summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--debian/mongodb-enterprise-unstable.rules3
-rw-r--r--debian/mongodb-enterprise.rules3
-rw-r--r--etc/evergreen.yml108
-rw-r--r--rpm/mongodb-enterprise-init.spec2
-rw-r--r--rpm/mongodb-enterprise-unstable-init.spec2
-rw-r--r--rpm/mongodb-enterprise-unstable.spec2
-rw-r--r--rpm/mongodb-enterprise.spec2
-rw-r--r--src/mongo/installer/msi/wxs/BinaryFragment.wxs8
-rw-r--r--src/mongo/installer/msi/wxs/FeatureFragment.wxs9
9 files changed, 132 insertions, 7 deletions
diff --git a/debian/mongodb-enterprise-unstable.rules b/debian/mongodb-enterprise-unstable.rules
index f77d13dc976..35219a9ae43 100644
--- a/debian/mongodb-enterprise-unstable.rules
+++ b/debian/mongodb-enterprise-unstable.rules
@@ -1,6 +1,6 @@
#!/usr/bin/make -f
# -*- makefile -*-
-TOOLS=bsondump mongocryptd mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop
+TOOLS=bsondump mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop
# Uncomment this to turn on verbose mode.
export DH_VERBOSE=1
@@ -88,6 +88,7 @@ install: build
mkdir -p $(CURDIR)/debian/mongodb-enterprise-unstable-tools/usr/bin
cp -v $(CURDIR)/bin/mongo $(CURDIR)/debian/mongodb-enterprise-unstable-shell/usr/bin
cp -v $(CURDIR)/bin/mongod $(CURDIR)/debian/mongodb-enterprise-unstable-server/usr/bin
+ cp -v $(CURDIR)/bin/mongocryptd $(CURDIR)/debian/mongodb-enterprise-unstable-server/usr/bin
cp -v $(CURDIR)/bin/mongos $(CURDIR)/debian/mongodb-enterprise-unstable-mongos/usr/bin
cp -v $(CURDIR)/bin/install_compass $(CURDIR)/debian/mongodb-enterprise-unstable-tools/usr/bin
diff --git a/debian/mongodb-enterprise.rules b/debian/mongodb-enterprise.rules
index 8613fb0a688..ed529644098 100644
--- a/debian/mongodb-enterprise.rules
+++ b/debian/mongodb-enterprise.rules
@@ -1,6 +1,6 @@
#!/usr/bin/make -f
# -*- makefile -*-
-TOOLS=bsondump mongocryptd mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop
+TOOLS=bsondump mongodecrypt mongodump mongoexport mongofiles mongoimport mongoldap mongorestore mongostat mongotop
# Uncomment this to turn on verbose mode.
export DH_VERBOSE=1
@@ -87,6 +87,7 @@ install: build
mkdir -p $(CURDIR)/debian/mongodb-enterprise-tools/usr/bin
cp -v $(CURDIR)/bin/mongo $(CURDIR)/debian/mongodb-enterprise-shell/usr/bin
cp -v $(CURDIR)/bin/mongod $(CURDIR)/debian/mongodb-enterprise-server/usr/bin
+ cp -v $(CURDIR)/bin/mongocryptd $(CURDIR)/debian/mongodb-enterprise-server/usr/bin
cp -v $(CURDIR)/bin/mongos $(CURDIR)/debian/mongodb-enterprise-mongos/usr/bin
cp -v $(CURDIR)/bin/install_compass $(CURDIR)/debian/mongodb-enterprise-tools/usr/bin
diff --git a/etc/evergreen.yml b/etc/evergreen.yml
index b21d18b0f2b..d1a8c254ee5 100644
--- a/etc/evergreen.yml
+++ b/etc/evergreen.yml
@@ -2772,6 +2772,8 @@ functions:
fi
- key: mongo_binaries
value: ${project}/${build_variant}/${revision}/binaries/mongo-${build_id}.${ext|tgz}
+ - key: mongo_cryptd
+ value: ${project}/${build_variant}/${revision}/binaries/mongo-cryptd-${build_id}.${ext|tgz}
- key: mongo_debugsymbols
value: ${project}/${build_variant}/${revision}/debugsymbols/debugsymbols-${build_id}.${ext|tgz}
- key: mongo_shell
@@ -3410,6 +3412,16 @@ tasks:
$python ../buildscripts/make_archive.py -o mongodb-shell.${ext|tgz} $(find mongodb-* -type f)
cd ..
+ # Create separate cryptd archive if mongocryptd is in the tarball
+ mkdir -p cryptd-archive/build
+ cd cryptd-archive
+ ${platform_decompress|tar xzvf} ../mongodb-binaries.tgz
+ find . -mindepth 3 ! -name "mongocryptd${exe}" -type f -exec rm {} \; # delete bin/* except bin/mongocryptd
+ if [ $(find . -name mongocryptd | wc -l) -eq 1 ] ; then
+ $python ../buildscripts/make_archive.py -o mongodb-cryptd.${ext|tgz} $(find mongodb-* -type f)
+ fi
+ cd ..
