Document status - Confidential
Copyright 2022, Altinity Inc.. All Rights Reserved. All information contained herein is, and remains the property of Altinity Inc.. Any dissemination of this information or reproduction of this material is strictly forbidden unless prior written permission is obtained from Altinity Inc..
| Date | Sep 16, 2022 21:09 |
| Duration | 4m 34s |
| Framework | TestFlows 1.9.220810.1192506 |
Test artifacts can be found at https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3041775515/artifacts/browse
| project | altinity-qa/clickhouse/cicd/release |
| project.id | 22089296 |
| user.name | Andrey Zvonov |
| user.email | zvonov.andrey@gmail.com |
| version | 22.3.10.24 |
| repository | https://github.com/Altinity/ClickHouse.git |
| job.id | 3041775515 |
| job.url | https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3041775515 |
| stress | False |
| local | True |
| clickhouse_version | None |
| clickhouse_binary_path | /usr/bin/clickhouse |
| altinity-docker-runner |
| Units | OK | Fail | Error | XFail | XError | |
|---|---|---|---|---|---|---|
| Suites | ||||||
| Features | ||||||
| Scenarios | ||||||
| Examples | ||||||
| Steps |
| Test Name | Result | Message |
|---|---|---|
| /aes encryption/compatibility/select/decrypt unique | XFail 1s 706ms https://github.com/ClickHouse/ClickHouse/issues/18249 | AssertionError
Traceback (most recent call last):
File "/usr/lib/python3.8/threading.py", line 890, in _bootstrap
self._bootstrap_inner()
File "/usr/lib/python3.8/threading.py", line 932, in _bootstrap_inner
self.run()
File "/usr/lib/python3.8/threading.py", line 870, in run
self._target(*self._args, **self._kwargs)
File "/usr/lib/python3.8/concurrent/futures/thread.py", line 57, in run
result = self.fn(*self.args, **self.kwargs)
File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/feature.py", line 14, in feature
Feature(run=load("aes_encryption.tests.compatibility.select", "feature"), flags=TE)
File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 229, in feature
Scenario(run=scenario, flags=TE)
File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 197, in decrypt_unique
output = node.query(
File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py", line 653, in query
assert False, error(r.output)
AssertionError: Oops! Assertion failed
The following assertion was not satisfied
assert False, error(r.output)
Description
Received exception from server (version 22.3.10):
Code: 44. DB::Exception: Received from localhost:9000. DB::Exception: Illegal type of argument #1 'mode' of function decrypt, expected decryption mode string, got String: While processing ['aes-128-ecb', 'aes-192-ecb', 'aes-256-ecb', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr'] AS modes, ['1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret. (ILLEGAL_COLUMN)
(query: SELECT
count() AS count
FROM
(
SELECT
['aes-128-ecb','aes-192-ecb','aes-256-ecb','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ctr','aes-192-ctr','aes-256-ctr','aes-128-ctr','aes-192-ctr','aes-256-ctr'] AS modes,
['1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111'] AS keys,
name,
decrypt(modes[id], secret, keys[id]) AS secret
FROM user_table
)
WHERE
secret = 'secret'
FORMAT JSONEachRow
)
Assertion values
assert False, error(r.output)
^ is False
Where
File '/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py', line 653 in 'query'
645\| ) if steps else NullStep():
646\| assert message in r.output, error(r.output)
647\|
648\| if message is None or "Exception:" not in message:
649\| with Then("check if output has exception") if steps else NullStep():
650\| if "Exception:" in r.output:
651\| if raise_on_exception:
652\| raise QueryRuntimeException(r.output)
653\|> assert False, error(r.output)
654\|
655\| return r
656\| |
| Test Name | Result | Duration |
|---|---|---|
| /aes encryption | OK | 4m 34s |
| /aes encryption/encrypt | OK | 1m 5s |
| /aes encryption/encrypt/aad parameter types and length | OK | 1s 828ms |
| /aes encryption/decrypt | OK | 2m 25s |
| /aes encryption/decrypt/aad parameter types and length | OK | 1s 816ms |
| /aes encryption/encrypt_mysql | OK | 1m 3s |
| /aes encryption/encrypt_mysql/encryption | OK | 59s 234ms |
| /aes encryption/decrypt_mysql | OK | 2m 6s |
| /aes encryption/decrypt_mysql/decryption | OK | 58s 766ms |
| /aes encryption/compatibility | OK | 3m 40s |
| /aes encryption/compatibility/insert | OK | 57s 411ms |
| /aes encryption/compatibility/insert/aes decrypt mysql using input table function | OK | 9s 635ms |
| /aes encryption/decrypt/decryption | OK | 56s 871ms |
| /aes encryption/encrypt/encryption | OK | 57s 462ms |
| /aes encryption/compatibility/insert/aes decrypt mysql using materialized view | OK | 103ms |
| /aes encryption/compatibility/insert/aes encrypt mysql using input table function | OK | 8s 630ms |
| /aes encryption/compatibility/insert/aes encrypt mysql using materialized view | OK | 11s 88ms |
| /aes encryption/compatibility/insert/decrypt using input table function | OK | 8s 159ms |
| /aes encryption/compatibility/insert/decrypt using materialized view | OK | 84ms |
| /aes encryption/compatibility/insert/encrypt using input table function | OK | 8s 159ms |
| /aes encryption/compatibility/insert/encrypt using materialized view | OK | 11s 547ms |
| /aes encryption/compatibility/select | OK | 27s 267ms |
| /aes encryption/compatibility/select/decrypt | OK | 8s 624ms |
| /aes encryption/decrypt/invalid ciphertext | OK | 40s 446ms |
| /aes encryption/decrypt_mysql/invalid ciphertext | OK | 40s 763ms |
| /aes encryption/encrypt_mysql/invalid parameters | OK | 626ms |
| /aes encryption/encrypt/invalid key or iv length for gcm | OK | 548ms |
| /aes encryption/encrypt/invalid key or iv length for mode non gcm | OK | 2s 971ms |
| /aes encryption/encrypt_mysql/invalid plaintext data type | OK | 975ms |
| /aes encryption/encrypt_mysql/iv parameter types | OK | 198ms |
| /aes encryption/encrypt_mysql/key or iv length for mode | OK | 2s 4ms |
| /aes encryption/encrypt/invalid parameters | OK | 835ms |
| /aes encryption/encrypt_mysql/key parameter types | OK | 182ms |
| /aes encryption/encrypt_mysql/mode parameter types | OK | 82ms |
| /aes encryption/encrypt_mysql/return value | OK | 76ms |
| /aes encryption/encrypt_mysql/syntax | OK | 73ms |
| /aes encryption/encrypt_mysql/unsupported modes | OK | 266ms |
| /aes encryption/encrypt/invalid plaintext data type | OK | 1s 15ms |
| /aes encryption/encrypt/iv parameter types | OK | 141ms |
| /aes encryption/encrypt/key parameter types | OK | 164ms |
| /aes encryption/encrypt/mode parameter types | OK | 85ms |
| /aes encryption/encrypt/return value | OK | 72ms |
| /aes encryption/encrypt/syntax | OK | 40ms |
| /aes encryption/compatibility/select/decrypt multiple | OK | 16s 935ms |
| /aes encryption/compatibility/select/decrypt unique | XFail | 1s 706ms |
| /aes encryption/compatibility/mysql | OK | 2m 16s |
| /aes encryption/compatibility/mysql/table engine | OK | 43s 782ms |
| /aes encryption/compatibility/mysql/table engine/decrypt | OK | 21s 230ms |
| /aes encryption/decrypt/invalid key or iv length for gcm | OK | 722ms |
| /aes encryption/decrypt_mysql/invalid parameters | OK | 668ms |
| /aes encryption/decrypt/invalid key or iv length for mode non gcm | OK | 2s 845ms |
| /aes encryption/decrypt_mysql/iv parameter types | OK | 148ms |
| /aes encryption/decrypt_mysql/key or iv length for mode | OK | 1s 846ms |
| /aes encryption/decrypt_mysql/key parameter types | OK | 154ms |
| /aes encryption/decrypt_mysql/mismatched iv | OK | 723ms |
| /aes encryption/decrypt/invalid parameters | OK | 759ms |
| /aes encryption/decrypt_mysql/mismatched key | OK | 1s 414ms |
| /aes encryption/decrypt/iv parameter types | OK | 176ms |
| /aes encryption/decrypt/key parameter types | OK | 173ms |
| /aes encryption/decrypt/mismatched aad | OK | 123ms |
| /aes encryption/decrypt/mismatched iv | OK | 759ms |
| /aes encryption/decrypt_mysql/mismatched mode | OK | 21s 422ms |
| /aes encryption/decrypt/mismatched key | OK | 1s 336ms |
| /aes encryption/compatibility/mysql/table engine/encrypt | OK | 22s 550ms |
| /aes encryption/decrypt/mismatched mode | OK | 39s 413ms |
| /aes encryption/decrypt_mysql/mode parameter types | OK | 75ms |
| /aes encryption/decrypt_mysql/return value | OK | 73ms |
| /aes encryption/decrypt_mysql/syntax | OK | 31ms |
| /aes encryption/decrypt_mysql/unsupported modes | OK | 232ms |
| /aes encryption/compatibility/mysql/database engine | OK | 42s 850ms |
| /aes encryption/compatibility/mysql/database engine/decrypt | OK | 20s 526ms |
| /aes encryption/decrypt/mode parameter types | OK | 81ms |
| /aes encryption/decrypt/return value | OK | 68ms |
| /aes encryption/decrypt/syntax | OK | 37ms |
| /aes encryption/compatibility/mysql/database engine/encrypt | OK | 22s 322ms |
| /aes encryption/compatibility/mysql/table function | OK | 29s 171ms |
| /aes encryption/compatibility/mysql/table function/decrypt | OK | 12s 997ms |
| /aes encryption/compatibility/mysql/table function/encrypt | OK | 16s 173ms |
| /aes encryption/compatibility/mysql/dictionary | OK | 20s 223ms |
| /aes encryption/compatibility/mysql/dictionary/decrypt | OK | 19s 773ms |
| /aes encryption/compatibility/mysql/dictionary/parameter values | OK | 449ms |
Generated by TestFlows Open-Source Test Framework v1.9.220810.1192506