@@ -753,7 +753,7 @@ public function testCustomEndpoint(Closure $test): void
753753 'kmsProviders ' => [
754754 'azure ' => Context::getAzureCredentials () + ['identityPlatformEndpoint ' => 'doesnotexist.invalid:443 ' ],
755755 'gcp ' => Context::getGCPCredentials () + ['endpoint ' => 'doesnotexist.invalid:443 ' ],
756- 'kmip ' => ['endpoint ' => 'doesnotexist.local :5698 ' ],
756+ 'kmip ' => ['endpoint ' => 'doesnotexist.invalid :5698 ' ],
757757 ],
758758 'tlsOptions ' => [
759759 'kmip ' => Context::getKmsTlsOptions (),
@@ -801,9 +801,9 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
801801 ];
802802
803803 yield 'Test 4 ' => [
804- static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ awsMasterKey ): void {
804+ static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ kmipMasterKey ): void {
805805 $ test ->expectException (ConnectionException::class);
806- $ clientEncryption ->createDataKey ('aws ' , ['masterKey ' => $ awsMasterKey + ['endpoint ' => 'kms.us-east-1.amazonaws.com :12345 ' ]]);
806+ $ clientEncryption ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey + ['endpoint ' => 'localhost :12345 ' ]]);
807807 },
808808 ];
809809
@@ -864,7 +864,7 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
864864 $ test ->assertSame ('test ' , $ clientEncryption ->decrypt ($ encrypted ));
865865
866866 $ test ->expectException (RuntimeException::class);
867- $ test ->expectExceptionMessageMatches ('#doesnotexist.local # ' );
867+ $ test ->expectExceptionMessageMatches ('#doesnotexist.invalid # ' );
868868 $ clientEncryptionInvalid ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey ]);
869869 },
870870 ];
@@ -881,10 +881,10 @@ static function (self $test, ClientEncryption $clientEncryption, ClientEncryptio
881881
882882 yield 'Test 12 ' => [
883883 static function (self $ test , ClientEncryption $ clientEncryption , ClientEncryption $ clientEncryptionInvalid ) use ($ kmipMasterKey ): void {
884- $ kmipMasterKey ['endpoint ' ] = 'doesnotexist.local :5698 ' ;
884+ $ kmipMasterKey ['endpoint ' ] = 'doesnotexist.invalid :5698 ' ;
885885
886886 $ test ->expectException (RuntimeException::class);
887- $ test ->expectExceptionMessageMatches ('#doesnotexist.local # ' );
887+ $ test ->expectExceptionMessageMatches ('#doesnotexist.invalid # ' );
888888 $ clientEncryption ->createDataKey ('kmip ' , ['masterKey ' => $ kmipMasterKey ]);
889889 },
890890 ];
0 commit comments