpoint": "kms.us-east-1.amazonaws.com:12345", + "keyId": "1", + "endpoint": "localhost:12345", } awsFailureInvalidEndpoint := map[string]interface{}{ "region": "us-east-1", @@ -860,7 +859,7 @@ func TestClientSideEncryptionProse(t *testing.T) { } kmipFailureInvalidEndpoint := map[string]interface{}{ "keyId": "1", - "endpoint": "doesnotexist.local:5698", + "endpoint": "doesnotexist.invalid:5698", } const ( @@ -906,7 +905,7 @@ func TestClientSideEncryptionProse(t *testing.T) { }, { name: "Case 4: aws failure with connection error", - provider: "aws", + provider: "kmip", masterKey: awsFailureConnectionError, errorSubstring: []string{errConnectionRefused, errWindowsTLSConnectionRefused}, testInvalidClientEncryption: false, @@ -1583,7 +1582,7 @@ func TestClientSideEncryptionProse(t *testing.T) { "endpoint": "127.0.0.1:9001", } azureMasterKey := map[string]interface{}{ - "keyVaultEndpoint": "doesnotexist.local", + "keyVaultEndpoint": "doesnotexist.invalid", "keyName": "foo", } gcpMasterKey := map[string]interface{}{