[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch
[ https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824437=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824437 ] ASF GitHub Bot logged work on HIVE-26696: - Author: ASF GitHub Bot Created on: 09/Nov/22 07:36 Start Date: 09/Nov/22 07:36 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3737: URL: https://github.com/apache/hive/pull/3737#issuecomment-1308334967 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [8 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824437) Time Spent: 1h (was: 50m) > Implement row iterator for VectorizedRowBatch > - > > Key: HIVE-26696 > URL: https://issues.apache.org/jira/browse/HIVE-26696 > Project: Hive > Issue Type: Sub-task > Components: Iceberg integration >Reporter: Ádám Szita >Assignee: Ádám Szita >Priority: Major > Labels: pull-request-available > Time Spent: 1h > Remaining Estimate: 0h > > In order to utilize the existing DeleteFilter implementation of Iceberg we'll > need to provide a row iterator that iterates through the rows of a > VectorizedRowBatch instance. > This can be used during a read with positional deletes, but it will be > especially required for implementing equality deletes. > A HiveRow concept needs to be created along with a converter class that > provides row data information that's usable as an Iceberg Record. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-21599) Remove predicate on partition columns from Table Scan operator
[ https://issues.apache.org/jira/browse/HIVE-21599?focusedWorklogId=824421=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824421 ] ASF GitHub Bot logged work on HIVE-21599: - Author: ASF GitHub Bot Created on: 09/Nov/22 05:43 Start Date: 09/Nov/22 05:43 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3742: URL: https://github.com/apache/hive/pull/3742#issuecomment-1308240915 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3742) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [1 Code Smell](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824421) Time Spent: 50m (was: 40m) > Remove predicate on partition columns from Table Scan operator > -- > > Key: HIVE-21599 > URL: https://issues.apache.org/jira/browse/HIVE-21599 > Project: Hive > Issue Type: Improvement > Components: Query Planning >Reporter: Vineet Garg >Assignee: Vineet Garg >Priority: Major > Labels: pull-request-available > Attachments: HIVE-21599.1.patch > > Time Spent: 50m > Remaining Estimate: 0h > > Filter predicates are pushed to Table Scan (to be pushed to and used by > storage handler/input format). Such predicates could consist of partition > columns which are of no use to storage handler or input formats. Therefore > it should be removed from TS filter expression. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Assigned] (HIVE-26085) "getTableObjectByName method should ignore it" exception doesn't include cause
[ https://issues.apache.org/jira/browse/HIVE-26085?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] KIRTI RUGE reassigned HIVE-26085: - Assignee: KIRTI RUGE > "getTableObjectByName method should ignore it" exception doesn't include cause > -- > > Key: HIVE-26085 > URL: https://issues.apache.org/jira/browse/HIVE-26085 > Project: Hive > Issue Type: Improvement > Components: Parser > Environment: HDP 3.1.5 >Reporter: Wataru Yukawa >Assignee: KIRTI RUGE >Priority: Major > > current logic doesn't contain cause > https://github.com/apache/hive/blob/a6e93633dc15aba179fb6ad422be4cbc88adf071/ql/src/java/org/apache/hadoop/hive/ql/parse/SemanticAnalyzer.java#L12208 > but > {code} > throw new SemanticException("Got exception though getTableObjectByName method > should ignore it", e) > {code} > seems better for troubleshooting. > We encounter this issue when user access hive view where user doesn't hive > permission in original hive table. > {code} > create view aaa_view > as > select ... from aaa > {code} > "getTableObjectByName" exception happens when user try to access "aaa_view" > but doesn't have permission "aaa" table with apache ranger. > {code} > Caused by: java.lang.RuntimeException: > org.apache.hadoop.hive.ql.parse.SemanticException:Got exception though > getTableObjectByName method should ignore it > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.walkASTMarkTABREF(SemanticAnalyzer.java:12020) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.rewriteASTWithMaskAndFilter(SemanticAnalyzer.java:12139) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.replaceViewReferenceWithDefinition(SemanticAnalyzer.java:2608) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2192) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2103) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2257) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2088) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.genResolvedParseTree(SemanticAnalyzer.java:12234) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeInternal(SemanticAnalyzer.java:12328) > at > org.apache.hadoop.hive.ql.parse.CalcitePlanner.analyzeInternal(CalcitePlanner.java:367) > at > org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.analyze(BaseSemanticAnalyzer.java:290) > at org.apache.hadoop.hive.ql.Driver.compile(Driver.java:664) > at org.apache.hadoop.hive.ql.Driver.compileInternal(Driver.java:1870) > at > org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1817) > at > org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1812) > at > org.apache.hadoop.hive.ql.reexec.ReExecDriver.compileAndRespond(ReExecDriver.java:126) > at > org.apache.hive.service.cli.operation.SQLOperation.prepare(SQLOperation.java:197) > ... 