diff options
author | Mark Benvenuto <mark.benvenuto@mongodb.com> | 2019-03-08 15:55:55 -0500 |
---|---|---|
committer | Mark Benvenuto <mark.benvenuto@mongodb.com> | 2019-03-08 15:55:55 -0500 |
commit | 527404878fb3ff5c4140c0ca9b1e7ee2847a945e (patch) | |
tree | cc1970b6911508293289c7d02da10612b3a67735 | |
parent | 9b4febc06798c93ec2c5c6c5bfdf771575939b42 (diff) | |
download | mongo-527404878fb3ff5c4140c0ca9b1e7ee2847a945e.tar.gz |
SERVER-39134 Mongocryptd packaging
-rw-r--r-- | debian/mongodb-enterprise-unstable.rules | 3 | ||||
-rw-r--r-- | debian/mongodb-enterprise.rules | 3 | ||||
-rw-r--r-- | etc/evergreen.yml | 108 | ||||
-rw-r--r-- | rpm/mongodb-enterprise-init.spec | 2 | ||||
-rw-r--r-- | rpm/mongodb-enterprise-unstable-init.spec | 2 | ||||
-rw-r--r-- | rpm/mongodb-enterprise-unstable.spec | 2 | ||||
-rw-r--r-- | rpm/mongodb-enterprise.spec | 2 | ||||
-rw-r--r-- | src/mongo/installer/msi/wxs/BinaryFragment.wxs | 8 | ||||
-rw-r--r-- | src/mongo/installer/msi/wxs/FeatureFragment.wxs | 9 |
9 files changed, 132 insertions, 7 deletions
diff --git a/debian/mongodb-enterprise-unstable.rules b/debian/mongodb-enterprise-unstable.rules index f77d13dc976..35219a9ae43 100644 --- a/debian/mongodb-enterprise-unstable.rules +++ b/debian/mongodb-enterprise-unstable.rules @@ -1,6 +1,6 @@ #!/usr/bin/make -f # -*- makefile -*- -TOOLS=bsondump mongocryptd mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop +TOOLS=bsondump mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop # Uncomment this to turn on verbose mode. export DH_VERBOSE=1 @@ -88,6 +88,7 @@ install: build mkdir -p $(CURDIR)/debian/mongodb-enterprise-unstable-tools/usr/bin cp -v $(CURDIR)/bin/mongo $(CURDIR)/debian/mongodb-enterprise-unstable-shell/usr/bin cp -v $(CURDIR)/bin/mongod $(CURDIR)/debian/mongodb-enterprise-unstable-server/usr/bin + cp -v $(CURDIR)/bin/mongocryptd $(CURDIR)/debian/mongodb-enterprise-unstable-server/usr/bin cp -v $(CURDIR)/bin/mongos $(CURDIR)/debian/mongodb-enterprise-unstable-mongos/usr/bin cp -v $(CURDIR)/bin/install_compass $(CURDIR)/debian/mongodb-enterprise-unstable-tools/usr/bin diff --git a/debian/mongodb-enterprise.rules b/debian/mongodb-enterprise.rules index 8613fb0a688..ed529644098 100644 --- a/debian/mongodb-enterprise.rules +++ b/debian/mongodb-enterprise.rules @@ -1,6 +1,6 @@ #!/usr/bin/make -f # -*- makefile -*- -TOOLS=bsondump mongocryptd mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop +TOOLS=bsondump mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop # Uncomment this to turn on verbose mode. export DH_VERBOSE=1 @@ -87,6 +87,7 @@ install: build mkdir -p $(CURDIR)/debian/mongodb-enterprise-tools/usr/bin cp -v $(CURDIR)/bin/mongo $(CURDIR)/debian/mongodb-enterprise-shell/usr/bin cp -v $(CURDIR)/bin/mongod $(CURDIR)/debian/mongodb-enterprise-server/usr/bin + cp -v $(CURDIR)/bin/mongocryptd $(CURDIR)/debian/mongodb-enterprise-server/usr/bin cp -v $(CURDIR)/bin/mongos $(CURDIR)/debian/mongodb-enterprise-mongos/usr/bin cp -v $(CURDIR)/bin/install_compass $(CURDIR)/debian/mongodb-enterprise-tools/usr/bin diff --git a/etc/evergreen.yml b/etc/evergreen.yml index b21d18b0f2b..d1a8c254ee5 100644 --- a/etc/evergreen.yml +++ b/etc/evergreen.yml @@ -2772,6 +2772,8 @@ functions: fi - key: mongo_binaries value: ${project}/${build_variant}/${revision}/binaries/mongo-${build_id}.${ext|tgz} + - key: mongo_cryptd + value: ${project}/${build_variant}/${revision}/binaries/mongo-cryptd-${build_id}.${ext|tgz} - key: mongo_debugsymbols value: ${project}/${build_variant}/${revision}/debugsymbols/debugsymbols-${build_id}.${ext|tgz} - key: mongo_shell @@ -3410,6 +3412,16 @@ tasks: $python ../buildscripts/make_archive.py -o mongodb-shell.${ext|tgz} $(find mongodb-* -type f) cd .. + # Create separate cryptd archive if mongocryptd is in the tarball + mkdir -p cryptd-archive/build + cd cryptd-archive + ${platform_decompress|tar xzvf} ../mongodb-binaries.tgz + find . -mindepth 3 ! -name "mongocryptd${exe}" -type f -exec rm {} \; # delete bin/* except bin/mongocryptd + if [ $(find . -name mongocryptd | wc -l) -eq 1 ] ; then + $python ../buildscripts/make_archive.py -o mongodb-cryptd.