Document status - Confidential
Copyright 2022, Altinity Inc.. All Rights Reserved. All information contained herein is, and remains the property of Altinity Inc.. Any dissemination of this information or reproduction of this material is strictly forbidden unless prior written permission is obtained from Altinity Inc..
Date | Oct 04, 2022 17:55 |
Duration | 6m 2s |
Framework | TestFlows 1.9.220810.1192506 |
Test artifacts can be found at https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3125479601/artifacts/browse
project | altinity-qa/clickhouse/cicd/release |
project.id | 22089296 |
user.name | Andrey Zvonov |
user.email | zvonov.andrey@gmail.com |
version | 22.3.12.20 |
repository | https://github.com/Altinity/ClickHouse.git |
job.id | 3125479601 |
job.url | https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3125479601 |
stress | False |
local | True |
clickhouse_version | None |
clickhouse_binary_path | /usr/bin/clickhouse |
altinity-docker-runner |
Units | OK | Fail | Error | XFail | XError | |
---|---|---|---|---|---|---|
Suites | ||||||
Features | ||||||
Scenarios | ||||||
Examples | ||||||
Steps |
Test Name | Result | Message |
---|---|---|
/aes encryption/compatibility/select/decrypt unique | XFail 2s 430ms https://github.com/ClickHouse/ClickHouse/issues/18249 | AssertionError Traceback (most recent call last): File "/usr/lib/python3.8/threading.py", line 890, in _bootstrap self._bootstrap_inner() File "/usr/lib/python3.8/threading.py", line 932, in _bootstrap_inner self.run() File "/usr/lib/python3.8/threading.py", line 870, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/concurrent/futures/thread.py", line 57, in run result = self.fn(*self.args, **self.kwargs) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/feature.py", line 14, in feature Feature(run=load("aes_encryption.tests.compatibility.select", "feature"), flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 229, in feature Scenario(run=scenario, flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 197, in decrypt_unique output = node.query( File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py", line 653, in query assert False, error(r.output) AssertionError: Oops! Assertion failed The following assertion was not satisfied assert False, error(r.output) Description Received exception from server (version 22.3.12): Code: 44. DB::Exception: Received from localhost:9000. DB::Exception: Illegal type of argument #1 'mode' of function decrypt, expected decryption mode string, got String: While processing ['aes-128-ecb', 'aes-192-ecb', 'aes-256-ecb', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr'] AS modes, ['1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret. (ILLEGAL_COLUMN) (query: SELECT count() AS count FROM ( SELECT ['aes-128-ecb','aes-192-ecb','aes-256-ecb','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ctr','aes-192-ctr','aes-256-ctr','aes-128-ctr','aes-192-ctr','aes-256-ctr'] AS modes, ['1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret FROM user_table ) WHERE secret = 'secret' FORMAT JSONEachRow ) Assertion values assert False, error(r.output) ^ is False Where File '/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py', line 653 in 'query' 645\| ) if steps else NullStep(): 646\| assert message in r.output, error(r.output) 647\| 648\| if message is None or "Exception:" not in message: 649\| with Then("check if output has exception") if steps else NullStep(): 650\| if "Exception:" in r.output: 651\| if raise_on_exception: 652\| raise QueryRuntimeException(r.output) 653\|> assert False, error(r.output) 654\| 655\| return r 656\| |
Test Name | Result | Duration |
---|---|---|
/aes encryption | OK | 6m 2s |
/aes encryption/encrypt | OK | 1m 15s |
/aes encryption/encrypt/aad parameter types and length | OK | 2s 518ms |
/aes encryption/decrypt | OK | 2m 48s |
/aes encryption/decrypt/aad parameter types and length | OK | 2s 424ms |
/aes encryption/encrypt_mysql | OK | 1m 14s |
/aes encryption/encrypt_mysql/encryption | OK | 1m 8s |
/aes encryption/decrypt_mysql | OK | 2m 27s |
/aes encryption/decrypt_mysql/decryption | OK | 1m 7s |
/aes encryption/compatibility | OK | 4m 41s |
/aes encryption/compatibility/insert | OK | 1m 8s |
/aes encryption/compatibility/insert/aes decrypt mysql using input table function | OK | 11s 890ms |
/aes encryption/decrypt/decryption | OK | 1m 4s |
/aes encryption/encrypt/encryption | OK | 1m 6s |
/aes encryption/compatibility/insert/aes decrypt mysql using materialized view | OK | 77ms |
