Flaky: Client Side Encryption Prose Tests: KMS TLS Options Test Case 6: <Cloud Provider> [5]

XMLWordPrintableJSON

    • Type: Build Failure
    • Resolution: Duplicate
    • Priority: Unknown
    • None
    • Affects Version/s: None
    • Component/s: Flaky Test
    • Not Needed
    • None
    • Hide

      1. What would you like to communicate to the user about this feature?
      2. Would you like the user to see examples of the syntax and/or executable code and its output?
      3. Which versions of the driver/connector does this apply to?

      Show
      1. What would you like to communicate to the user about this feature? 2. Would you like the user to see examples of the syntax and/or executable code and its output? 3. Which versions of the driver/connector does this apply to?
    • None
    • None
    • None
    • None
    • None
    • None

      https://spruce.mongodb.com/task/mongo_node_driver_next_windows_vsCurrent_large_Node20_test_latest_server_v1_api_441186aefca0e4d0796f740380268cb81abfeecc_25_06_03_19_51_14/logs?execution=0&sortBy=STATUS&sortDir=ASC

       

      [2025/06/03 22:15:59.435]   1) Client Side Encryption Prose Tests[2025/06/03 22:15:59.435]        KMS TLS Options Tests[2025/06/03 22:15:59.435]          Case 6: named KMS providers apply TLS options[2025/06/03 22:15:59.435]            Named AWS:[2025/06/03 22:15:59.435]      AssertionError: expected Error: read ECONNRESET { errno: -4077, code: 'ECONNRESET', syscall: 'read' } to match /tlsv13 alert certificate required/[2025/06/03 22:15:59.435]       at Context.<anonymous> (Z:\data\mci\328a\src\test\integration\client-side-encryption\client_side_encryption.prose.test.js:1802:34)[2025/06/03 22:15:59.435]       at processTicksAndRejections (node:internal/process/task_queues:95:5) 

            Assignee:
            Unassigned
            Reporter:
            Durran Jordan
            None
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: