[jira] [Closed] (DRILL-7615) UNION ALL query returns the wrong result for the decimal value

2020-04-06 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7615?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov closed DRILL-7615.


> UNION ALL query returns the wrong result for the decimal value
> --
>
> Key: DRILL-7615
> URL: https://issues.apache.org/jira/browse/DRILL-7615
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.14.0
>Reporter: Vova Vysotskyi
>Assignee: Vova Vysotskyi
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> The following query:
> {code:java}
> select cast(1000 as decimal(10,1)) 
> union all 
> select 596.000 
> {code}
> returns incorrect result:
> {code:java}
> 10.000
> 596.000
> {code}
> The expected result is 1000.000 for the first record.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (DRILL-7615) UNION ALL query returns the wrong result for the decimal value

2020-04-06 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7615?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17076324#comment-17076324
 ] 

Dmytro Kondriukov commented on DRILL-7615:
--

fixed. 
verified in commit id 3b3c4af39fdc26f255cc17d66c55eb7565552a7d

> UNION ALL query returns the wrong result for the decimal value
> --
>
> Key: DRILL-7615
> URL: https://issues.apache.org/jira/browse/DRILL-7615
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.14.0
>Reporter: Vova Vysotskyi
>Assignee: Vova Vysotskyi
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> The following query:
> {code:java}
> select cast(1000 as decimal(10,1)) 
> union all 
> select 596.000 
> {code}
> returns incorrect result:
> {code:java}
> 10.000
> 596.000
> {code}
> The expected result is 1000.000 for the first record.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Closed] (DRILL-7648) Scrypt j_security_check works without security headers

2020-03-24 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7648?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov closed DRILL-7648.


verified. fixed

> Scrypt j_security_check works without security headers 
> ---
>
> Key: DRILL-7648
> URL: https://issues.apache.org/jira/browse/DRILL-7648
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Dmytro Kondriukov
>Assignee: Igor Guzenko
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> *Preconditions:*
> drill-override.conf
> {noformat}
> drill.exec: {
>   cluster-id: "drillbits1",
>   zk.connect: "localhost:5181"
>   impersonation: {
> enabled: true,
> max_chained_user_hops: 3
> },
> security: {
> auth.mechanisms : ["PLAIN"],
> },
> security.user.auth: {
> enabled: true,
> packages += "org.apache.drill.exec.rpc.user.security",
> impl: "pam4j",
> pam_profiles: [ "sudo", "login" ]
> }
>   http: {
> ssl_enabled: true,.
> jetty.server.response.headers: {
>   "X-XSS-Protection": "1; mode=block",
>   "X-Content-Type-Options": "nosniff",
>   "Strict-Transport-Security": "max-age=31536000;includeSubDomains",
>   "Content-Security-Policy": "default-src https:; script-src 
> 'unsafe-inline' https:; style-src 'unsafe-inline' https:; font-src data: 
> https:; img-src data: https:"
> }
>   }
> }
> {noformat}
> *Steps:*
> 1. Perform login to drillbit webUI
> 2. Check in browser console in tab "network" headers of resource 
> https://node1.cluster.com:8047/j_security_check
> 3. Check section "response headers"
> *Expected result:* security headers are present
> *Actual result:* security headers are absent
> 4. Check section "Form Data"
> *Expected result:* parameter "j_password" content is hidden
> *Actual result:* parameter "j_password" content is visible



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (DRILL-7648) Scrypt j_security_check works without security headers

2020-03-24 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7648?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17066026#comment-17066026
 ] 

Dmytro Kondriukov commented on DRILL-7648:
--

tested on
apache-drill-1.18.0-SNAPSHOT commit 3b3c4af39fdc26f255cc17d66c55eb7565552a7d
fixed
security headers are added

> Scrypt j_security_check works without security headers 
> ---
>
> Key: DRILL-7648
> URL: https://issues.apache.org/jira/browse/DRILL-7648
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Dmytro Kondriukov
>Assignee: Igor Guzenko
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> *Preconditions:*
> drill-override.conf
> {noformat}
> drill.exec: {
>   cluster-id: "drillbits1",
>   zk.connect: "localhost:5181"
>   impersonation: {
> enabled: true,
> max_chained_user_hops: 3
> },
> security: {
> auth.mechanisms : ["PLAIN"],
> },
> security.user.auth: {
> enabled: true,
> packages += "org.apache.drill.exec.rpc.user.security",
> impl: "pam4j",
> pam_profiles: [ "sudo", "login" ]
> }
>   http: {
> ssl_enabled: true,.
> jetty.server.response.headers: {
>   "X-XSS-Protection": "1; mode=block",
>   "X-Content-Type-Options": "nosniff",
>   "Strict-Transport-Security": "max-age=31536000;includeSubDomains",
>   "Content-Security-Policy": "default-src https:; script-src 
> 'unsafe-inline' https:; style-src 'unsafe-inline' https:; font-src data: 
> https:; img-src data: https:"
> }
>   }
> }
> {noformat}
> *Steps:*
> 1. Perform login to drillbit webUI
> 2. Check in browser console in tab "network" headers of resource 
> https://node1.cluster.com:8047/j_security_check
> 3. Check section "response headers"
> *Expected result:* security headers are present
> *Actual result:* security headers are absent
> 4. Check section "Form Data"
> *Expected result:* parameter "j_password" content is hidden
> *Actual result:* parameter "j_password" content is visible



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Closed] (DRILL-7626) Add ability to set HTTP response headers

2020-03-23 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7626?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov closed DRILL-7626.


