Skip to content

Commit ecaa859

Browse files
authored
Fix integration tests, CI (#206)
1 parent ff9b06b commit ecaa859

File tree

5 files changed

+34
-20
lines changed

5 files changed

+34
-20
lines changed

.github/workflows/rust-daily.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,12 @@ on:
33
schedule:
44
- cron: 0 14 * * 1-5
55
workflow_dispatch:
6+
# rust-daily does a more thorough check of all features and all targets.
7+
# Without this, we would miss checking the tests with the `integration_tests` feature
8+
# flag, which we don't run because it requires a running TSP.
9+
pull_request: null
610

711
jobs:
812
rust-daily:
9-
uses: IronCoreLabs/workflows/.github/workflows/rust-daily.yaml@rust-daily-v0
13+
uses: IronCoreLabs/workflows/.github/workflows/rust-daily.yaml@rust-daily-v1
1014
secrets: inherit

tests/deterministic.rs

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ mod tests {
8585
.deterministic()
8686
.encrypt_batch(fields, &metadata)
8787
.await?;
88-
assert_eq!(encrypted.successes.len(), 2);
88+
assert_eq!(encrypted.successes.0.len(), 2);
8989
assert_eq!(encrypted.failures.len(), 0);
9090
let bad_encrypted = EncryptedField {
9191
encrypted_field: vec![1, 1, 1].into(),
@@ -94,14 +94,14 @@ mod tests {
9494
};
9595
let encrypted_fields = EncryptedFields(
9696
iter::once((FieldId("bad_doc".to_string()), bad_encrypted))
97-
.chain(encrypted.successes)
97+
.chain(encrypted.successes.0)
9898
.collect(),
9999
);
100100
let decrypted = get_client()
101101
.deterministic()
102102
.decrypt_batch(encrypted_fields, &metadata)
103103
.await?;
104-
assert_eq!(decrypted.successes.len(), 2);
104+
assert_eq!(decrypted.successes.0.len(), 2);
105105
assert_eq!(decrypted.failures.len(), 1);
106106
assert!(matches!(
107107
decrypted
@@ -113,6 +113,7 @@ mod tests {
113113
assert_eq!(
114114
decrypted
115115
.successes
116+
.0
116117
.get(&FieldId("field".to_string()))
117118
.unwrap()
118119
.plaintext_field,

tests/standard.rs

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ mod tests {
134134
.standard()
135135
.encrypt_batch(documents, &metadata)
136136
.await?;
137-
assert_eq!(encrypted.successes.len(), 1);
137+
assert_eq!(encrypted.successes.0.len(), 1);
138138
assert_eq!(encrypted.failures.len(), 0);
139139
let second_document = get_v3_ciphertext();
140140
let bad_document = EncryptedDocument {
@@ -144,6 +144,7 @@ mod tests {
144144
let new_encrypted = EncryptedDocuments(
145145
encrypted
146146
.successes
147+
.0
147148
.into_iter()
148149
.chain([
149150
(DocumentId("v3_doc".to_string()), second_document),
@@ -155,18 +156,20 @@ mod tests {
155156
.standard()
156157
.decrypt_batch(new_encrypted, &metadata)
157158
.await?;
158-
assert_eq!(decrypted.successes.len(), 2);
159+
assert_eq!(decrypted.successes.0.len(), 2);
159160
assert_eq!(decrypted.failures.len(), 1);
160161
assert_eq!(
161162
decrypted
162163
.successes
164+
.0
163165
.get(&DocumentId("doc".to_string()))
164166
.unwrap(),
165167
&get_plaintext()
166168
);
167169
let decrypted_v3 = from_utf8(
168170
&decrypted
169171
.successes
172+
.0
170173
.get(&DocumentId("v3_doc".to_string()))
171174
.unwrap()
172175
.0
@@ -234,13 +237,14 @@ mod tests {
234237
.standard()
235238
.encrypt_with_existing_edek_batch(plaintexts, &metadata)
236239
.await?;
237-
assert_eq!(batch_encrypted.successes.len(), 1);
240+
assert_eq!(batch_encrypted.successes.0.len(), 1);
238241
assert_eq!(batch_encrypted.failures.len(), 0);
239242
let decrypted = get_client()
240243
.standard()
241244
.decrypt(
242245
batch_encrypted
243246
.successes
247+
.0
244248
.remove(&DocumentId("doc".to_string()))
245249
.unwrap(),
246250
&metadata,

tests/standard_attached.rs

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -103,29 +103,33 @@ mod tests {
103103
let plaintext = get_plaintext();
104104
let metadata = get_metadata();
105105
let documents: PlaintextAttachedDocuments =
106-
[(DocumentId("doc".to_string()), plaintext)].into();
106+
PlaintextAttachedDocuments([(DocumentId("doc".to_string()), plaintext)].into());
107107
let encrypted = get_client()
108108
.standard_attached()
109109
.encrypt_batch(documents, &metadata)
110110
.await?;
111-
assert_eq!(encrypted.successes.len(), 1);
111+
assert_eq!(encrypted.successes.0.len(), 1);
112112
assert_eq!(encrypted.failures.len(), 0);
113113
let bad_document =
114114
EncryptedAttachedDocument(EncryptedBytes(vec![0, 0, 1, 255, 2, 0, 0, 2, 10, 36]));
115-
let new_encrypted: EncryptedAttachedDocuments = encrypted
116-
.successes
117-
.into_iter()
118-
.chain([(DocumentId("bad_doc".to_string()), bad_document)])
119-
.collect();
115+
let new_encrypted: EncryptedAttachedDocuments = EncryptedAttachedDocuments(
116+
encrypted
117+
.successes
118+
.0
119+
.into_iter()
120+
.chain([(DocumentId("bad_doc".to_string()), bad_document)])
121+
.collect(),
122+
);
120123
let decrypted = get_client()
121124
.standard_attached()
122125
.decrypt_batch(new_encrypted, &metadata)
123126
.await?;
124-
assert_eq!(decrypted.successes.len(), 1);
127+
assert_eq!(decrypted.successes.0.len(), 1);
125128
assert_eq!(decrypted.failures.len(), 1);
126129
assert_eq!(
127130
decrypted
128131
.successes
132+
.0
129133
.get(&DocumentId("doc".to_string()))
130134
.unwrap(),
131135
&get_plaintext()
@@ -212,7 +216,7 @@ mod tests {
212216
async fn standard_attached_rekey_v5_edek_works() -> TestResult {
213217
let metadata = get_metadata();
214218
let doc = get_ciphertext();
215-
let docs = [(DocumentId("doc".to_string()), doc)].into();
219+
let docs = EncryptedAttachedDocuments([(DocumentId("doc".to_string()), doc)].into());
216220
let mut all_rekeyed = get_client()
217221
.standard_attached()
218222
.rekey_documents(docs, &metadata, None)
@@ -243,7 +247,7 @@ mod tests {
243247
async fn standard_attached_rekey_new_tenant_edek_works() -> TestResult {
244248
let metadata = get_metadata();
245249
let doc = get_ciphertext();
246-
let docs = [(DocumentId("doc".to_string()), doc)].into();
250+
let docs = EncryptedAttachedDocuments([(DocumentId("doc".to_string()), doc)].into());
247251
let new_tenant = TenantId("tenant-aws".to_string());
248252
let mut all_rekeyed = get_client()
249253
.standard_attached()

tests/vector.rs

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ mod tests {
9292
.vector()
9393
.encrypt_batch(vectors, &metadata)
9494
.await?;
95-
assert_eq!(encrypted.successes.len(), 2);
95+
assert_eq!(encrypted.successes.0.len(), 2);
9696
assert_eq!(encrypted.failures.len(), 0);
9797
let bad_encrypted = EncryptedVector {
9898
encrypted_vector: vec![1.0, 1.0, 1.0],
@@ -102,14 +102,14 @@ mod tests {
102102
};
103103
let encrypted_vectors = EncryptedVectors(
104104
iter::once((VectorId("bad_vector".to_string()), bad_encrypted))
105-
.chain(encrypted.successes)
105+
.chain(encrypted.successes.0)
106106
.collect(),
107107
);
108108
let decrypted = get_client()
109109
.vector()
110110
.decrypt_batch(encrypted_vectors, &metadata)
111111
.await?;
112-
assert_eq!(decrypted.successes.len(), 2);
112+
assert_eq!(decrypted.successes.0.len(), 2);
113113
assert_eq!(decrypted.failures.len(), 1);
114114
assert!(matches!(
115115
decrypted
@@ -120,6 +120,7 @@ mod tests {
120120
));
121121
let result = decrypted
122122
.successes
123+
.0
123124
.get(&VectorId("vector".to_string()))
124125
.unwrap()
125126
.plaintext_vector

0 commit comments

Comments
 (0)