${ext|tgz} $(find mongodb-* -type f) + fi + cd .. + # Test lifecycle is temporarily disabled to reduce load on Evergreen API. # - func: "fetch test_lifecycle.yml" # vars: @@ -3473,6 +3485,17 @@ tasks: optional: true aws_key: ${aws_key} aws_secret: ${aws_secret} + local_file: src/cryptd-archive/mongodb-cryptd.tgz + remote_file: ${mongo_cryptd} + bucket: mciuploads + permissions: public-read + content_type: ${content_type|application/gzip} + display_name: CryptD Binaries + - command: s3.put + params: + optional: true + aws_key: ${aws_key} + aws_secret: ${aws_secret} local_file: src/shell-archive/mongodb-shell.${ext|tgz} remote_file: ${mongo_shell} bucket: mciuploads @@ -6883,6 +6906,14 @@ tasks: remote_file: ${mongo_shell} bucket: mciuploads local_file: src/mongo-shell.tgz + # Fetch mongocryptd + - command: s3.get + params: + aws_key: ${aws_key} + aws_secret: ${aws_secret} + remote_file: ${mongo_cryptd} + bucket: mciuploads + local_file: src/mongo-cryptd.tgz # Fetch the sources (on relevant variants only) - command: s3.get params: @@ -6910,11 +6941,12 @@ tasks: mv mongo-binaries.tgz mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz} mv mongo-shell.tgz mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz} + mv mongo-cryptd.tgz mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz} mv mongo-debugsymbols.tgz mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} || true mv distsrc.${ext|tgz} mongodb-src-${src_suffix}.${ext|tar.gz} || true /usr/bin/find build/ -type f | grep msi$ | xargs -I original_filename cp original_filename mongodb-win32-${push_arch}-${suffix}.msi || true - /usr/local/bin/notary-client.py --key-name "server-4.2" --auth-token-file ${workdir}/src/signing_auth_token --comment "Evergreen Automatic Signing ${revision} - ${build_variant} - ${branch_name}" --notary-url http://notary-service.build.10gen.cc:5000 --skip-missing mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} mongodb-win32-${push_arch}-${suffix}.msi mongodb-src-${src_suffix}.${ext|tar.gz} + /usr/local/bin/notary-client.py --key-name "server-4.2" --auth-token-file ${workdir}/src/signing_auth_token --comment "Evergreen Automatic Signing ${revision} - ${build_variant} - ${branch_name}" --notary-url http://notary-service.build.10gen.cc:5000 --skip-missing mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} mongodb-win32-${push_arch}-${suffix}.msi mongodb-src-${src_suffix}.${ext|tar.gz} mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz} # Put the binaries tarball/zipfile - command: s3.put @@ -6936,6 +6968,16 @@ tasks: permissions: public-read content_type: ${content_type|application/gzip} remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz} + # Put the cryptd tarball/zipfile + - command: s3.put + params: + aws_secret: ${aws_secret} + local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz} + aws_key: ${aws_key} + bucket: build-push-testing + permissions: public-read + content_type: ${content_type|application/gzip} + remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz} # Put the source tarball - command: s3.put params: @@ -6982,6 +7024,17 @@ tasks: content_type: ${content_type|application/gzip} remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig + # Put the cryptd tarball signature + - command: s3.put + params: + aws_secret: ${aws_secret} + local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig + aws_key: ${aws_key} + bucket: build-push-testing + permissions: public-read + content_type: ${content_type|application/gzip} + remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig + # Put the source tarball signature - command: s3.put params: @@ -7040,6 +7093,17 @@ tasks: content_type: text/plain remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1 + # Put the cryptd tarball sha1 + - command: s3.put + params: + aws_secret: ${aws_secret} + local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1 + aws_key: ${aws_key} + permissions: public-read + bucket: build-push-testing + content_type: text/plain + remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1 + # Put the source tarball sha1 - command: s3.put params: @@ -7098,6 +7162,17 @@ tasks: content_type: text/plain remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256 + # Put the cryptd tarball sha256 + - command: s3.put + params: + aws_secret: ${aws_secret} + local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256 + permissions: public-read + aws_key: ${aws_key} + bucket: build-push-testing + content_type: text/plain + remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256 + # Put the source tarball sha256 - command: s3.put params: @@ -7156,6 +7231,17 @@ tasks: content_type: text/plain remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5 + # Put the cryptd tarball md5 + - command: s3.put + params: + aws_secret: ${aws_secret} + local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5 + aws_key: ${aws_key} + bucket: build-push-testing + permissions: public-read + content_type: text/plain + remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5 + # Put the source tarball md5 - command: s3.put params: @@ -7205,6 +7291,10 @@ tasks: - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}', 'bucket': 'build-push-testing'}, 'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}', 'bucket': '${push_bucket}'}} + #Cryptd + - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}', 'bucket': 'build-push-testing'}, + 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}', 'bucket': '${push_bucket}'}} + #Source tarball - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}', 'bucket': 'build-push-testing'}, 'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}', 'bucket': '${push_bucket}'}, @@ -7223,6 +7313,10 @@ tasks: - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig', 'bucket': 'build-push-testing'}, 'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig', 'bucket': '${push_bucket}'}} + #Cryptd Signature + - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig', 'bucket': 'build-push-testing'}, + 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig', 'bucket': '${push_bucket}'}} + #Source tarball signature - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sig', 'bucket': 'build-push-testing'}, 'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sig', 'bucket': '${push_bucket}'}, @@ -7236,6 +7330,10 @@ tasks: - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1', 'bucket': 'build-push-testing'}, 'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1', 'bucket': '${push_bucket}'}} + #SHA1 for cryptd + - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1', 'bucket': 'build-push-testing'}, + 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1', 'bucket': '${push_bucket}'}} + #SHA1 for source tarball - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sha1', 'bucket': 'build-push-testing'}, 'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sha1', 'bucket': '${push_bucket}'}, @@ -7254,6 +7352,10 @@ tasks: - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256', 'bucket': 'build-push-testing'}, 'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256', 'bucket': '${push_bucket}'}} + #SHA256 for cryptd + - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256', 'bucket': 'build-push-testing'}, + 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256', 'bucket': '${push_bucket}'}} + #SHA256 for source tarball - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sha256', 'bucket': 'build-push-testing'}, 'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sha256', 'bucket': '${push_bucket}'}, @@ -7272,6 +7374,10 @@ tasks: - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5', 'bucket': 'build-push-testing'}, 'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5', 'bucket': '${push_bucket}'}} + #MD5 for cryptd + - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5', 'bucket': 'build-push-testing'}, + 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5', 'bucket': '${push_bucket}'}} + #MD5 for source tarball - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.md5', 'bucket': 