> Add ability to set HTTP response headers
> 
>
> Key: DRILL-7626
> URL: https://issues.apache.org/jira/browse/DRILL-7626
> Project: Apache Drill
>  Issue Type: Sub-task
>Reporter: Igor Guzenko
>Assignee: Igor Guzenko
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> It should be possible to make response headers configurable under common 
> options path
> *drill.exec.http.jetty.server.response.headers*, like
> {code:none}
> jetty: {
>   server: {
> response: {
>   # any response headers with constant values may be configured like 
> this
>   headers: {
> "Custom Header Name": "Text Value",
> "BooleanHeader": true
>   }
> }
>   }
> }
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (DRILL-7626) Add ability to set HTTP response headers

2020-03-18 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7626?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17061868#comment-17061868
 ] 

Dmytro Kondriukov commented on DRILL-7626:
--

*Verified*

Test presence Response Headers:
* Content-Security-Policy: default-src https:; script-src 'unsafe-inline' 
https:; style-src 'unsafe-inline' https:; font-src data: https:; img-src data: 
https:
* Strict-Transport-Security: max-age=31536000;includeSubDomains
* X-Content-Type-Options: nosniff
* X-XSS-Protection: 1; mode=block

Check resources on pages:
* Login page
* Landing page
* /query
* /storage
* /metrics
* /threads
* /logs
* /options
* /logout

Test on:
Drill 1.18.0-SNAPSHOT commit 2f8dcb62f65a81510385173757bd33a93789d95a

found bug: DRILL-7648

> Add ability to set HTTP response headers
> 
>
> Key: DRILL-7626
> URL: https://issues.apache.org/jira/browse/DRILL-7626
> Project: Apache Drill
>  Issue Type: Sub-task
>Reporter: Igor Guzenko
>Assignee: Igor Guzenko
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> It should be possible to make response headers configurable under common 
> options path
> *drill.exec.http.jetty.server.response.headers*, like
> {code:none}
> jetty: {
>   server: {
> response: {
>   # any response headers with constant values may be configured like 
> this
>   headers: {
> "Custom Header Name": "Text Value",
> "BooleanHeader": true
>   }
> }
>   }
> }
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Resolved] (DRILL-7646) Resources types: *.ttf and data:image/gif received without response headers

2020-03-18 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7646?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov resolved DRILL-7646.
--
Resolution: Not A Bug

those resources taken from browser cache, not send by server.
not a bug

> Resources types: *.ttf and data:image/gif received without response headers
> ---
>
> Key: DRILL-7646
> URL: https://issues.apache.org/jira/browse/DRILL-7646
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Dmytro Kondriukov
>Priority: Major
>
> *Preconditions:*
> drill-override.conf
> {noformat}
> drill.exec: {
>   cluster-id: "drillbits1",
>   zk.connect: "localhost:5181"
>   impersonation: {
> enabled: true,
> max_chained_user_hops: 3
> },
> security: {
> auth.mechanisms : ["PLAIN"],
> },
> security.user.auth: {
> enabled: true,
> packages += "org.apache.drill.exec.rpc.user.security",
> impl: "pam4j",
> pam_profiles: [ "sudo", "login" ]
> }
>   http: {
> ssl_enabled: true,.
> jetty.server.response.headers: {
>   "X-XSS-Protection": "1; mode=block",
>   "X-Content-Type-Options": "nosniff",
>   "Strict-Transport-Security": "max-age=31536000;includeSubDomains",
>   "Content-Security-Policy": "default-src https:; script-src 
> 'unsafe-inline' https:; style-src 'unsafe-inline' https:; font-src data: 
> https:; img-src data: https:"
> }
>   }
> }
> {noformat}
> Steps:
> # Open in Browser console tab "network"
> # Inspect web resources for presence response headers:
> * X-XSS-Protection
> * X-Content-Type-Options
> * Strict-Transport-Security
> * Content-Security-Policy
> *Expected result:* all resources are having tested headers
> *Actual result:* Drillbit Web-IU send *.ttf and data:image/gif without 
> response header
> and some *.woff resources when user performed logout.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Created] (DRILL-7648) Scrypt j_security_check works without security headers

2020-03-17 Thread Dmytro Kondriukov (Jira)
Dmytro Kondriukov created DRILL-7648:


 Summary: Scrypt j_security_check works without security headers 
 Key: DRILL-7648
 URL: https://issues.apache.org/jira/browse/DRILL-7648
 Project: Apache Drill
  Issue Type: Bug
Reporter: Dmytro Kondriukov


*Preconditions:*
drill-override.conf


{noformat}
drill.exec: {
  cluster-id: "drillbits1",
  zk.connect: "localhost:5181"
  impersonation: {
enabled: true,
max_chained_user_hops: 3
},
security: {
auth.mechanisms : ["PLAIN"],
},
security.user.auth: {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam4j",
pam_profiles: [ "sudo", "login" ]
}
  http: {
ssl_enabled: true,.
jetty.server.response.headers: {
  "X-XSS-Protection": "1; mode=block",
  "X-Content-Type-Options": "nosniff",
  "Strict-Transport-Security": "max-age=31536000;includeSubDomains",
  "Content-Security-Policy": "default-src https:; script-src 
'unsafe-inline' https:; style-src 'unsafe-inline' https:; font-src data: 
https:; img-src data: https:"
}
  }
}
{noformat}


*Steps:*
1. Perform login to drillbit webUI
2. Check in browser console in tab "network" headers of resource 
https://node1.cluster.com:8047/j_security_check
3. Check section "response headers"
*Expected result:* security headers are present
*Actual result:* security headers are absent

4. Check section "Form Data"
*Expected result:* parameter "j_password" content is hidden
*Actual result:* parameter "j_password" content is visible



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Created] (DRILL-7646) Resources types: *.ttf and data:image/gif received without response headers

2020-03-17 Thread Dmytro Kondriukov (Jira)
Dmytro Kondriukov created DRILL-7646:


 Summary: Resources types: *.ttf and data:image/gif received 
without response headers
 Key: DRILL-7646
 URL: https://issues.apache.org/jira/browse/DRILL-7646
 Project: Apache Drill
  Issue Type: Bug
Affects Versions: 1.17.0
Reporter: Dmytro Kondriukov


