Peter Vary created HIVE-22273:
---------------------------------

             Summary: Access check is failed when a temporary directory is 
removed
                 Key: HIVE-22273
                 URL: https://issues.apache.org/jira/browse/HIVE-22273
             Project: Hive
          Issue Type: Bug
            Reporter: Peter Vary
            Assignee: Peter Vary


The following exception is thrown if a temporary file is deleted during the 
access checks:
{code}
2019-09-24T16:12:59,611 ERROR [7e491237-1505-4388-afb9-5ec2a688b0dc 
HiveServer2-HttpHandler-Pool: Thread-11941]: authorizer.RangerHiveAuthorizer 
(:()) - Error getting permissions for hdfs://HDFS_FOLDER/TABLE_NAME
java.io.FileNotFoundException: File 
hdfs://HDFS_FOLDER/TABLE_NAME/.hive-staging_hive_2019-09-24_16-12-48_899_7291847300113791212-245/_tmp.-ext-10001
 does not exist.
    at 
org.apache.hadoop.hdfs.DistributedFileSystem.listStatusInternal(DistributedFileSystem.java:1059)
 ~[hadoop-hdfs-client-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hdfs.DistributedFileSystem.access$1000(DistributedFileSystem.java:131)
 ~[hadoop-hdfs-client-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hdfs.DistributedFileSystem$24.doCall(DistributedFileSystem.java:1119)
 ~[hadoop-hdfs-client-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hdfs.DistributedFileSystem$24.doCall(DistributedFileSystem.java:1116)
 ~[hadoop-hdfs-client-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81)
 ~[hadoop-common-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hdfs.DistributedFileSystem.listStatus(DistributedFileSystem.java:1126)
 ~[hadoop-hdfs-client-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hive.common.FileUtils.checkIsOwnerOfFileHierarchy(FileUtils.java:561)
 ~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hadoop.hive.common.FileUtils.checkIsOwnerOfFileHierarchy(FileUtils.java:564)
 ~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hadoop.hive.common.FileUtils.checkIsOwnerOfFileHierarchy(FileUtils.java:564)
 ~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.common.FileUtils$4.run(FileUtils.java:540) 
~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.common.FileUtils$4.run(FileUtils.java:536) 
~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_171]
    at javax.security.auth.Subject.doAs(Subject.java:422) ~[?:1.8.0_171]
    at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1730)
 ~[hadoop-common-3.1.1.3.1.0.0-78.jar:?]
    at 
org.apache.hadoop.hive.common.FileUtils.isOwnerOfFileHierarchy(FileUtils.java:536)
 ~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hadoop.hive.common.FileUtils.isOwnerOfFileHierarchy(FileUtils.java:527)
 ~[hive-common-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.ranger.authorization.hive.authorizer.RangerHiveAuthorizer.isURIAccessAllowed(RangerHiveAuthorizer.java:1420)
 ~[?:?]
    at 
org.apache.ranger.authorization.hive.authorizer.RangerHiveAuthorizer.checkPrivileges(RangerHiveAuthorizer.java:287)
 ~[?:?]
    at org.apache.hadoop.hive.ql.Driver.doAuthorizationV2(Driver.java:1336) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.ql.Driver.doAuthorization(Driver.java:1100) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.ql.Driver.compile(Driver.java:709) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.ql.Driver.compileInternal(Driver.java:1869) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1816) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1811) 
~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hadoop.hive.ql.reexec.ReExecDriver.compileAndRespond(ReExecDriver.java:126)
 ~[hive-exec-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.operation.SQLOperation.prepare(SQLOperation.java:197)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.operation.SQLOperation.runInternal(SQLOperation.java:262)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at org.apache.hive.service.cli.operation.Operation.run(Operation.java:247) 
~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.session.HiveSessionImpl.executeStatementInternal(HiveSessionImpl.java:575)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.session.HiveSessionImpl.executeStatementAsync(HiveSessionImpl.java:561)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at sun.reflect.GeneratedMethodAccessor148.invoke(Unknown Source) ~[?:?]
    at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.8.0_171]
    at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_171]
    at 
org.apache.hive.service.cli.session.HiveSessionProxy.invoke(HiveSessionProxy.java:78)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.session.HiveSessionProxy.access$000(HiveSessionProxy.java:36)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at 
org.apache.hive.service.cli.session.HiveSessionProxy$1.run(HiveSessionProxy.java:63)
 ~[hive-service-3.1.0.3.1.0.0-78.jar:3.1.0.3.1.0.0-78]
    at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_171]
    at javax.security.auth.Subject.doAs(Subject.java:422) ~[?:1.8.0_171]
{code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to