26 common frames omitted > {code} > In this case, we can't see error log like "permission denied" when user try > to access "aaa_view". > So, it would be nice to add cause -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Resolved] (HIVE-25483) TxnHandler::acquireLock should close the DB conn to avoid connection leaks
[ https://issues.apache.org/jira/browse/HIVE-25483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] KIRTI RUGE resolved HIVE-25483. --- Resolution: Fixed > TxnHandler::acquireLock should close the DB conn to avoid connection leaks > -- > > Key: HIVE-25483 > URL: https://issues.apache.org/jira/browse/HIVE-25483 > Project: Hive > Issue Type: Improvement >Reporter: Rajesh Balamohan >Assignee: KIRTI RUGE >Priority: Major > > TxnHandler::acquireLock should close DB connection on exiting the function. > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5688] > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5726] > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5737-L5740] > If there are any exceptions downstream, this connection isn't closed > cleanly. In a corner case, hikari connection leak detector reported the > following > {noformat} > 2021-08-26 09:19:18,102 WARN com.zaxxer.hikari.pool.ProxyLeakTask: > [HikariPool-4 housekeeper]: Connection leak detection triggered for > org.postgresql.jdbc.PgConnection@77f76747, stack trace follows > java.lang.Exception: Apparent connection leak detected > at > org.apache.hadoop.hive.metastore.txn.TxnHandler.getDbConn(TxnHandler.java:3843) > at > org.apache.hadoop.hive.metastore.txn.TxnHandler.acquireLock(TxnHandler.java:5135) > > at > org.apache.hadoop.hive.ql.txn.compactor.Initiator.run(Initiator.java:107) > {noformat} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-21599) Remove predicate on partition columns from Table Scan operator
[ https://issues.apache.org/jira/browse/HIVE-21599?focusedWorklogId=824393=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824393 ] ASF GitHub Bot logged work on HIVE-21599: - Author: ASF GitHub Bot Created on: 09/Nov/22 01:03 Start Date: 09/Nov/22 01:03 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3742: URL: https://github.com/apache/hive/pull/3742#issuecomment-1308050324 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3742) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [0 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824393) Time Spent: 40m (was: 0.5h) > Remove predicate on partition columns from Table Scan operator > -- > > Key: HIVE-21599 > URL: https://issues.apache.org/jira/browse/HIVE-21599 > Project: Hive > Issue Type: Improvement > Components: Query Planning >Reporter: Vineet Garg >Assignee: Vineet Garg >Priority: Major > Labels: pull-request-available > Attachments: HIVE-21599.1.patch > > Time Spent: 40m > Remaining Estimate: 0h > > Filter predicates are pushed to Table Scan (to be pushed to and used by > storage handler/input format). Such predicates could consist of partition > columns which are of no use to storage handler or input formats. Therefore > it should be removed from TS filter expression. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-25845) Support ColumnIndexes for Parq files
[ https://issues.apache.org/jira/browse/HIVE-25845?focusedWorklogId=824384=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824384 ] ASF GitHub Bot logged work on HIVE-25845: - Author: ASF GitHub Bot Created on: 09/Nov/22 00:24 Start Date: 09/Nov/22 00:24 Worklog Time Spent: 10m Work Description: github-actions[bot] closed pull request #3551: HIVE-25845: Support ColumnIndexes for Parq files URL: https://github.com/apache/hive/pull/3551 Issue Time Tracking --- Worklog Id: (was: 824384) Time Spent: 3h 10m (was: 3h) > Support ColumnIndexes for Parq files > > > Key: HIVE-25845 > URL: https://issues.apache.org/jira/browse/HIVE-25845 > Project: Hive > Issue Type: Improvement >Reporter: Rajesh Balamohan >Priority: Major > Labels: pull-request-available > Time Spent: 3h 10m > Remaining Estimate: 0h > > https://issues.apache.org/jira/browse/PARQUET-1201 > > [https://github.com/apache/hive/blob/master/ql/src/java/org/apache/hadoop/hive/ql/io/parquet/vector/VectorizedParquetRecordReader.java#L271-L273] -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Assigned] (HIVE-26706) Add datalake to Hive metadata
[ https://issues.apache.org/jira/browse/HIVE-26706?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] heng.zhao reassigned HIVE-26706: Assignee: KIRTI RUGE > Add datalake to Hive metadata > - > > Key: HIVE-26706 > URL: https://issues.apache.org/jira/browse/HIVE-26706 > Project: Hive > Issue Type: New Feature > Components: Database/Schema, Metastore >Reporter: heng.zhao >Assignee: KIRTI RUGE >Priority: Major > > 0: jdbc:hive2://localhost:1> show tables; > +---+---+ > | tab_name | type | > +---+---+ > | test1 | warehouse | > | test2 | iceberg | > +---+---+ > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch
[ https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824360=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824360 ] ASF GitHub Bot logged work on HIVE-26696: - Author: ASF GitHub Bot Created on: 08/Nov/22 22:02 Start Date: 08/Nov/22 22:02 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3737: URL: https://github.com/apache/hive/pull/3737#issuecomment-1307884454 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [8 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824360) Time Spent: 50m (was: 40m) > Implement row iterator for VectorizedRowBatch > - > > Key: HIVE-26696 > URL: https://issues.apache.org/jira/browse/HIVE-26696 > Project: Hive > Issue Type: Sub-task > Components: Iceberg integration >Reporter: Ádám Szita >Assignee: Ádám Szita >Priority: Major > Labels: pull-request-available > Time Spent: 50m > Remaining Estimate: 0h > > In order to utilize the existing DeleteFilter implementation of Iceberg we'll > need to provide a row iterator that iterates through the rows of a > VectorizedRowBatch instance. > This can be used during a read with positional deletes, but it will be > especially required for implementing equality deletes. > A HiveRow concept needs to be created along with a converter class that > provides row data information that's usable as an Iceberg Record. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch
[ https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824287=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824287 ] ASF GitHub Bot logged work on HIVE-26696: - Author: ASF GitHub Bot Created on: 08/Nov/22 17:37 Start Date: 08/Nov/22 17:37 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3737: URL: https://github.com/apache/hive/pull/3737#issuecomment-1307589709 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [8 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824287) Time Spent: 40m (was: 0.5h) > Implement row iterator for VectorizedRowBatch > - > > Key: HIVE-26696 > URL: https://issues.apache.org/jira/browse/HIVE-26696 > Project: Hive > Issue Type: Sub-task > Components: Iceberg integration >Reporter: Ádám Szita >Assignee: Ádám Szita >Priority: Major > Labels: pull-request-available > Time Spent: 40m > Remaining Estimate: 0h > > In order to utilize the existing DeleteFilter implementation of Iceberg we'll > need to provide a row iterator that iterates through the rows of a > VectorizedRowBatch instance. > This can be used during a read with positional deletes, but it will be > especially required for implementing equality deletes. > A HiveRow concept needs to be created along with a converter class that > provides row data information that's usable as an Iceberg Record. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Commented] (HIVE-26592) TestMiniLlapLocalCliDriver test runs throw NoSuchMethodError since log4j 2.18 upgrade
[ https://issues.apache.org/jira/browse/HIVE-26592?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17630518#comment-17630518 ] Raghav Aggarwal commented on HIVE-26592: [~ghanko] , I am also facing this issue. Can you please elaborate how you resolved it. If possible can you provide the maven command to rebuild it. > TestMiniLlapLocalCliDriver test runs throw NoSuchMethodError since log4j 2.18 > upgrade > - > > Key: HIVE-26592 > URL: https://issues.apache.org/jira/browse/HIVE-26592 > Project: Hive > Issue Type: Bug >Reporter: Hankó Gergely >Assignee: Hankó Gergely >Priority: Major > > The issue exists since > [https://github.com/apache/hive/commit/c9e7f5dd6191636232921279acc1a5dd5a6fcaff] > {code:java} > [INFO] Running org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver > [ERROR] Tests run: 1, Failures: 0, Errors: 1, Skipped: 0, Time elapsed: 8.03 > s <<< FAILURE! - in org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver > [ERROR] org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver Time elapsed: > 8.028 s <<< ERROR! > java.lang.NoSuchMethodError: > org.apache.logging.log4j.util.StackLocatorUtil.getCallerClassLoader(I)Ljava/lang/ClassLoader; > at org.apache.log4j.Logger.getLogger(Logger.java:35) > at > org.apache.hadoop.hive.ql.udf.esri.ST_GeometryRelational.