*Preconditions:*
drill-override.conf

{noformat}
drill.exec: {
  cluster-id: "drillbits1",
  zk.connect: "localhost:5181"
  impersonation: {
enabled: true,
max_chained_user_hops: 3
},
security: {
auth.mechanisms : ["PLAIN"],
},
security.user.auth: {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam4j",
pam_profiles: [ "sudo", "login" ]
}
  http: {
ssl_enabled: true,.
jetty.server.response.headers: {
  "X-XSS-Protection": "1; mode=block",
  "X-Content-Type-Options": "nosniff",
  "Strict-Transport-Security": "max-age=31536000;includeSubDomains",
  "Content-Security-Policy": "default-src https:; script-src 
'unsafe-inline' https:; style-src 'unsafe-inline' https:; font-src data: 
https:; img-src data: https:"
}
  }
}
{noformat}


Steps:

# Open in Browser console tab "network"
# Inspect web resources for presence response headers:
* X-XSS-Protection
* X-Content-Type-Options
* Strict-Transport-Security
* Content-Security-Policy

*Expected result:* all resources are having tested headers
*Actual result:* Drillbit Web-IU send *.ttf and data:image/gif without response 
header
and some *.woff resources when user performed logout.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (DRILL-7638) Cannot login to Drill Web Console, if go to it from YARN Application Master Web-UI

2020-03-11 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7638?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov updated DRILL-7638:
-
Description: 
*Preconditions:*
 # drill-on-yarn.conf:
{noformat}
connection: "maprfs:///"
app-dir: "/users/drill"
auth-type: "drill"
{noformat}
 # drill-override.conf:
{noformat}
drill.exec: {
  cluster-id: "drillbits1",
  zk.connect: "localhost:5181"
  impersonation: {
enabled: true,
max_chained_user_hops: 3
},
security: {
auth.mechanisms : ["PLAIN"],
},
security.user.auth: {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam4j",
pam_profiles: [ "sudo", "login" ]
}
}
{noformat}
 # Start drill on yarn
{noformat}
./bin/drill-on-yarn.sh start --site 
{noformat}

 
 *Steps to reproduce:*
 # Open  Drill-on-YARN Web-UI
 # Login
 # Go to "drillbits" page
 # Click on available host of drillbit
 # Log In to Drill Web Console
 # Click on page "Query"

 

*Expected result:* opened page "Query"
 *Actual result:*  user is not logged in
Also unwanted parameters were added to the URL:
 * mainLogin?redirect=%2Fquery
 * ;jsessionid=1b80pye4814gy56gqdz02jtkg

 

  was:
*Preconditions:*
 # drill-on-yarn.conf:
{noformat}
connection: "maprfs:///"
app-dir: "/users/drill"
auth-type: "drill"
{noformat}

 # drill-override.conf:
{noformat}
drill.exec: {
  cluster-id: "drillbits1",
  zk.connect: "localhost:5181"
  impersonation: {
enabled: true,
max_chained_user_hops: 3
},
security: {
auth.mechanisms : ["PLAIN"],
},
security.user.auth: {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam4j",
pam_profiles: [ "sudo", "login" ]
}
}
{noformat}

 # Start drill on yarn
{noformat}
./bin/drill-on-yarn.sh start --site 
{noformat}

 
 *Steps to reproduce:*
 # Open  Drill-on-YARN Web-UI
 # Login
 # Go to "drillbits" page
 # Click on available host of drillbit
 # Log In to Drill Web Console
 # Click on page "Query"

 

*Expected result:* opened page "Query"
 *Actual result:*  user is not logged in
Also unwanted parameters were added to the URL:
 * mainLogin?redirect=%2Fquery
 * ;jsessionid=1b80pye4814gy56gqdz02jtkg

 


> Cannot login to Drill Web Console, if go to it from YARN Application Master 
> Web-UI
> --
>
> Key: DRILL-7638
> URL: https://issues.apache.org/jira/browse/DRILL-7638
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Dmytro Kondriukov
>Priority: Major
>
> *Preconditions:*
>  # drill-on-yarn.conf:
> {noformat}
> connection: "maprfs:///"
> app-dir: "/users/drill"
> auth-type: "drill"
> {noformat}
>  # drill-override.conf:
> {noformat}
> drill.exec: {
>   cluster-id: "drillbits1",
>   zk.connect: "localhost:5181"
>   impersonation: {
> enabled: true,
> max_chained_user_hops: 3
> },
> security: {
> auth.mechanisms : ["PLAIN"],
> },
> security.user.auth: {
> enabled: true,
> packages += "org.apache.drill.exec.rpc.user.security",
> impl: "pam4j",
> pam_profiles: [ "sudo", "login" ]
> }
> }
> {noformat}
>  # Start drill on yarn
> {noformat}
> ./bin/drill-on-yarn.sh start --site 
> {noformat}
>  
>  *Steps to reproduce:*
>  # Open  Drill-on-YARN Web-UI
>  # Login
>  # Go to "drillbits" page
>  # Click on available host of drillbit
>  # Log In to Drill Web Console
>  # Click on page "Query"
>  
> *Expected result:* opened page "Query"
>  *Actual result:*  user is not logged in
> Also unwanted parameters were added to the URL:
>  * mainLogin?redirect=%2Fquery
>  * ;jsessionid=1b80pye4814gy56gqdz02jtkg
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Created] (DRILL-7638) Cannot login to Drill Web Console, if go to it from YARN Application Master Web-UI

2020-03-11 Thread Dmytro Kondriukov (Jira)
Dmytro Kondriukov created DRILL-7638:


 Summary: Cannot login to Drill Web Console, if go to it from YARN 
Application Master Web-UI
 Key: DRILL-7638
 URL: https://issues.apache.org/jira/browse/DRILL-7638
 Project: Apache Drill
  Issue Type: Bug
Affects Versions: 1.17.0
Reporter: Dmytro Kondriukov


*Preconditions:*
 # drill-on-yarn.conf:
{noformat}
connection: "maprfs:///"
app-dir: "/users/drill"
auth-type: "drill"
{noformat}