+
# Test lifecycle is temporarily disabled to reduce load on Evergreen API.
# - func: "fetch test_lifecycle.yml"
# vars:
@@ -3473,6 +3485,17 @@ tasks:
optional: true
aws_key: ${aws_key}
aws_secret: ${aws_secret}
+ local_file: src/cryptd-archive/mongodb-cryptd.tgz
+ remote_file: ${mongo_cryptd}
+ bucket: mciuploads
+ permissions: public-read
+ content_type: ${content_type|application/gzip}
+ display_name: CryptD Binaries
+ - command: s3.put
+ params:
+ optional: true
+ aws_key: ${aws_key}
+ aws_secret: ${aws_secret}
local_file: src/shell-archive/mongodb-shell.${ext|tgz}
remote_file: ${mongo_shell}
bucket: mciuploads
@@ -6883,6 +6906,14 @@ tasks:
remote_file: ${mongo_shell}
bucket: mciuploads
local_file: src/mongo-shell.tgz
+ # Fetch mongocryptd
+ - command: s3.get
+ params:
+ aws_key: ${aws_key}
+ aws_secret: ${aws_secret}
+ remote_file: ${mongo_cryptd}
+ bucket: mciuploads
+ local_file: src/mongo-cryptd.tgz
# Fetch the sources (on relevant variants only)
- command: s3.get
params:
@@ -6910,11 +6941,12 @@ tasks:
mv mongo-binaries.tgz mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz}
mv mongo-shell.tgz mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}
+ mv mongo-cryptd.tgz mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}
mv mongo-debugsymbols.tgz mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} || true
mv distsrc.${ext|tgz} mongodb-src-${src_suffix}.${ext|tar.gz} || true
/usr/bin/find build/ -type f | grep msi$ | xargs -I original_filename cp original_filename mongodb-win32-${push_arch}-${suffix}.msi || true
- /usr/local/bin/notary-client.py --key-name "server-4.2" --auth-token-file ${workdir}/src/signing_auth_token --comment "Evergreen Automatic Signing ${revision} - ${build_variant} - ${branch_name}" --notary-url http://notary-service.build.10gen.cc:5000 --skip-missing mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} mongodb-win32-${push_arch}-${suffix}.msi mongodb-src-${src_suffix}.${ext|tar.gz}
+ /usr/local/bin/notary-client.py --key-name "server-4.2" --auth-token-file ${workdir}/src/signing_auth_token --comment "Evergreen Automatic Signing ${revision} - ${build_variant} - ${branch_name}" --notary-url http://notary-service.build.10gen.cc:5000 --skip-missing mongodb-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz} mongodb-${push_name}-${push_arch}-debugsymbols-${suffix}.${ext|tgz} mongodb-win32-${push_arch}-${suffix}.msi mongodb-src-${src_suffix}.${ext|tar.gz} mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}
# Put the binaries tarball/zipfile
- command: s3.put
@@ -6936,6 +6968,16 @@ tasks:
permissions: public-read
content_type: ${content_type|application/gzip}
remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}
+ # Put the cryptd tarball/zipfile
+ - command: s3.put
+ params:
+ aws_secret: ${aws_secret}
+ local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}
+ aws_key: ${aws_key}
+ bucket: build-push-testing
+ permissions: public-read
+ content_type: ${content_type|application/gzip}
+ remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}
# Put the source tarball
- command: s3.put
params:
@@ -6982,6 +7024,17 @@ tasks:
content_type: ${content_type|application/gzip}
remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig
+ # Put the cryptd tarball signature
+ - command: s3.put
+ params:
+ aws_secret: ${aws_secret}
+ local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig
+ aws_key: ${aws_key}
+ bucket: build-push-testing
+ permissions: public-read
+ content_type: ${content_type|application/gzip}
+ remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig
+
# Put the source tarball signature
- command: s3.put
params:
@@ -7040,6 +7093,17 @@ tasks:
content_type: text/plain
remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1
+ # Put the cryptd tarball sha1
+ - command: s3.put
+ params:
+ aws_secret: ${aws_secret}
+ local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1
+ aws_key: ${aws_key}
+ permissions: public-read
+ bucket: build-push-testing
+ content_type: text/plain
+ remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1
+
# Put the source tarball sha1
- command: s3.put
params:
@@ -7098,6 +7162,17 @@ tasks:
content_type: text/plain
remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256
+ # Put the cryptd tarball sha256
+ - command: s3.put
+ params:
+ aws_secret: ${aws_secret}
+ local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256
+ permissions: public-read
+ aws_key: ${aws_key}
+ bucket: build-push-testing
+ content_type: text/plain
+ remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256
+
# Put the source tarball sha256
- command: s3.put
params:
@@ -7156,6 +7231,17 @@ tasks:
content_type: text/plain
remote_file: ${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5
+ # Put the cryptd tarball md5
+ - command: s3.put
+ params:
+ aws_secret: ${aws_secret}
+ local_file: src/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5
+ aws_key: ${aws_key}
+ bucket: build-push-testing
+ permissions: public-read
+ content_type: text/plain
+ remote_file: ${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5
+
# Put the source tarball md5
- command: s3.put
params:
@@ -7205,6 +7291,10 @@ tasks:
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}', 'bucket': 'build-push-testing'},
'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}', 'bucket': '${push_bucket}'}}
+ #Cryptd
+ - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}', 'bucket': 'build-push-testing'},
+ 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}', 'bucket': '${push_bucket}'}}
+
#Source tarball
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}', 'bucket': 'build-push-testing'},
'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}', 'bucket': '${push_bucket}'},
@@ -7223,6 +7313,10 @@ tasks:
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig', 'bucket': 'build-push-testing'},
'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig', 'bucket': '${push_bucket}'}}
+ #Cryptd Signature
+ - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sig', 'bucket': 'build-push-testing'},
+ 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sig', 'bucket': '${push_bucket}'}}
+
#Source tarball signature
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sig', 'bucket': 'build-push-testing'},
'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sig', 'bucket': '${push_bucket}'},
@@ -7236,6 +7330,10 @@ tasks:
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1', 'bucket': 'build-push-testing'},
'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1', 'bucket': '${push_bucket}'}}
+ #SHA1 for cryptd
+ - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha1', 'bucket': 'build-push-testing'},
+ 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha1', 'bucket': '${push_bucket}'}}
+
#SHA1 for source tarball
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sha1', 'bucket': 'build-push-testing'},
'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sha1', 'bucket': '${push_bucket}'},
@@ -7254,6 +7352,10 @@ tasks:
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256', 'bucket': 'build-push-testing'},
'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256', 'bucket': '${push_bucket}'}}
+ #SHA256 for cryptd
+ - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.sha256', 'bucket': 'build-push-testing'},
+ 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.sha256', 'bucket': '${push_bucket}'}}
+
#SHA256 for source tarball
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.sha256', 'bucket': 'build-push-testing'},
'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.sha256', 'bucket': '${push_bucket}'},
@@ -7272,6 +7374,10 @@ tasks:
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-shell-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5', 'bucket': 'build-push-testing'},
'destination': {'path': '${push_path}/mongodb-shell-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5', 'bucket': '${push_bucket}'}}
+ #MD5 for cryptd
+ - {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}-${task_id}.${ext|tgz}.md5', 'bucket': 'build-push-testing'},
+ 'destination': {'path': '${push_path}/mongodb-cryptd-${push_name}-${push_arch}-${suffix}.${ext|tgz}.md5', 'bucket': '${push_bucket}'}}
+
#MD5 for source tarball