/aes encryption/compatibility/insert/aes encrypt mysql using input table function | OK | 10s 212ms |
/aes encryption/compatibility/insert/aes encrypt mysql using materialized view | OK | 13s 473ms |
/aes encryption/compatibility/insert/decrypt using input table function | OK | 9s 639ms |
/aes encryption/compatibility/insert/decrypt using materialized view | OK | 110ms |
/aes encryption/compatibility/insert/encrypt using input table function | OK | 9s 841ms |
/aes encryption/compatibility/insert/encrypt using materialized view | OK | 13s 321ms |
/aes encryption/decrypt/invalid ciphertext | OK | 48s 728ms |
/aes encryption/decrypt_mysql/invalid ciphertext | OK | 48s 887ms |
/aes encryption/compatibility/select | OK | 37s 283ms |
/aes encryption/compatibility/select/decrypt | OK | 10s 284ms |
/aes encryption/encrypt/invalid key or iv length for gcm | OK | 648ms |
/aes encryption/encrypt_mysql/invalid parameters | OK | 828ms |
/aes encryption/encrypt/invalid key or iv length for mode non gcm | OK | 3s 752ms |
/aes encryption/encrypt_mysql/invalid plaintext data type | OK | 1s 228ms |
/aes encryption/encrypt_mysql/iv parameter types | OK | 197ms |
/aes encryption/encrypt_mysql/key or iv length for mode | OK | 2s 478ms |
/aes encryption/encrypt/invalid parameters | OK | 967ms |
/aes encryption/encrypt_mysql/key parameter types | OK | 216ms |
/aes encryption/encrypt_mysql/mode parameter types | OK | 120ms |
/aes encryption/encrypt_mysql/return value | OK | 102ms |
/aes encryption/encrypt_mysql/syntax | OK | 57ms |
/aes encryption/encrypt_mysql/unsupported modes | OK | 295ms |
/aes encryption/encrypt/invalid plaintext data type | OK | 1s 264ms |
/aes encryption/encrypt/iv parameter types | OK | 186ms |
/aes encryption/encrypt/key parameter types | OK | 190ms |
/aes encryption/encrypt/mode parameter types | OK | 87ms |
/aes encryption/encrypt/return value | OK | 76ms |
/aes encryption/encrypt/syntax | OK | 40ms |
/aes encryption/compatibility/select/decrypt multiple | OK | 24s 566ms |
/aes encryption/compatibility/select/decrypt unique | XFail | 2s 430ms |
/aes encryption/compatibility/mysql | OK | 2m 56s |
/aes encryption/compatibility/mysql/table engine | OK | 54s 913ms |
/aes encryption/compatibility/mysql/table engine/decrypt | OK | 26s 974ms |
/aes encryption/decrypt/invalid key or iv length for gcm | OK | 769ms |
/aes encryption/decrypt_mysql/invalid parameters | OK | 769ms |
/aes encryption/decrypt/invalid key or iv length for mode non gcm | OK | 3s 72ms |
/aes encryption/decrypt_mysql/iv parameter types | OK | 164ms |
/aes encryption/decrypt_mysql/key or iv length for mode | OK | 2s 71ms |
/aes encryption/decrypt_mysql/key parameter types | OK | 179ms |
/aes encryption/decrypt_mysql/mismatched iv | OK | 814ms |
/aes encryption/decrypt/invalid parameters | OK | 944ms |
/aes encryption/decrypt_mysql/mismatched key | OK | 1s 502ms |
/aes encryption/decrypt/iv parameter types | OK | 199ms |
/aes encryption/decrypt/key parameter types | OK | 183ms |
/aes encryption/decrypt/mismatched aad | OK | 136ms |
/aes encryption/decrypt/mismatched iv | OK | 807ms |
/aes encryption/decrypt_mysql/mismatched mode | OK | 25s 55ms |
/aes encryption/decrypt/mismatched key | OK | 1s 468ms |
/aes encryption/decrypt/mismatched mode | OK | 44s 239ms |
/aes encryption/compatibility/mysql/table engine/encrypt | OK | 27s 937ms |
/aes encryption/decrypt_mysql/mode parameter types | OK | 90ms |
/aes encryption/decrypt_mysql/return value | OK | 84ms |
/aes encryption/decrypt_mysql/syntax | OK | 39ms |
/aes encryption/decrypt_mysql/unsupported modes | OK | 270ms |
/aes encryption/compatibility/mysql/database engine | OK | 54s 164ms |
/aes encryption/compatibility/mysql/database engine/decrypt | OK | 26s 11ms |
/aes encryption/decrypt/mode parameter types | OK | 87ms |
/aes encryption/decrypt/return value | OK | 91ms |
/aes encryption/decrypt/syntax | OK | 36ms |
/aes encryption/compatibility/mysql/database engine/encrypt | OK | 28s 151ms |
/aes encryption/compatibility/mysql/table function | OK | 40s 544ms |
/aes encryption/compatibility/mysql/table function/decrypt | OK | 19s 396ms |
/aes encryption/compatibility/mysql/table function/encrypt | OK | 21s 142ms |
/aes encryption/compatibility/mysql/dictionary | OK | 26s 419ms |
/aes encryption/compatibility/mysql/dictionary/decrypt | OK | 25s 821ms |
/aes encryption/compatibility/mysql/dictionary/parameter values | OK | 597ms |
Generated by TestFlows Open-Source Test Framework v1.9.220810.1192506