 # drill-override.conf:
{noformat}
drill.exec: {
  cluster-id: "drillbits1",
  zk.connect: "localhost:5181"
  impersonation: {
enabled: true,
max_chained_user_hops: 3
},
security: {
auth.mechanisms : ["PLAIN"],
},
security.user.auth: {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam4j",
pam_profiles: [ "sudo", "login" ]
}
}
{noformat}

 # Start drill on yarn
{noformat}
./bin/drill-on-yarn.sh start --site 
{noformat}

 
 *Steps to reproduce:*
 # Open  Drill-on-YARN Web-UI
 # Login
 # Go to "drillbits" page
 # Click on available host of drillbit
 # Log In to Drill Web Console
 # Click on page "Query"

 

*Expected result:* opened page "Query"
 *Actual result:*  user is not logged in
Also unwanted parameters were added to the URL:
 * mainLogin?redirect=%2Fquery
 * ;jsessionid=1b80pye4814gy56gqdz02jtkg

 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (DRILL-7624) When Hive plugin is enabled with default config, cannot execute any SQL query

2020-03-05 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17051961#comment-17051961
 ] 

Dmytro Kondriukov commented on DRILL-7624:
--

default config of "s3" plugin:

 
{noformat}
{
  "type": "file",
  "connection": "s3a://my.bucket.location.com",
  "config": {
"fs.s3a.access.key": "ID",
"fs.s3a.secret.key": "SECRET"
  },
  "workspaces": {
"tmp": {
  "location": "/tmp",
  "writable": true,
  "defaultInputFormat": null,
  "allowAccessOutsideWorkspace": false
},
"root": {
  "location": "/",
  "writable": false,
  "defaultInputFormat": null,
  "allowAccessOutsideWorkspace": false
}
  },
  "formats": {
"psv": {
  "type": "text",
  "extensions": [
"tbl"
  ],
  "delimiter": "|"
},
"csv": {
  "type": "text",
  "extensions": [
"csv"
  ],
  "delimiter": ","
},
"tsv": {
  "type": "text",
  "extensions": [
"tsv"
  ],
  "delimiter": "\t"
},
"parquet": {
  "type": "parquet"
},
"json": {
  "type": "json",
  "extensions": [
"json"
  ]
},
"avro": {
  "type": "avro"
},
"sequencefile": {
  "type": "sequencefile",
  "extensions": [
"seq"
  ]
},
"csvh": {
  "type": "text",
  "extensions": [
"csvh"
  ],
  "extractHeader": true,
  "delimiter": ","
},
"excel": {
  "type": "excel"
},
"shp": {
  "type": "shp"
},
"syslog": {
  "type": "syslog",
  "extensions": [
"syslog"
  ]
},
"ltsv": {
  "type": "ltsv",
  "extensions": [
"ltsv"
  ]
},
"hdf5": {
  "type": "hdf5",
  "extensions": [
"h5"
  ],
  "defaultPath": null
}
  },
  "enabled": false
}
{noformat}


> When Hive plugin is enabled with default config, cannot execute any SQL query
> -
>
> Key: DRILL-7624
> URL: https://issues.apache.org/jira/browse/DRILL-7624
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.18.0
>Reporter: Dmytro Kondriukov
>Assignee: Paul Rogers
>Priority: Major
>
> *Preconditions:*
> Enable "hive" plugin, without editing configuration (default config)
> *Steps:*
>  Run any valid query:
> {code:sql}
> SELECT 100; 
> {code}
>  *Expected result:* The query should be successfully executed.
> *Actual result:*  "UserRemoteException : INTERNAL_ERROR ERROR: Failure 
> setting up Hive metastore client." 
> {noformat}
> org.apache.drill.common.exceptions.UserRemoteException: INTERNAL_ERROR ERROR: 
> Failure setting up Hive metastore client. 
> Plugin name hive 
> Plugin class org.apache.drill.exec.store.hive.HiveStoragePlugin 
> Please, refer to logs for more information. 
> [Error Id: db44f5c3-5136-4fc6-8158-50b63d775fe0 ]
> {noformat}
>  
> {noformat}
>   (org.apache.drill.common.exceptions.ExecutionSetupException) Failure 
> setting up Hive metastore client.
> org.apache.drill.exec.store.hive.schema.HiveSchemaFactory.():78
> org.apache.drill.exec.store.hive.HiveStoragePlugin.():77
> sun.reflect.NativeConstructorAccessorImpl.newInstance0():-2
> sun.reflect.NativeConstructorAccessorImpl.newInstance():62
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance():45
> java.lang.reflect.Constructor.newInstance():423
> org.apache.drill.exec.store.ClassicConnectorLocator.create():274
> org.apache.drill.exec.store.ConnectorHandle.newInstance():98
> org.apache.drill.exec.store.PluginHandle.plugin():143
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():616
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():601
> org.apache.drill.exec.planner.sql.handlers.SqlHandlerConfig.getRules():48
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():367
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():351
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():338
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.convertToRel():663
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.validateAndConvert():198
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.getPlan():169
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getQueryPlan():283
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPhysicalPlan():163
> org.apache.drill.exec.planner.sql.DrillSqlWorker.convertPlan():140
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPlan():93
> org.apache.drill.exec.work.foreman.Foreman.runSQL():590
> org.apache.drill.exec.work.foreman.Foreman.run():275
>

[jira] [Commented] (DRILL-7624) When Hive plugin is enabled with default config, cannot execute any SQL query

2020-03-05 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17051960#comment-17051960
 ] 

Dmytro Kondriukov commented on DRILL-7624:
--

Also I checked the similar issue if enabled  “s3” plugin too.

With default config, without any editing. 

 

 

> When Hive plugin is enabled with default config, cannot execute any SQL query
> -
>
> Key: DRILL-7624
> URL: https://issues.apache.org/jira/browse/DRILL-7624
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.18.0
>Reporter: Dmytro Kondriukov
>Assignee: Paul Rogers
>Priority: Major
>
> *Preconditions:*
> Enable "hive" plugin, without editing configuration (default config)
> *Steps:*
>  Run any valid query:
> {code:sql}
> SELECT 100; 
> {code}
>  *Expected result:* The query should be successfully executed.
> *Actual result:*  "UserRemoteException : INTERNAL_ERROR ERROR: Failure 
> setting up Hive metastore client." 
> {noformat}
> org.apache.drill.common.exceptions.UserRemoteException: INTERNAL_ERROR ERROR: 
> Failure setting up Hive metastore client. 
> Plugin name hive 
> Plugin class org.apache.drill.exec.store.hive.HiveStoragePlugin 
> Please, refer to logs for more information. 
> [Error Id: db44f5c3-5136-4fc6-8158-50b63d775fe0 ]
> {noformat}
>  
> {noformat}
>   (org.apache.drill.common.exceptions.ExecutionSetupException) Failure 
> setting up Hive metastore client.
> org.apache.drill.exec.store.hive.schema.HiveSchemaFactory.():78
> org.apache.drill.exec.store.hive.HiveStoragePlugin.():77
> sun.reflect.NativeConstructorAccessorImpl.newInstance0():-2
> sun.reflect.NativeConstructorAccessorImpl.newInstance():62
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance():45
> java.lang.reflect.Constructor.newInstance():423
> org.apache.drill.exec.store.ClassicConnectorLocator.create():274
> org.apache.drill.exec.store.ConnectorHandle.newInstance():98
> org.apache.drill.exec.store.PluginHandle.plugin():143
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():616
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():601
> org.apache.drill.exec.planner.sql.handlers.SqlHandlerConfig.getRules():48
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():367
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():351
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():338
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.convertToRel():663
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.validateAndConvert():198
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.getPlan():169
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getQueryPlan():283
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPhysicalPlan():163
> org.apache.drill.exec.planner.sql.DrillSqlWorker.convertPlan():140
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPlan():93
> org.apache.drill.exec.work.foreman.Foreman.runSQL():590
> org.apache.drill.exec.work.foreman.Foreman.run():275
> java.util.concurrent.ThreadPoolExecutor.runWorker():1149
> java.util.concurrent.ThreadPoolExecutor$Worker.run():624
> java.lang.Thread.run():748
>   Caused By (org.apache.hadoop.hive.metastore.api.MetaException) Unable to 
> open a test connection to the given database. JDBC url = 
> jdbc:derby:;databaseName=../sample-data/drill_hive_db;create=true, username = 
> APP. Terminating connection pool (set lazyInit to true if you expect to start 
> your database after your app). Original Exception: --
> java.sql.SQLException: Failed to create database 
> '../sample-data/drill_hive_db', see the next exception for details.
>   at 
> org.apache.derby.impl.jdbc.SQLExceptionFactory40.getSQLException(Unknown 
> Source)
>   at org.apache.derby.impl.jdbc.Util.newEmbedSQLException(Unknown Source)
>   at org.apache.derby.impl.jdbc.Util.seeNextException(Unknown Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection.createDatabase(Unknown 
> Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection.(Unknown Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection40.(Unknown Source)
>   at org.apache.derby.jdbc.Driver40.getNewEmbedConnection(Unknown Source)
>   at org.apache.derby.jdbc.InternalDriver.connect(Unknown Source)
>   at org.apache.derby.jdbc.Driver20.connect(Unknown Source)
>   at org.apache.derby.jdbc.AutoloadedDriver.connect(Unknown Source)
>   at java.sql.DriverManager.getConnection(DriverManager.java:664)
>   at java.sql.DriverManager.getConnection(DriverManager.java:208)
>   at 

[jira] [Commented] (DRILL-7624) When Hive plugin is enabled with default config, cannot execute any SQL query

2020-03-05 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17051925#comment-17051925
 ] 

Dmytro Kondriukov commented on DRILL-7624:
--

[~Paul.Rogers]

maybe this steps for case will be helpful:
 # start Drillbit
 # open webUI
 # open page "Storage"
 # do enable "hive" plugin, without editing configuration
 # open page "Query"
 # try to submit any valid SQL query

> When Hive plugin is enabled with default config, cannot execute any SQL query
> -
>
> Key: DRILL-7624
> URL: https://issues.apache.org/jira/browse/DRILL-7624
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.18.0
>Reporter: Dmytro Kondriukov
>Assignee: Paul Rogers
>Priority: Major
>
> *Preconditions:*
> Enable "hive" plugin, without editing configuration (default config)
> *Steps:*
>  Run any valid query:
> {code:sql}
> SELECT 100; 
> {code}
>  *Expected result:* The query should be successfully executed.
> *Actual result:*  "UserRemoteException : INTERNAL_ERROR ERROR: Failure 
> setting up Hive metastore client." 
> {noformat}
> org.apache.drill.common.exceptions.UserRemoteException: INTERNAL_ERROR ERROR: 
> Failure setting up Hive metastore client. 
> Plugin name hive 
> Plugin class org.apache.drill.exec.store.hive.HiveStoragePlugin 
> Please, refer to logs for more information. 
> [Error Id: db44f5c3-5136-4fc6-8158-50b63d775fe0 ]
> {noformat}
>  
> {noformat}
>   (org.apache.drill.common.exceptions.ExecutionSetupException) Failure 
> setting up Hive metastore client.
> org.apache.drill.exec.store.hive.schema.HiveSchemaFactory.():78
> org.apache.drill.exec.store.hive.HiveStoragePlugin.():77
> sun.reflect.NativeConstructorAccessorImpl.newInstance0():-2
> sun.reflect.NativeConstructorAccessorImpl.newInstance():62
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance():45
> java.lang.reflect.Constructor.newInstance():423
> org.apache.drill.exec.store.ClassicConnectorLocator.create():274
> org.apache.drill.exec.store.ConnectorHandle.newInstance():98
> org.apache.drill.exec.store.PluginHandle.plugin():143
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():616
> 
> org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():601
> org.apache.drill.exec.planner.sql.handlers.SqlHandlerConfig.getRules():48
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():367
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():351
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():338
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.convertToRel():663
> 
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.validateAndConvert():198
> org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.getPlan():169
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getQueryPlan():283
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPhysicalPlan():163
> org.apache.drill.exec.planner.sql.DrillSqlWorker.convertPlan():140
> org.apache.drill.exec.planner.sql.DrillSqlWorker.getPlan():93
> org.apache.drill.exec.work.foreman.Foreman.runSQL():590
> org.apache.drill.exec.work.foreman.Foreman.run():275
> java.util.concurrent.ThreadPoolExecutor.runWorker():1149
> java.util.concurrent.ThreadPoolExecutor$Worker.run():624
> java.lang.Thread.run():748
>   Caused By (org.apache.hadoop.hive.metastore.api.MetaException) Unable to 
> open a test connection to the given database. JDBC url = 
> jdbc:derby:;databaseName=../sample-data/drill_hive_db;create=true, username = 
> APP. Terminating connection pool (set lazyInit to true if you expect to start 
> your database after your app). Original Exception: --
> java.sql.SQLException: Failed to create database 
> '../sample-data/drill_hive_db', see the next exception for details.
>   at 
> org.apache.derby.impl.jdbc.SQLExceptionFactory40.getSQLException(Unknown 
> Source)
>   at org.apache.derby.impl.jdbc.Util.newEmbedSQLException(Unknown Source)
>   at org.apache.derby.impl.jdbc.Util.seeNextException(Unknown Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection.createDatabase(Unknown 
> Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection.(Unknown Source)
>   at org.apache.derby.impl.jdbc.EmbedConnection40.(Unknown Source)
>   at org.apache.derby.jdbc.Driver40.getNewEmbedConnection(Unknown Source)
>   at org.apache.derby.jdbc.InternalDriver.connect(Unknown Source)
>   at org.apache.derby.jdbc.Driver20.connect(Unknown Source)
>   at org.apache.derby.jdbc.AutoloadedDriver.connect(Unknown Source)
>   at 

[jira] [Created] (DRILL-7624) when enabled Hive plugin with default config, can not execute any SQL query

2020-03-04 Thread Dmytro Kondriukov (Jira)
Dmytro Kondriukov created DRILL-7624:


 Summary: when enabled Hive plugin with default config, can not 
execute any SQL query
 Key: DRILL-7624
 URL: https://issues.apache.org/jira/browse/DRILL-7624
 Project: Apache Drill
  Issue Type: Bug
Affects Versions: 1.18.0
Reporter: Dmytro Kondriukov


*Preconditions:*

Enable "hive" plugin, without editing configuration (default config)

*Steps:*
 Run any valid query.
{code:sql}
SELECT 100; 
{code}
 *Expected result:* success executed SQL query 

*Actual result:*  "UserRemoteException : INTERNAL_ERROR ERROR: Failure setting 
up Hive metastore client." 
{noformat}
org.apache.drill.common.exceptions.UserRemoteException: INTERNAL_ERROR ERROR: 
Failure setting up Hive metastore client. 

Plugin name hive 
Plugin class org.apache.drill.exec.store.hive.HiveStoragePlugin 

Please, refer to logs for more information. 

[Error Id: db44f5c3-5136-4fc6-8158-50b63d775fe0 ]
{noformat}
 
{noformat}
  (org.apache.drill.common.exceptions.ExecutionSetupException) Failure setting 
up Hive metastore client.
org.apache.drill.exec.store.hive.schema.HiveSchemaFactory.():78
org.apache.drill.exec.store.hive.HiveStoragePlugin.():77
sun.reflect.NativeConstructorAccessorImpl.newInstance0():-2
sun.reflect.NativeConstructorAccessorImpl.newInstance():62
sun.reflect.DelegatingConstructorAccessorImpl.newInstance():45
java.lang.reflect.Constructor.newInstance():423
org.apache.drill.exec.store.ClassicConnectorLocator.create():274
org.apache.drill.exec.store.ConnectorHandle.newInstance():98
org.apache.drill.exec.store.PluginHandle.plugin():143

org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():616

org.apache.drill.exec.store.StoragePluginRegistryImpl$PluginIterator.next():601
org.apache.drill.exec.planner.sql.handlers.SqlHandlerConfig.getRules():48
org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():367
org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():351
org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.transform():338

org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.convertToRel():663

org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.validateAndConvert():198
org.apache.drill.exec.planner.sql.handlers.DefaultSqlHandler.getPlan():169
org.apache.drill.exec.planner.sql.DrillSqlWorker.getQueryPlan():283
org.apache.drill.exec.planner.sql.DrillSqlWorker.getPhysicalPlan():163
org.apache.drill.exec.planner.sql.DrillSqlWorker.convertPlan():140
org.apache.drill.exec.planner.sql.DrillSqlWorker.getPlan():93
org.apache.drill.exec.work.foreman.Foreman.runSQL():590
org.apache.drill.exec.work.foreman.Foreman.run():275
java.util.concurrent.ThreadPoolExecutor.runWorker():1149
java.util.concurrent.ThreadPoolExecutor$Worker.run():624
java.lang.Thread.run():748
  Caused By (org.apache.hadoop.hive.metastore.api.MetaException) Unable to open 
a test connection to the given database. JDBC url = 
jdbc:derby:;databaseName=../sample-data/drill_hive_db;create=true, username = 
APP. Terminating connection pool (set lazyInit to true if you expect to start 
your database after your app). Original Exception: --
java.sql.SQLException: Failed to create database 
'../sample-data/drill_hive_db', see the next exception for details.
at 
org.apache.derby.impl.jdbc.SQLExceptionFactory40.getSQLException(Unknown Source)
at org.apache.derby.impl.jdbc.Util.newEmbedSQLException(Unknown Source)
at org.apache.derby.impl.jdbc.Util.seeNextException(Unknown Source)
at org.apache.derby.impl.jdbc.EmbedConnection.createDatabase(Unknown 
Source)
at org.apache.derby.impl.jdbc.EmbedConnection.(Unknown Source)
at org.apache.derby.impl.jdbc.EmbedConnection40.(Unknown Source)
at org.apache.derby.jdbc.Driver40.getNewEmbedConnection(Unknown Source)
at org.apache.derby.jdbc.InternalDriver.connect(Unknown Source)
at org.apache.derby.jdbc.Driver20.connect(Unknown Source)
at org.apache.derby.jdbc.AutoloadedDriver.connect(Unknown Source)
at java.sql.DriverManager.getConnection(DriverManager.java:664)
at java.sql.DriverManager.getConnection(DriverManager.java:208)
at com.jolbox.bonecp.BoneCP.obtainRawInternalConnection(BoneCP.java:361)
at com.jolbox.bonecp.BoneCP.(BoneCP.java:416)
at 
com.jolbox.bonecp.BoneCPDataSource.getConnection(BoneCPDataSource.java:120)
at 
org.datanucleus.store.rdbms.ConnectionFactoryImpl$ManagedConnectionImpl.getConnection(ConnectionFactoryImpl.java:483)
at 
org.datanucleus.store.rdbms.RDBMSStoreManager.(RDBMSStoreManager.java:297)
at sun.reflect.GeneratedConstructorAccessor111.newInstance(Unknown 
Source)
at 

[jira] [Closed] (DRILL-7549) Fix validation error when querying absent sub folder in embedded mode

2020-02-26 Thread Dmytro Kondriukov (Jira)


 [ 
https://issues.apache.org/jira/browse/DRILL-7549?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dmytro Kondriukov closed DRILL-7549.


> Fix validation error when querying absent sub folder in embedded mode
> -
>
> Key: DRILL-7549
> URL: https://issues.apache.org/jira/browse/DRILL-7549
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Arina Ielchiieva
>Assignee: Arina Ielchiieva
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> {noformat}
> apache drill> select * from dfs.tmp.`abc.parquet`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 17: Object 
> 'abc.parquet' not found within 'dfs.tmp'
> [Error Id: 0dad391e-ea4d-4d13-95e7-218dec865ad2 ] (state=,code=0)
> apache drill> select * from dfs.tmp.`abc/abc`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 17: Object 
> 'abc/abc' not found within 'dfs.tmp'
> [Error Id: 94ea83c7-4983-4958-8a82-eea49b58d4ed ] (state=,code=0)
> apache drill> use dfs.tmp;
> +--+-+
> |  ok  |   summary   |
> +--+-+
> | true | Default schema changed to [dfs.tmp] |
> +--+-+
> 1 row selected (0.277 seconds)
> apache drill (dfs.tmp)> select * from `abc.parquet`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 27: Object 
> 'abc.parquet' not found
> [Error Id: d814df53-2a94-46da-81e5-f49a3d50a665 ] (state=,code=0)
> apache drill (dfs.tmp)> select * from `abc/abc`;
> Error: VALIDATION ERROR: null
> [Error Id: 6c11d397-f893-4ef6-9832-4a96a2029f7d ] (state=,code=0)
> {noformat}
> Full error:
> {noformat}
> Caused by: java.lang.IllegalArgumentException: 
>   at 
> org.apache.drill.shaded.guava.com.google.common.base.Preconditions.checkArgument(Preconditions.java:121)
>   at 
> org.apache.drill.exec.store.sys.store.LocalPersistentStore.makePath(LocalPersistentStore.java:147)
>   at 
> org.apache.drill.exec.store.sys.store.LocalPersistentStore.get(LocalPersistentStore.java:166)
>   at 
> org.apache.drill.exec.store.sys.CaseInsensitivePersistentStore.get(CaseInsensitivePersistentStore.java:42)
>   at 
> org.apache.drill.exec.store.StoragePluginRegistryImpl.getPlugin(StoragePluginRegistryImpl.java:167)
>   at 
> org.apache.calcite.jdbc.DynamicRootSchema.loadSchemaFactory(DynamicRootSchema.java:80)
>   at 
> org.apache.calcite.jdbc.DynamicRootSchema.getImplicitSubSchema(DynamicRootSchema.java:67)
>   at 
> org.apache.calcite.jdbc.CalciteSchema.getSubSchema(CalciteSchema.java:265)
>   at 
> org.apache.calcite.sql.validate.EmptyScope.resolve_(EmptyScope.java:133)
>   at 
> org.apache.calcite.sql.validate.EmptyScope.resolveTable(EmptyScope.java:99)
>   at 
> org.apache.calcite.sql.validate.DelegatingScope.resolveTable(DelegatingScope.java:203)
>   at 
> org.apache.calcite.sql.validate.IdentifierNamespace.resolveImpl(IdentifierNamespace.java:105)
>   at 
> org.apache.calcite.sql.validate.IdentifierNamespace.validateImpl(IdentifierNamespace.java:177)
>   at 
> org.apache.calcite.sql.validate.AbstractNamespace.validate(AbstractNamespace.java:84)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateNamespace(SqlValidatorImpl.java:1009)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateQuery(SqlValidatorImpl.java:969)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateFrom(SqlValidatorImpl.java:3129)
>   at 
> org.apache.drill.exec.planner.sql.conversion.DrillValidator.validateFrom(DrillValidator.java:63)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateFrom(SqlValidatorImpl.java:3111)
>   at 
> org.apache.drill.exec.planner.sql.conversion.DrillValidator.validateFrom(DrillValidator.java:63)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateSelect(SqlValidatorImpl.java:3383)
>   at 
> org.apache.calcite.sql.validate.SelectNamespace.validateImpl(SelectNamespace.java:60)
>   at 
> org.apache.calcite.sql.validate.AbstractNamespace.validate(AbstractNamespace.java:84)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateNamespace(SqlValidatorImpl.java:1009)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateQuery(SqlValidatorImpl.java:969)
>   at org.apache.calcite.sql.SqlSelect.validate(SqlSelect.java:216)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateScopedExpression(SqlValidatorImpl.java:944)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validate(SqlValidatorImpl.java:651)
>   at 
> 

[jira] [Commented] (DRILL-7549) Fix validation error when querying absent sub folder in embedded mode

2020-02-26 Thread Dmytro Kondriukov (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-7549?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17045693#comment-17045693
 ] 

Dmytro Kondriukov commented on DRILL-7549:
--

verified with Drill 1.18.0-SNAPSHOT (commit 
8a8e58bf8382060305162b2ca261949b91179e46).


|| queue || expected || Drill-17.0 || Drill-17.0 -Pmapr || Drill-18.0 || 
Drill-18.0 -Pmapr || 
| select * from dfs.tmp.`region`; | full table content is displayed | pass | 
pass | pass | pass | 
| select * from dfs.tmp.`region/abc`; | empty table | pass | pass | pass | pass 
| 
| select * from dfs.tmp.`region/0.parquet`; | full table content is displayed | 
  pass | pass | pass | pass | 
| select * from dfs.tmp.`region/abcd`; | proper error message |  pass | pass | 
pass | pass | 
| select * from dfs.tmp.`region/abc.parquet`; | proper error message |  pass | 
pass | pass | pass | 
| use dfs.tmp; | Default schema changed to | - | - | - | - |
| select * from `region`; | full table content is displayed |  pass | pass | 
pass | pass |  
| select * from `region/abc`; | empty table |  pass | pass | pass | pass | 
| select * from `region/abcd`; | proper error message | bug confirm | bug 
confirm | pass | pass | 
| select * from `region/abc.parquet`; | proper error message | bug confirm | 
bug confirm | pass | pass | 
| select * from `region/0.parquet`; | full table content is displayed | pass | 
pass | pass | pass | 


> Fix validation error when querying absent sub folder in embedded mode
> -
>
> Key: DRILL-7549
> URL: https://issues.apache.org/jira/browse/DRILL-7549
> Project: Apache Drill
>  Issue Type: Bug
>Affects Versions: 1.17.0
>Reporter: Arina Ielchiieva
>Assignee: Arina Ielchiieva
>Priority: Major
>  Labels: ready-to-commit
> Fix For: 1.18.0
>
>
> {noformat}
> apache drill> select * from dfs.tmp.`abc.parquet`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 17: Object 
> 'abc.parquet' not found within 'dfs.tmp'
> [Error Id: 0dad391e-ea4d-4d13-95e7-218dec865ad2 ] (state=,code=0)
> apache drill> select * from dfs.tmp.`abc/abc`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 17: Object 
> 'abc/abc' not found within 'dfs.tmp'
> [Error Id: 94ea83c7-4983-4958-8a82-eea49b58d4ed ] (state=,code=0)
> apache drill> use dfs.tmp;
> +--+-+
> |  ok  |   summary   |
> +--+-+
> | true | Default schema changed to [dfs.tmp] |
> +--+-+
> 1 row selected (0.277 seconds)
> apache drill (dfs.tmp)> select * from `abc.parquet`;
> Error: VALIDATION ERROR: From line 1, column 15 to line 1, column 27: Object 
> 'abc.parquet' not found
> [Error Id: d814df53-2a94-46da-81e5-f49a3d50a665 ] (state=,code=0)
> apache drill (dfs.tmp)> select * from `abc/abc`;
> Error: VALIDATION ERROR: null
> [Error Id: 6c11d397-f893-4ef6-9832-4a96a2029f7d ] (state=,code=0)
> {noformat}
> Full error:
> {noformat}
> Caused by: java.lang.IllegalArgumentException: 
>   at 
> org.apache.drill.shaded.guava.com.google.common.base.Preconditions.checkArgument(Preconditions.java:121)
>   at 
> org.apache.drill.exec.store.sys.store.LocalPersistentStore.makePath(LocalPersistentStore.java:147)
>   at 
> org.apache.drill.exec.store.sys.store.LocalPersistentStore.get(LocalPersistentStore.java:166)
>   at 
> org.apache.drill.exec.store.sys.CaseInsensitivePersistentStore.get(CaseInsensitivePersistentStore.java:42)
>   at 
> org.apache.drill.exec.store.StoragePluginRegistryImpl.getPlugin(StoragePluginRegistryImpl.java:167)
>   at 
> org.apache.calcite.jdbc.DynamicRootSchema.loadSchemaFactory(DynamicRootSchema.java:80)
>   at 
> org.apache.calcite.jdbc.DynamicRootSchema.getImplicitSubSchema(DynamicRootSchema.java:67)
>   at 
> org.apache.calcite.jdbc.CalciteSchema.getSubSchema(CalciteSchema.java:265)
>   at 
> org.apache.calcite.sql.validate.EmptyScope.resolve_(EmptyScope.java:133)
>   at 
> org.apache.calcite.sql.validate.EmptyScope.resolveTable(EmptyScope.java:99)
>   at 
> org.apache.calcite.sql.validate.DelegatingScope.resolveTable(DelegatingScope.java:203)
>   at 
> org.apache.calcite.sql.validate.IdentifierNamespace.resolveImpl(IdentifierNamespace.java:105)
>   at 
> org.apache.calcite.sql.validate.IdentifierNamespace.validateImpl(IdentifierNamespace.java:177)
>   at 
> org.apache.calcite.sql.validate.AbstractNamespace.validate(AbstractNamespace.java:84)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateNamespace(SqlValidatorImpl.java:1009)
>   at 
> org.apache.calcite.sql.validate.SqlValidatorImpl.validateQuery(SqlValidatorImpl.java:969)
>   at 
>