Document status - Confidential


Aes Encryption Test Run Report

DateOct 04, 2022 17:55
Duration6m 2s
Framework TestFlows 1.9.220810.1192506

Artifacts

Test artifacts can be found at https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3125479601/artifacts/browse

Attributes

projectaltinity-qa/clickhouse/cicd/release
project.id22089296
user.nameAndrey Zvonov
user.emailzvonov.andrey@gmail.com
version22.3.12.20
repositoryhttps://github.com/Altinity/ClickHouse.git
job.id3125479601
job.urlhttps://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/3125479601
stressFalse
localTrue
clickhouse_versionNone
clickhouse_binary_path/usr/bin/clickhouse

Tags

altinity-docker-runner

Summary

97.6%OK
2.4%Known

Statistics

Units OK Fail Error XFail XError
Suites
13
13
Features
13
13
Scenarios
68
67
1
Examples
5728
5589
73
66
Steps
58670
58392
212
66

Known Fails

Test NameResultMessage
/aes encryption/compatibility/select/decrypt uniqueXFail 2s 430ms
https://github.com/ClickHouse/ClickHouse/issues/18249
AssertionError
Traceback (most recent call last):
  File "/usr/lib/python3.8/threading.py", line 890, in _bootstrap
    self._bootstrap_inner()
  File "/usr/lib/python3.8/threading.py", line 932, in _bootstrap_inner
    self.run()
  File "/usr/lib/python3.8/threading.py", line 870, in run
    self._target(*self._args, **self._kwargs)
  File "/usr/lib/python3.8/concurrent/futures/thread.py", line 57, in run
    result = self.fn(*self.args, **self.kwargs)
  File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/feature.py", line 14, in feature
    Feature(run=load("aes_encryption.tests.compatibility.select", "feature"), flags=TE)
  File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 229, in feature
    Scenario(run=scenario, flags=TE)
  File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 197, in decrypt_unique
    output = node.query(
  File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py", line 653, in query
    assert False, error(r.output)
AssertionError: Oops! Assertion failed

The following assertion was not satisfied
  assert False, error(r.output)

Description
  Received exception from server (version 22.3.12):
Code: 44. DB::Exception: Received from localhost:9000. DB::Exception: Illegal type of argument #1 'mode' of function decrypt, expected decryption mode string, got String: While processing ['aes-128-ecb', 'aes-192-ecb', 'aes-256-ecb', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr'] AS modes, ['1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret. (ILLEGAL_COLUMN)
(query: SELECT
    count() AS count
FROM
(
    SELECT
        ['aes-128-ecb','aes-192-ecb','aes-256-ecb','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ctr','aes-192-ctr','aes-256-ctr','aes-128-ctr','aes-192-ctr','aes-256-ctr'] AS modes,
        ['1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111'] AS keys,
        name,
        decrypt(modes[id], secret, keys[id]) AS secret
    FROM user_table
)
WHERE
    secret = 'secret'
FORMAT JSONEachRow
)

Assertion values
  assert False, error(r.output)
  ^ is False

Where
  File '/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py', line 653 in 'query'

645\|              ) if steps else NullStep():
646\|                  assert message in r.output, error(r.output)
647\|  
648\|          if message is None or "Exception:" not in message:
649\|              with Then("check if output has exception") if steps else NullStep():
650\|                  if "Exception:" in r.output:
651\|                      if raise_on_exception:
652\|                          raise QueryRuntimeException(r.output)
653\|>                     assert False, error(r.output)
654\|  
655\|          return r
656\|