- {'source': {'path': '${push_path}-STAGE/${push_name}/mongodb-src-${src_suffix}-${task_id}.${ext|tar.gz}.md5', 'bucket': 'build-push-testing'},
'destination': {'path': 'src/mongodb-src-${src_suffix}.${ext|tar.gz}.md5', 'bucket': '${push_bucket}'},
diff --git a/rpm/mongodb-enterprise-init.spec b/rpm/mongodb-enterprise-init.spec
index 77aeb8e4dac..aded1721269 100644
--- a/rpm/mongodb-enterprise-init.spec
+++ b/rpm/mongodb-enterprise-init.spec
@@ -224,6 +224,7 @@ fi
%defattr(-,root,root,-)
%config(noreplace) /etc/mongod.conf
%{_bindir}/mongod
+%{_bindir}/mongocryptd
%{_mandir}/man1/mongod.1*
/etc/init.d/mongod
%config(noreplace) /etc/sysconfig/mongod
@@ -259,7 +260,6 @@ fi
%{_bindir}/bsondump
%{_bindir}/install_compass
-%{_bindir}/mongocryptd
%{_bindir}/mongodecrypt
%{_bindir}/mongoldap
%{_bindir}/mongodump
diff --git a/rpm/mongodb-enterprise-unstable-init.spec b/rpm/mongodb-enterprise-unstable-init.spec
index a96f65174c6..7a5ce6ffe59 100644
--- a/rpm/mongodb-enterprise-unstable-init.spec
+++ b/rpm/mongodb-enterprise-unstable-init.spec
@@ -215,6 +215,7 @@ fi
%defattr(-,root,root,-)
%config(noreplace) /etc/mongod.conf
%{_bindir}/mongod
+%{_bindir}/mongocryptd
%{_mandir}/man1/mongod.1*
/etc/init.d/mongod
%config(noreplace) /etc/sysconfig/mongod
@@ -248,7 +249,6 @@ fi
%{_bindir}/bsondump
%{_bindir}/install_compass
-%{_bindir}/mongocryptd
%{_bindir}/mongodecrypt
%{_bindir}/mongoldap
%{_bindir}/mongodump
diff --git a/rpm/mongodb-enterprise-unstable.spec b/rpm/mongodb-enterprise-unstable.spec
index e63314bf4c7..d847a718029 100644
--- a/rpm/mongodb-enterprise-unstable.spec
+++ b/rpm/mongodb-enterprise-unstable.spec
@@ -218,6 +218,7 @@ fi
%defattr(-,root,root,-)
%config(noreplace) /etc/mongod.conf
%{_bindir}/mongod
+%{_bindir}/mongocryptd
%{_mandir}/man1/mongod.1*
/lib/systemd/system/mongod.service
%attr(0755,mongod,mongod) %dir /var/lib/mongo
@@ -250,7 +251,6 @@ fi
%{_bindir}/bsondump
%{_bindir}/install_compass
-%{_bindir}/mongocryptd
%{_bindir}/mongodecrypt
%{_bindir}/mongoldap
%{_bindir}/mongodump
diff --git a/rpm/mongodb-enterprise.spec b/rpm/mongodb-enterprise.spec
index 6ed351230c2..3888ee63dc8 100644
--- a/rpm/mongodb-enterprise.spec
+++ b/rpm/mongodb-enterprise.spec
@@ -225,6 +225,7 @@ fi
%defattr(-,root,root,-)
%config(noreplace) /etc/mongod.conf
%{_bindir}/mongod
+%{_bindir}/mongocryptd
%{_mandir}/man1/mongod.1*
/lib/systemd/system/mongod.service
%attr(0755,mongod,mongod) %dir /var/lib/mongo
@@ -258,7 +259,6 @@ fi
#%doc README
%{_bindir}/bsondump
-%{_bindir}/mongocryptd
%{_bindir}/install_compass
%{_bindir}/mongodecrypt
%{_bindir}/mongoldap
diff --git a/src/mongo/installer/msi/wxs/BinaryFragment.wxs b/src/mongo/installer/msi/wxs/BinaryFragment.wxs
index 5a6194cacf1..10ddbc243de 100644
--- a/src/mongo/installer/msi/wxs/BinaryFragment.wxs
+++ b/src/mongo/installer/msi/wxs/BinaryFragment.wxs
@@ -112,6 +112,14 @@
<File Id="f_snmpPdb" Name="netsnmp.pdb" Source="$(var.SnmpSource)\netsnmp.pdb"
DiskId="1" KeyPath="yes" />
</Component>
+ <Component Id="c_mongocryptd" Guid="D243D194-B765-4DF8-BC67-8F4C329AD1B5">
+ <File Id="f_mongocryptd" Name="mongocryptd.exe" Source="$(var.EnterpriseToolBinarySource)\mongocryptd.exe"
+ DiskId ="1" KeyPath="yes"/>
+ </Component>
+ <Component Id="c_mongocryptdPdb" Guid="49950D1E-55B0-4146-AEDE-C60C6B086ABF">
+ <File Id="f_mongocryptdPdb" Name="mongocryptd.pdb" Source="$(var.EnterpriseToolBinarySource)\mongocryptd.pdb"
+ DiskId ="1" KeyPath="yes"/>
+ </Component>
<?endif ?>
<?if $(var.Edition) = Enterprise Or $(var.Edition) = SSL ?>
<Component Id="c_ssleay" Guid="8879033A-F4F7-4879-A7F8-4D81355A47E3">
diff --git a/src/mongo/installer/msi/wxs/FeatureFragment.wxs b/src/mongo/installer/msi/wxs/FeatureFragment.wxs
index d5117219ea7..5cf8622df20 100644
--- a/src/mongo/installer/msi/wxs/FeatureFragment.wxs
+++ b/src/mongo/installer/msi/wxs/FeatureFragment.wxs
@@ -115,6 +115,15 @@
<ComponentGroupRef Id="cg_SSLBase" />
<?endif ?>
</Feature>
+ <?if $(var.Edition) = Enterprise ?>
+ <Feature Id="MongoCryptD"
+ Title ="MongoCryptD"
+ Description="MongoDB Field Level Encryption Daemon"
+ Level ="1">
+ <ComponentRef Id="c_mongocryptd"/>
+ <ComponentRef Id="c_mongocryptdPdb"/>
+ </Feature>
+ <?endif ?>
</Feature>
</FeatureGroup>