Skip to content

Commit d4b8084

Browse files
cleanup
1 parent 92851be commit d4b8084

File tree

4 files changed

+22
-6
lines changed

4 files changed

+22
-6
lines changed

test/integration/client-side-encryption/client_side_encryption.prose.12.deadlock.test.ts

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,11 @@ function deadlockTest(
6565
kmsProviders: { local: { key: LOCAL_KEY } },
6666
bypassAutoEncryption,
6767
keyVaultClient: useKeyVaultClient ? this.clientKeyVault : undefined,
68-
extraOptions: getEncryptExtraOptions()
68+
extraOptions: {
69+
// ...getEncryptExtraOptions(),
70+
mongocryptdBypassSpawn: true,
71+
mongocryptdURI: 'mongodb://localhost:3000'
72+
}
6973
},
7074
maxPoolSize
7175
};
@@ -106,10 +110,19 @@ describe('Connection Pool Deadlock Prevention', function () {
106110
beforeEach(async function () {
107111
const url: string = this.configuration.url();
108112

109-
this.clientTest = new CapturingMongoClient(url);
113+
const options = process.env.ALPINE ? {
114+
autoEncryption: {
115+
extraOptions: {
116+
mongocryptdBypassSpawn: true,
117+
mongocryptdURI: 'mongodb://localhost:3000'
118+
}
119+
}
120+
} : {};
121+
this.clientTest = new CapturingMongoClient(url, options);
110122
this.clientKeyVault = new CapturingMongoClient(url, {
111123
monitorCommands: true,
112-
maxPoolSize: 1
124+
maxPoolSize: 1,
125+
...options
113126
});
114127

115128
this.clientEncryption = undefined;
@@ -133,7 +146,6 @@ describe('Connection Pool Deadlock Prevention', function () {
133146
kmsProviders: { local: { key: LOCAL_KEY } },
134147
keyVaultNamespace: 'keyvault.datakeys',
135148
keyVaultClient: this.keyVaultClient,
136-
extraOptions: getEncryptExtraOptions()
137149
});
138150

139151
this.ciphertext = await this.clientEncryption.encrypt('string0', {

test/integration/client-side-encryption/client_side_encryption.prose.test.js

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1113,6 +1113,12 @@ describe('Client Side Encryption Prose Tests', metadata, function () {
11131113
// configure with `client_encrypted` to use the schema `external/external-schema.json` for
11141114
// `db.coll` by setting a schema map like `{"db.coll": <contents of external-schema.json }`
11151115
beforeEach(async function () {
1116+
if (process.env.ALPINE) {
1117+
this.currentTest.skipReason =
1118+
'alpine tests cannot spawn mongocryptds or use the crypt_shared.';
1119+
this.skip();
1120+
}
1121+
11161122
clientEncrypted = this.configuration.newClient(
11171123
{},
11181124
{

test/tools/runner/config.ts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,6 @@ export class TestConfiguration {
292292
mongocryptdBypassSpawn: true,
293293
mongocryptdURI: 'mongodb://localhost:3000'
294294
}
295-
console.error('annotating');
296295
}
297296

298297
const connectionString = url.format(urlOptions);

test/tools/unified-spec-runner/entities.ts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -578,7 +578,6 @@ export class EntitiesMap<E = Entity> extends Map<string, E> {
578578
} else {
579579
uri = makeConnectionString(config.url({ useMultipleMongoses }), entity.client.uriOptions);
580580
}
581-
console.error({ uri });
582581
const client = new UnifiedMongoClient(uri, entity.client);
583582
try {
584583
new EntityEventRegistry(client, entity.client, map).register();

0 commit comments

Comments
 (0)