Results

Test Name Result Duration
/aes encryption OK 6m 2s
/aes encryption/encrypt OK 1m 15s
/aes encryption/encrypt/aad parameter types and length OK 2s 518ms
/aes encryption/decrypt OK 2m 48s
/aes encryption/decrypt/aad parameter types and length OK 2s 424ms
/aes encryption/encrypt_mysql OK 1m 14s
/aes encryption/encrypt_mysql/encryption OK 1m 8s
/aes encryption/decrypt_mysql OK 2m 27s
/aes encryption/decrypt_mysql/decryption OK 1m 7s
/aes encryption/compatibility OK 4m 41s
/aes encryption/compatibility/insert OK 1m 8s
/aes encryption/compatibility/insert/aes decrypt mysql using input table function OK 11s 890ms
/aes encryption/decrypt/decryption OK 1m 4s
/aes encryption/encrypt/encryption OK 1m 6s
/aes encryption/compatibility/insert/aes decrypt mysql using materialized view OK 77ms
/aes encryption/compatibility/insert/aes encrypt mysql using input table function OK 10s 212ms
/aes encryption/compatibility/insert/aes encrypt mysql using materialized view OK 13s 473ms
/aes encryption/compatibility/insert/decrypt using input table function OK 9s 639ms
/aes encryption/compatibility/insert/decrypt using materialized view OK 110ms
/aes encryption/compatibility/insert/encrypt using input table function OK 9s 841ms
/aes encryption/compatibility/insert/encrypt using materialized view OK 13s 321ms
/aes encryption/decrypt/invalid ciphertext OK 48s 728ms
/aes encryption/decrypt_mysql/invalid ciphertext OK 48s 887ms
/aes encryption/compatibility/select OK 37s 283ms
/aes encryption/compatibility/select/decrypt OK 10s 284ms
/aes encryption/encrypt/invalid key or iv length for gcm OK 648ms
/aes encryption/encrypt_mysql/invalid parameters OK 828ms
/aes encryption/encrypt/invalid key or iv length for mode non gcm OK 3s 752ms
/aes encryption/encrypt_mysql/invalid plaintext data type OK 1s 228ms
/aes encryption/encrypt_mysql/iv parameter types OK 197ms
/aes encryption/encrypt_mysql/key or iv length for mode OK 2s 478ms
/aes encryption/encrypt/invalid parameters OK 967ms
/aes encryption/encrypt_mysql/key parameter types OK 216ms
/aes encryption/encrypt_mysql/mode parameter types OK 120ms
/aes encryption/encrypt_mysql/return value OK 102ms
/aes encryption/encrypt_mysql/syntax OK 57ms
/aes encryption/encrypt_mysql/unsupported modes OK 295ms
/aes encryption/encrypt/invalid plaintext data type OK 1s 264ms
/aes encryption/encrypt/iv parameter types OK 186ms
/aes encryption/encrypt/key parameter types OK 190ms
/aes encryption/encrypt/mode parameter types OK 87ms
/aes encryption/encrypt/return value OK 76ms
/aes encryption/encrypt/syntax OK 40ms
/aes encryption/compatibility/select/decrypt multiple OK 24s 566ms
/aes encryption/compatibility/select/decrypt unique XFail 2s 430ms
/aes encryption/compatibility/mysql OK 2m 56s
/aes encryption/compatibility/mysql/table engine OK 54s 913ms
/aes encryption/compatibility/mysql/table engine/decrypt OK 26s 974ms
/aes encryption/decrypt/invalid key or iv length for gcm OK 769ms
/aes encryption/decrypt_mysql/invalid parameters OK 769ms
/aes encryption/decrypt/invalid key or iv length for mode non gcm OK 3s 72ms
/aes encryption/decrypt_mysql/iv parameter types OK 164ms
/aes encryption/decrypt_mysql/key or iv length for mode OK 2s 71ms
/aes encryption/decrypt_mysql/key parameter types OK 179ms
/aes encryption/decrypt_mysql/mismatched iv OK 814ms
/aes encryption/decrypt/invalid parameters OK 944ms
/aes encryption/decrypt_mysql/mismatched key OK 1s 502ms
/aes encryption/decrypt/iv parameter types OK 199ms
/aes encryption/decrypt/key parameter types OK 183ms
/aes encryption/decrypt/mismatched aad OK 136ms
/aes encryption/decrypt/mismatched iv OK 807ms
/aes encryption/decrypt_mysql/mismatched mode OK 25s 55ms
/aes encryption/decrypt/mismatched key OK 1s 468ms
/aes encryption/decrypt/mismatched mode OK 44s 239ms
/aes encryption/compatibility/mysql/table engine/encrypt OK 27s 937ms
/aes encryption/decrypt_mysql/mode parameter types OK 90ms
/aes encryption/decrypt_mysql/return value OK 84ms
/aes encryption/decrypt_mysql/syntax OK 39ms
/aes encryption/decrypt_mysql/unsupported modes OK 270ms
/aes encryption/compatibility/mysql/database engine OK 54s 164ms
/aes encryption/compatibility/mysql/database engine/decrypt OK 26s 11ms
/aes encryption/decrypt/mode parameter types OK 87ms
/aes encryption/decrypt/return value OK 91ms
/aes encryption/decrypt/syntax OK 36ms
/aes encryption/compatibility/mysql/database engine/encrypt OK 28s 151ms
/aes encryption/compatibility/mysql/table function OK 40s 544ms
/aes encryption/compatibility/mysql/table function/decrypt OK 19s 396ms
/aes encryption/compatibility/mysql/table function/encrypt OK 21s 142ms
/aes encryption/compatibility/mysql/dictionary OK 26s 419ms
/aes encryption/compatibility/mysql/dictionary/decrypt OK 25s 821ms
/aes encryption/compatibility/mysql/dictionary/parameter values OK 597ms

Generated by TestFlows Open-Source Test Framework v1.9.220810.1192506