-
Notifications
You must be signed in to change notification settings - Fork 87
Fixed failing tests for multi-part operations #253
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixed failing tests for multi-part operations #253
Conversation
…t operations Signed-off-by: Jacob Prud'homme <[email protected]>
|
It seems a host of new errors has popped up now. I'll keep exploring |
|
I'll CC @Jakuje just in case they have some thoughts on the Kryoptic issues. kthxbai 🙇 |
|
I think we had some issues with the multipart operations recently. They were fixed in main, but not in any release version yet: latchset/kryoptic#179 I will see if we will get a new release out (and update in Fedora) or I can backport the changes to Fedora later today. Sorry for inconvenience! I think the issue is not on your side! |
Thank you. 🙏 It's great to hear your remarks directly. |
Signed-off-by: Jacob Prud'homme <[email protected]>
…lock size Signed-off-by: Jacob Prud'homme <[email protected]>
Signed-off-by: Jacob Prud'homme <[email protected]>
Signed-off-by: Jacob Prud'homme <[email protected]>
Signed-off-by: Jacob Prud'homme <[email protected]>
|
Fixed the tests! I had to ignore one to get all of them to pass. I'm open to suggestions on how to rewrite that test, though. I already tried manually creating a key with a manually set value and using that to compare against, but it seems Kryoptic doesn't allow using a key created this way to be used in |
wiktor-k
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay, I think it looks good. I guess the ignored test could check for softhsm the same way as some other tests (it's hard to check on mobile for me now).
Let's leave it open for a while as @Jakuje may have an idea on how to better adjust it.
Signed-off-by: Jacob Prud'homme <[email protected]>
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
|
(but still odd that the rust-cryptoki tries to call it without any template) Ok, I see the bug. With the optimizations, we do not pull all attributes from db for get_attributes and the cka_sensitive defaults to true. Filled in latchset/kryoptic#193 -- I will try to have a look into that. For the time being, feel free to skip this test for kryoptic, similarly as I skipped some others (with the link to the above issue). Once I will have a fix and new release, we can remove the exclusion. |
Hah, it seems including Kryoptic makes for a nice cross-testing experience. Great that we have you here to help debug the issues. @jacobprudhomme Would you be so kind to add a simple |
Signed-off-by: Jacob Prud'homme <[email protected]>
|
Alright, done! |
wiktor-k
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Much appreciated 🙏
hug-dev
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
Author: Jacob Prud'homme
Email: [email protected]
Description
In tests relating to multi-part operations, added missing attributes to key templates, since Kryoptic was throwing errors about said keys not having the correct attributes set on them to perform certain operations (see here)
Summary of Changes
*_not_initializedtests, since the exact error returned by various backends is different*_already_initializedtests to account for differing behaviour between backendssha256_digest_keytest, since it seems to be impossible to test the desired functionality on all backends for the moment (in particular, extracting the value from a secret key markedExtractableand notSensitiveis not always supported)