Document status - Confidential
Copyright 2022, Altinity Inc.. All Rights Reserved. All information contained herein is, and remains the property of Altinity Inc.. Any dissemination of this information or reproduction of this material is strictly forbidden unless prior written permission is obtained from Altinity Inc..
Date | Sep 16, 2022 21:09 |
Duration | 4m 34s |
Framework | TestFlows 1.9.220810.1192506 |
Test artifacts can be found at https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3041775515/artifacts/browse
project | altinity-qa/clickhouse/cicd/release |
project.id | 22089296 |
user.name | Andrey Zvonov |
user.email | zvonov.andrey@gmail.com |
version | 22.3.10.24 |
repository | https://github.com/Altinity/ClickHouse.git |
job.id | 3041775515 |
job.url | https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3041775515 |
stress | False |
local | True |
clickhouse_version | None |
clickhouse_binary_path | /usr/bin/clickhouse |
altinity-docker-runner |
Units | OK | Fail | Error | XFail | XError | |
---|---|---|---|---|---|---|
Suites | ||||||
Features | ||||||
Scenarios | ||||||
Examples | ||||||
Steps |
Test Name | Result | Message |
---|---|---|
/aes encryption/compatibility/select/decrypt unique | XFail 1s 706ms https://github.com/ClickHouse/ClickHouse/issues/18249 | AssertionError Traceback (most recent call last): File "/usr/lib/python3.8/threading.py", line 890, in _bootstrap self._bootstrap_inner() File "/usr/lib/python3.8/threading.py", line 932, in _bootstrap_inner self.run() File "/usr/lib/python3.8/threading.py", line 870, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/concurrent/futures/thread.py", line 57, in run result = self.fn(*self.args, **self.kwargs) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/feature.py", line 14, in feature Feature(run=load("aes_encryption.tests.compatibility.select", "feature"), flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 229, in feature Scenario(run=scenario, flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 197, in decrypt_unique output = node.query( File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py", line 653, in query assert False, error(r.output) AssertionError: Oops! Assertion failed The following assertion was not satisfied assert False, error(r.output) Description Received exception from server (version 22.3.10): Code: 44. DB::Exception: Received from localhost:9000. DB::Exception: Illegal type of argument #1 'mode' of function decrypt, expected decryption mode string, got String: While processing ['aes-128-ecb', 'aes-192-ecb', 'aes-256-ecb', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr'] AS modes, ['1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret. (ILLEGAL_COLUMN) (query: SELECT count() AS count FROM ( SELECT ['aes-128-ecb','aes-192-ecb','aes-256-ecb','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ctr','aes-192-ctr','aes-256-ctr','aes-128-ctr','aes-192-ctr','aes-256-ctr'] AS modes, ['1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret FROM user_table ) WHERE secret = 'secret' FORMAT JSONEachRow ) Assertion values assert False, error(r.output) ^ is False Where File '/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py', line 653 in 'query' 645\| ) if steps else NullStep(): 646\| assert message in r.output, error(r.output) 647\| 648\| if message is None or "Exception:" not in message: 649\| with Then("check if output has exception") if steps else NullStep(): 650\| if "Exception:" in r.output: 651\| if raise_on_exception: 652\| raise QueryRuntimeException(r.output) 653\|> assert False, error(r.output) 654\| 655\| return r 656\| |
Test Name | Result | Duration |
---|---|---|
/aes encryption | OK | 4m 34s |
/aes encryption/encrypt | OK | 1m 5s |
/aes encryption/encrypt/aad parameter types and length | OK | 1s 828ms |
/aes encryption/decrypt | OK | 2m 25s |
/aes encryption/decrypt/aad parameter types and length | OK | 1s 816ms |
/aes encryption/encrypt_mysql | OK | 1m 3s |
/aes encryption/encrypt_mysql/encryption | OK | 59s 234ms |
/aes encryption/decrypt_mysql | OK | 2m 6s |
/aes encryption/decrypt_mysql/decryption | OK | 58s 766ms |
/aes encryption/compatibility | OK | 3m 40s |
/aes encryption/compatibility/insert | OK | 57s 411ms |
/aes encryption/compatibility/insert/aes decrypt mysql using input table function | OK | 9s 635ms |
/aes encryption/decrypt/decryption | OK | 56s 871ms |
/aes encryption/encrypt/encryption | OK | 57s 462ms |
/aes encryption/compatibility/insert/aes decrypt mysql using materialized view | OK | 103ms |