(ST_GeometryRelational.java:36) > at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native > Method) > at > sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) > at > sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) > at java.lang.reflect.Constructor.newInstance(Constructor.java:423) > at > org.apache.hive.common.util.ReflectionUtil.newInstance(ReflectionUtil.java:83) > at > org.apache.hadoop.hive.ql.exec.Registry.registerGenericUDF(Registry.java:193) > at > org.apache.hadoop.hive.ql.exec.Registry.registerFunction(Registry.java:128) > at > org.apache.hadoop.hive.ql.exec.Registry.registerFunction(Registry.java:115) > at > org.apache.hadoop.hive.ql.exec.FunctionRegistry.(FunctionRegistry.java:689) > at > org.apache.hadoop.hive.ql.metadata.Hive.reloadFunctions(Hive.java:345) > at > org.apache.hadoop.hive.ql.metadata.Hive.registerAllFunctionsOnce(Hive.java:325) > at org.apache.hadoop.hive.ql.metadata.Hive.(Hive.java:551) > at org.apache.hadoop.hive.ql.metadata.Hive.create(Hive.java:443) > at org.apache.hadoop.hive.ql.metadata.Hive.getInternal(Hive.java:430) > at org.apache.hadoop.hive.ql.metadata.Hive.get(Hive.java:386) > at > org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.createHiveDB(BaseSemanticAnalyzer.java:291) > at > org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.(BaseSemanticAnalyzer.java:269) > at > org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.(SemanticAnalyzer.java:477) > at org.apache.hadoop.hive.ql.QTestUtil.postInit(QTestUtil.java:565) > at > org.apache.hadoop.hive.cli.control.CliAdapter$1$1.evaluate(CliAdapter.java:88) > at org.junit.rules.RunRules.evaluate(RunRules.java:20) > at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) > at org.junit.runners.ParentRunner.run(ParentRunner.java:413) > at > org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:369) > at > org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:275) > at > org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:239) > at > org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:160) > at > org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:373) > at > org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:334) > at > org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:119) > at > org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:407)[INFO] > > [INFO] Results: > [INFO] > [ERROR] Errors: > [ERROR] > TestMiniLlapLocalCliDriver.org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver > » NoSuchMethod > {code} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26392) Move StringableMap tests into a dedicated test class
[ https://issues.apache.org/jira/browse/HIVE-26392?focusedWorklogId=824257=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824257 ] ASF GitHub Bot logged work on HIVE-26392: - Author: ASF GitHub Bot Created on: 08/Nov/22 15:50 Start Date: 08/Nov/22 15:50 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3741: URL: https://github.com/apache/hive/pull/3741#issuecomment-1307432083 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3741) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL) [0 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3741=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3741=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824257) Time Spent: 20m (was: 10m) > Move StringableMap tests into a dedicated test class > > > Key: HIVE-26392 > URL: https://issues.apache.org/jira/browse/HIVE-26392 > Project: Hive > Issue Type: Test > Components: Hive >Reporter: Zsolt Miskolczi >Assignee: Zoltán Rátkai >Priority: Minor > Labels: pull-request-available > Time Spent: 20m > Remaining Estimate: 0h > > `StringableMap` has unit tests in `TestWorker.java`. They could be in their > own dedicated test class instead. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26392) Move StringableMap tests into a dedicated test class
[ https://issues.apache.org/jira/browse/HIVE-26392?focusedWorklogId=824239=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824239 ] ASF GitHub Bot logged work on HIVE-26392: - Author: ASF GitHub Bot Created on: 08/Nov/22 15:06 Start Date: 08/Nov/22 15:06 Worklog Time Spent: 10m Work Description: zratkai opened a new pull request, #3741: URL: https://github.com/apache/hive/pull/3741 Moved unit test for StringableList, StringableMap to they own dedicated test classes instead. Issue Time Tracking --- Worklog Id: (was: 824239) Remaining Estimate: 0h Time Spent: 10m > Move StringableMap tests into a dedicated test class > > > Key: HIVE-26392 > URL: https://issues.apache.org/jira/browse/HIVE-26392 > Project: Hive > Issue Type: Test > Components: Hive >Reporter: Zsolt Miskolczi >Assignee: Zoltán Rátkai >Priority: Minor > Time Spent: 10m > Remaining Estimate: 0h > > `StringableMap` has unit tests in `TestWorker.java`. They could be in their > own dedicated test class instead. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (HIVE-26392) Move StringableMap tests into a dedicated test class
[ https://issues.apache.org/jira/browse/HIVE-26392?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] ASF GitHub Bot updated HIVE-26392: -- