@@ -753,7 +753,7 @@ public function testCustomEndpoint(Closure $test): void
753
753
'kmsProviders ' => [
754
754
'azure ' => Context::getAzureCredentials () + ['identityPlatformEndpoint ' => 'doesnotexist.invalid:443 ' ],
755
755
'gcp ' => Context::getGCPCredentials () + ['endpoint ' => 'doesnotexist.invalid:443 ' ],
756
- 'kmip ' => ['endpoint ' => 'doesnotexist.local :5698 ' ],
756
+ 'kmip ' => ['endpoint ' => 'doesnotexist.invalid :5698 ' ],
757
757
],
758
758
'tlsOptions ' => [
759
759
'kmip ' => Context::getKmsTlsOptions (),
@@ -801,9 +801,9 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
801
801
];
802
802
803
803
yield 'Test 4 ' => [
804
- static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ awsMasterKey ): void {
804
+ static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ kmipMasterKey ): void {
805
805
$ test ->expectException (ConnectionException::class);
806
- $ clientEncryption ->createDataKey ('aws ' , ['masterKey ' => $ awsMasterKey + ['endpoint ' => 'kms.us-east-1.amazonaws.com :12345 ' ]]);
806
+ $ clientEncryption ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey + ['endpoint ' => 'localhost :12345 ' ]]);
807
807
},
808
808
];
809
809
@@ -864,7 +864,7 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
864
864
$ test ->assertSame ('test ' , $ clientEncryption ->decrypt ($ encrypted ));
865
865
866
866
$ test ->expectException (RuntimeException::class);
867
- $ test ->expectExceptionMessageMatches ('#doesnotexist.local # ' );
867
+ $ test ->expectExceptionMessageMatches ('#doesnotexist.invalid # ' );
868
868
$ clientEncryptionInvalid ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey ]);
869
869
},
870
870
];
@@ -881,10 +881,10 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
881
881
882
882
yield 'Test 12 ' => [
883
883
static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ kmipMasterKey ): void {
884
- $ kmipMasterKey ['endpoint ' ] = 'doesnotexist.local :5698 ' ;
884
+ $ kmipMasterKey ['endpoint ' ] = 'doesnotexist.invalid :5698 ' ;
885
885
886
886
$ test ->expectException (RuntimeException::class);
887
- $ test ->expectExceptionMessageMatches ('#doesnotexist.local # ' );
887
+ $ test ->expectExceptionMessageMatches ('#doesnotexist.invalid # ' );
888
888
$ clientEncryption ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey ]);
889
889
},
890
890
];
0 commit comments