/aes encryption/compatibility/insert/aes encrypt mysql using input table function | OK | 8s 630ms |
/aes encryption/compatibility/insert/aes encrypt mysql using materialized view | OK | 11s 88ms |
/aes encryption/compatibility/insert/decrypt using input table function | OK | 8s 159ms |
/aes encryption/compatibility/insert/decrypt using materialized view | OK | 84ms |
/aes encryption/compatibility/insert/encrypt using input table function | OK | 8s 159ms |
/aes encryption/compatibility/insert/encrypt using materialized view | OK | 11s 547ms |
/aes encryption/compatibility/select | OK | 27s 267ms |
/aes encryption/compatibility/select/decrypt | OK | 8s 624ms |
/aes encryption/decrypt/invalid ciphertext | OK | 40s 446ms |
/aes encryption/decrypt_mysql/invalid ciphertext | OK | 40s 763ms |
/aes encryption/encrypt_mysql/invalid parameters | OK | 626ms |
/aes encryption/encrypt/invalid key or iv length for gcm | OK | 548ms |
/aes encryption/encrypt/invalid key or iv length for mode non gcm | OK | 2s 971ms |
/aes encryption/encrypt_mysql/invalid plaintext data type | OK | 975ms |
/aes encryption/encrypt_mysql/iv parameter types | OK | 198ms |
/aes encryption/encrypt_mysql/key or iv length for mode | OK | 2s 4ms |
/aes encryption/encrypt/invalid parameters | OK | 835ms |
/aes encryption/encrypt_mysql/key parameter types | OK | 182ms |
/aes encryption/encrypt_mysql/mode parameter types | OK | 82ms |
/aes encryption/encrypt_mysql/return value | OK | 76ms |
/aes encryption/encrypt_mysql/syntax | OK | 73ms |
/aes encryption/encrypt_mysql/unsupported modes | OK | 266ms |
/aes encryption/encrypt/invalid plaintext data type | OK | 1s 15ms |
/aes encryption/encrypt/iv parameter types | OK | 141ms |
/aes encryption/encrypt/key parameter types | OK | 164ms |
/aes encryption/encrypt/mode parameter types | OK | 85ms |
/aes encryption/encrypt/return value | OK | 72ms |
/aes encryption/encrypt/syntax | OK | 40ms |
/aes encryption/compatibility/select/decrypt multiple | OK | 16s 935ms |
/aes encryption/compatibility/select/decrypt unique | XFail | 1s 706ms |
/aes encryption/compatibility/mysql | OK | 2m 16s |
/aes encryption/compatibility/mysql/table engine | OK | 43s 782ms |
/aes encryption/compatibility/mysql/table engine/decrypt | OK | 21s 230ms |
/aes encryption/decrypt/invalid key or iv length for gcm | OK | 722ms |
/aes encryption/decrypt_mysql/invalid parameters | OK | 668ms |
/aes encryption/decrypt/invalid key or iv length for mode non gcm | OK | 2s 845ms |
/aes encryption/decrypt_mysql/iv parameter types | OK | 148ms |
/aes encryption/decrypt_mysql/key or iv length for mode | OK | 1s 846ms |
/aes encryption/decrypt_mysql/key parameter types | OK | 154ms |
/aes encryption/decrypt_mysql/mismatched iv | OK | 723ms |
/aes encryption/decrypt/invalid parameters | OK | 759ms |
/aes encryption/decrypt_mysql/mismatched key | OK | 1s 414ms |
/aes encryption/decrypt/iv parameter types | OK | 176ms |
/aes encryption/decrypt/key parameter types | OK | 173ms |
/aes encryption/decrypt/mismatched aad | OK | 123ms |
/aes encryption/decrypt/mismatched iv | OK | 759ms |
/aes encryption/decrypt_mysql/mismatched mode | OK | 21s 422ms |
/aes encryption/decrypt/mismatched key | OK | 1s 336ms |
/aes encryption/compatibility/mysql/table engine/encrypt | OK | 22s 550ms |
/aes encryption/decrypt/mismatched mode | OK | 39s 413ms |
/aes encryption/decrypt_mysql/mode parameter types | OK | 75ms |
/aes encryption/decrypt_mysql/return value | OK | 73ms |
/aes encryption/decrypt_mysql/syntax | OK | 31ms |
/aes encryption/decrypt_mysql/unsupported modes | OK | 232ms |
/aes encryption/compatibility/mysql/database engine | OK | 42s 850ms |
/aes encryption/compatibility/mysql/database engine/decrypt | OK | 20s 526ms |
/aes encryption/decrypt/mode parameter types | OK | 81ms |
/aes encryption/decrypt/return value | OK | 68ms |
/aes encryption/decrypt/syntax | OK | 37ms |
/aes encryption/compatibility/mysql/database engine/encrypt | OK | 22s 322ms |
/aes encryption/compatibility/mysql/table function | OK | 29s 171ms |
/aes encryption/compatibility/mysql/table function/decrypt | OK | 12s 997ms |
/aes encryption/compatibility/mysql/table function/encrypt | OK | 16s 173ms |
/aes encryption/compatibility/mysql/dictionary | OK | 20s 223ms |
/aes encryption/compatibility/mysql/dictionary/decrypt | OK | 19s 773ms |
/aes encryption/compatibility/mysql/dictionary/parameter values | OK | 449ms |
Generated by TestFlows Open-Source Test Framework v1.9.220810.1192506