Document status - Confidential
Copyright 2022, Altinity Inc.. All Rights Reserved. All information contained herein is, and remains the property of Altinity Inc.. Any dissemination of this information or reproduction of this material is strictly forbidden unless prior written permission is obtained from Altinity Inc..
Date | Jul 19, 2022 14:31 |
Duration | 3m 55s |
Framework | TestFlows 1.9.220712.1163352 |
Test artifacts can be found at https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/2739540919/artifacts/browse
project | altinity-qa/clickhouse/cicd/release |
project.id | 22089296 |
user.name | Andrey Zvonov |
user.email | zvonov.andrey@gmail.com |
version | 22.3.8.40 |
repository | https://github.com/Altinity/ClickHouse.git |
job.id | 2739540919 |
job.url | https://gitlab.com/altinity-qa/clickhouse/cicd/release/-/jobs/2739540919 |
stress | False |
local | True |
clickhouse_version | None |
clickhouse_binary_path | /usr/bin/clickhouse |
altinity-docker-runner |
Units | OK | Fail | Error | XFail | XError | |
---|---|---|---|---|---|---|
Suites | ||||||
Features | ||||||
Scenarios | ||||||
Examples | ||||||
Steps |
Test Name | Result | Message |
---|---|---|
/aes encryption/compatibility/select/decrypt unique | XFail 1s 713ms https://github.com/ClickHouse/ClickHouse/issues/18249 | AssertionError Traceback (most recent call last): File "/usr/lib/python3.8/threading.py", line 890, in _bootstrap self._bootstrap_inner() File "/usr/lib/python3.8/threading.py", line 932, in _bootstrap_inner self.run() File "/usr/lib/python3.8/threading.py", line 870, in run self._target(*self._args, **self._kwargs) File "/usr/lib/python3.8/concurrent/futures/thread.py", line 57, in run result = self.fn(*self.args, **self.kwargs) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/feature.py", line 14, in feature Feature(run=load("aes_encryption.tests.compatibility.select", "feature"), flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 229, in feature Scenario(run=scenario, flags=TE) File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../aes_encryption/tests/compatibility/select.py", line 197, in decrypt_unique output = node.query( File "/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py", line 641, in query assert False, error(r.output) AssertionError: Oops! Assertion failed The following assertion was not satisfied assert False, error(r.output) Description Received exception from server (version 22.3.8): Code: 44. DB::Exception: Received from localhost:9000. DB::Exception: Illegal type of argument #1 'mode' of function decrypt, expected decryption mode string, got String: While processing ['aes-128-ecb', 'aes-192-ecb', 'aes-256-ecb', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cbc', 'aes-192-cbc', 'aes-256-cbc', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-cfb128', 'aes-192-cfb128', 'aes-256-cfb128', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ofb', 'aes-192-ofb', 'aes-256-ofb', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr', 'aes-128-ctr', 'aes-192-ctr', 'aes-256-ctr'] AS modes, ['1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111', '1111111111111111', '111111111111111111111111', '11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret. (ILLEGAL_COLUMN) (query: SELECT count() AS count FROM ( SELECT ['aes-128-ecb','aes-192-ecb','aes-256-ecb','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cbc','aes-192-cbc','aes-256-cbc','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-cfb128','aes-192-cfb128','aes-256-cfb128','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ofb','aes-192-ofb','aes-256-ofb','aes-128-ctr','aes-192-ctr','aes-256-ctr','aes-128-ctr','aes-192-ctr','aes-256-ctr'] AS modes, ['1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111','1111111111111111','111111111111111111111111','11111111111111111111111111111111'] AS keys, name, decrypt(modes[id], secret, keys[id]) AS secret FROM user_table ) WHERE secret = 'secret' FORMAT JSONEachRow ) Assertion values assert False, error(r.output) ^ is False Where File '/builds/altinity-qa/clickhouse/cicd/release/regression/aes_encryption/../helpers/cluster.py', line 641 in 'query' 633\| ) if steps else NullStep(): 634\| assert message in r.output, error(r.output) 635\| 636\| if message is None or "Exception:" not in message: 637\| with Then("check if output has exception") if steps else NullStep(): 638\| if "Exception:" in r.output: 639\| if raise_on_exception: 640\| raise QueryRuntimeException(r.output) 641\|> assert False, error(r.output) 642\| 643\| return r 644\| |
Test Name | Result | Duration |
---|---|---|
/aes encryption | OK | 3m 55s |
/aes encryption/encrypt | OK | 55s 337ms |
/aes encryption/encrypt/aad parameter types and length | OK | 1s 836ms |
/aes encryption/decrypt | OK | 2m 7s |
/aes encryption/decrypt/aad parameter types and length | OK | 1s 820ms |
/aes encryption/encrypt_mysql | OK | 54s 264ms |
/aes encryption/encrypt_mysql/encryption | OK | 50s 241ms |
/aes encryption/decrypt_mysql | OK | 1m 48s |
/aes encryption/decrypt_mysql/decryption | OK | 47s 446ms |
/aes encryption/compatibility | OK | 3m 20s |
/aes encryption/compatibility/insert | OK | 49s 428ms |
/aes encryption/compatibility/insert/aes decrypt mysql using input table function | OK | 8s 592ms |
/aes encryption/decrypt/decryption | OK | 45s 994ms |
/aes encryption/encrypt/encryption | OK | 48s 373ms |
/aes encryption/compatibility/insert/aes decrypt mysql using materialized view | OK | 74ms |
/aes encryption/compatibility/insert/aes encrypt mysql using input table function | OK | 7s 748ms |
/aes encryption/compatibility/insert/aes encrypt mysql using materialized view | OK | 10s 347ms |
/aes encryption/compatibility/insert/decrypt using input table function | OK | 6s 551ms |
/aes encryption/compatibility/insert/decrypt using materialized view | OK | 78ms |
/aes encryption/compatibility/insert/encrypt using input table function | OK | 6s 535ms |
/aes encryption/compatibility/insert/encrypt using materialized view | OK | 9s 499ms |
/aes encryption/decrypt_mysql/invalid ciphertext | OK | 37s 192ms |
/aes encryption/decrypt/invalid ciphertext | OK | 37s 233ms |
/aes encryption/compatibility/select | OK | 25s 277ms |
/aes encryption/compatibility/select/decrypt | OK | 7s 475ms |
/aes encryption/encrypt/invalid key or iv length for gcm | OK | 493ms |
/aes encryption/encrypt_mysql/invalid parameters | OK | 592ms |
/aes encryption/encrypt/invalid key or iv length for mode non gcm | OK | 2s 543ms |
/aes encryption/encrypt_mysql/invalid plaintext data type | OK | 873ms |
/aes encryption/encrypt_mysql/iv parameter types | OK | 151ms |
/aes encryption/encrypt_mysql/key or iv length for mode | OK | 1s 805ms |
/aes encryption/encrypt/invalid parameters | OK | 724ms |
/aes encryption/encrypt_mysql/key parameter types | OK | 159ms |
/aes encryption/encrypt_mysql/mode parameter types | OK | 86ms |
/aes encryption/encrypt_mysql/return value | OK | 74ms |
/aes encryption/encrypt/invalid plaintext data type | OK | 881ms |
/aes encryption/encrypt_mysql/syntax | OK | 43ms |
/aes encryption/encrypt_mysql/unsupported modes | OK | 233ms |
/aes encryption/encrypt/iv parameter types | OK | 156ms |
/aes encryption/encrypt/key parameter types | OK | 143ms |
/aes encryption/encrypt/mode parameter types | OK | 62ms |
/aes encryption/encrypt/return value | OK | 68ms |
/aes encryption/encrypt/syntax | OK | 49ms |
/aes encryption/compatibility/select/decrypt multiple | OK | 16s 87ms |
/aes encryption/compatibility/select/decrypt unique | XFail | 1s 713ms |
/aes encryption/compatibility/mysql | OK | 2m 6s |
/aes encryption/compatibility/mysql/table engine | OK | 40s 111ms |
/aes encryption/compatibility/mysql/table engine/decrypt | OK | 19s 334ms |
/aes encryption/decrypt_mysql/invalid parameters | OK | 610ms |
/aes encryption/decrypt/invalid key or iv length for gcm | OK | 666ms |
/aes encryption/decrypt_mysql/iv parameter types | OK | 169ms |
/aes encryption/decrypt_mysql/key or iv length for mode | OK | 1s 602ms |
/aes encryption/decrypt/invalid key or iv length for mode non gcm | OK | 2s 444ms |
/aes encryption/decrypt_mysql/key parameter types | OK | 134ms |
/aes encryption/decrypt_mysql/mismatched iv | OK | 634ms |
/aes encryption/decrypt_mysql/mismatched key | OK | 1s 243ms |
/aes encryption/decrypt/invalid parameters | OK | 665ms |
/aes encryption/decrypt/iv parameter types | OK | 137ms |
/aes encryption/decrypt/key parameter types | OK | 141ms |
/aes encryption/decrypt_mysql/mismatched mode | OK | 19s 309ms |
/aes encryption/decrypt/mismatched aad | OK | 115ms |
/aes encryption/decrypt/mismatched iv | OK | 689ms |
/aes encryption/decrypt/mismatched key | OK | 1s 241ms |
/aes encryption/decrypt/mismatched mode | OK | 36s 166ms |
/aes encryption/compatibility/mysql/table engine/encrypt | OK | 20s 776ms |
/aes encryption/decrypt_mysql/mode parameter types | OK | 74ms |
/aes encryption/decrypt_mysql/return value | OK | 69ms |
/aes encryption/decrypt_mysql/syntax | OK | 47ms |
/aes encryption/decrypt_mysql/unsupported modes | OK | 211ms |
/aes encryption/compatibility/mysql/database engine | OK | 40s 316ms |
/aes encryption/compatibility/mysql/database engine/decrypt | OK | 19s 155ms |
/aes encryption/decrypt/mode parameter types | OK | 70ms |
/aes encryption/decrypt/return value | OK | 64ms |
/aes encryption/decrypt/syntax | OK | 34ms |
/aes encryption/compatibility/mysql/database engine/encrypt | OK | 21s 159ms |
/aes encryption/compatibility/mysql/table function | OK | 26s 827ms |
/aes encryption/compatibility/mysql/table function/decrypt | OK | 11s 970ms |
/aes encryption/compatibility/mysql/table function/encrypt | OK | 14s 855ms |
/aes encryption/compatibility/mysql/dictionary | OK | 18s 956ms |
/aes encryption/compatibility/mysql/dictionary/decrypt | OK | 18s 544ms |
/aes encryption/compatibility/mysql/dictionary/parameter values | OK | 410ms |
Generated by TestFlows Open-Source Test Framework v1.9.220712.1163352