'build-push-testing'}, 'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.md5', 'bucket': '${push_bucket}'}, diff --git a/rpm/mongodb-enterprise-init.spec b/rpm/mongodb-enterprise-init.spec index 77aeb8e4dac..aded1721269 100644 --- a/rpm/mongodb-enterprise-init.spec +++ b/rpm/mongodb-enterprise-init.spec @@ -224,6 +224,7 @@ fi %defattr(-,root,root,-) %config(noreplace) /etc/mongod.conf %{_bindir}/mongod +%{_bindir}/mongocryptd %{_mandir}/man1/mongod.1* /etc/init.d/mongod %config(noreplace) /etc/sysconfig/mongod @@ -259,7 +260,6 @@ fi %{_bindir}/bsondump %{_bindir}/install_compass -%{_bindir}/mongocryptd %{_bindir}/mongodecrypt %{_bindir}/mongoldap %{_bindir}/mongodump diff --git a/rpm/mongodb-enterprise-unstable-init.spec b/rpm/mongodb-enterprise-unstable-init.spec index a96f65174c6..7a5ce6ffe59 100644 --- a/rpm/mongodb-enterprise-unstable-init.spec +++ b/rpm/mongodb-enterprise-unstable-init.spec @@ -215,6 +215,7 @@ fi %defattr(-,root,root,-) %config(noreplace) /etc/mongod.conf %{_bindir}/mongod +%{_bindir}/mongocryptd %{_mandir}/man1/mongod.1* /etc/init.d/mongod %config(noreplace) /etc/sysconfig/mongod @@ -248,7 +249,6 @@ fi %{_bindir}/bsondump %{_bindir}/install_compass -%{_bindir}/mongocryptd %{_bindir}/mongodecrypt %{_bindir}/mongoldap %{_bindir}/mongodump diff --git a/rpm/mongodb-enterprise-unstable.spec b/rpm/mongodb-enterprise-unstable.spec index e63314bf4c7..d847a718029 100644 --- a/rpm/mongodb-enterprise-unstable.spec +++ b/rpm/mongodb-enterprise-unstable.spec @@ -218,6 +218,7 @@ fi %defattr(-,root,root,-) %config(noreplace) /etc/mongod.conf %{_bindir}/mongod +%{_bindir}/mongocryptd %{_mandir}/man1/mongod.1* /lib/systemd/system/mongod.service %attr(0755,mongod,mongod) %dir /var/lib/mongo @@ -250,7 +251,6 @@ fi %{_bindir}/bsondump %{_bindir}/install_compass -%{_bindir}/mongocryptd %{_bindir}/mongodecrypt %{_bindir}/mongoldap %{_bindir}/mongodump diff --git a/rpm/mongodb-enterprise.spec b/rpm/mongodb-enterprise.spec index 6ed351230c2..3888ee63dc8 100644 --- a/rpm/mongodb-enterprise.spec +++ b/rpm/mongodb-enterprise.spec @@ -225,6 +225,7 @@ fi %defattr(-,root,root,-) %config(noreplace) /etc/mongod.conf %{_bindir}/mongod +%{_bindir}/mongocryptd %{_mandir}/man1/mongod.1* /lib/systemd/system/mongod.service %attr(0755,mongod,mongod) %dir /var/lib/mongo @@ -258,7 +259,6 @@ fi #%doc README %{_bindir}/bsondump -%{_bindir}/mongocryptd %{_bindir}/install_compass %{_bindir}/mongodecrypt %{_bindir}/mongoldap diff --git a/src/mongo/installer/msi/wxs/BinaryFragment.wxs b/src/mongo/installer/msi/wxs/BinaryFragment.wxs index 5a6194cacf1..10ddbc243de 100644 --- a/src/mongo/installer/msi/wxs/BinaryFragment.wxs +++ b/src/mongo/installer/msi/wxs/BinaryFragment.wxs @@ -112,6 +112,14 @@ <File Id="f_snmpPdb" Name="netsnmp.pdb" Source="$(var.SnmpSource)\netsnmp.pdb"
DiskId="1" KeyPath="yes" />
</Component>
+ <Component Id="c_mongocryptd" Guid="D243D194-B765-4DF8-BC67-8F4C329AD1B5">
+ <File Id="f_mongocryptd" Name="mongocryptd.exe" Source="$(var.EnterpriseToolBinarySource)\mongocryptd.exe"
+ DiskId ="1" KeyPath="yes"/>
+ </Component>
+ <Component Id="c_mongocryptdPdb" Guid="49950D1E-55B0-4146-AEDE-C60C6B086ABF">
+ <File Id="f_mongocryptdPdb" Name="mongocryptd.pdb" Source="$(var.EnterpriseToolBinarySource)\mongocryptd.pdb"
+ DiskId ="1" KeyPath="yes"/>
+ </Component>
<?endif ?>
<?if $(var.Edition) = Enterprise Or $(var.Edition) = SSL ?>
<Component Id="c_ssleay" Guid="8879033A-F4F7-4879-A7F8-4D81355A47E3">
diff --git a/src/mongo/installer/msi/wxs/FeatureFragment.wxs b/src/mongo/installer/msi/wxs/FeatureFragment.wxs index d5117219ea7..5cf8622df20 100644 --- a/src/mongo/installer/msi/wxs/FeatureFragment.wxs +++ b/src/mongo/installer/msi/wxs/FeatureFragment.wxs @@ -115,6 +115,15 @@ <ComponentGroupRef Id="cg_SSLBase" />
<?endif ?>
</Feature>
+ <?if $(var.Edition) = Enterprise ?>
+ <Feature Id="MongoCryptD"
+ Title ="MongoCryptD"
+ Description="MongoDB Field Level Encryption Daemon"
+ Level ="1">
+ <ComponentRef Id="c_mongocryptd"/>
+ <ComponentRef Id="c_mongocryptdPdb"/>
+ </Feature>
+ <?endif ?>
</Feature>
</FeatureGroup>
|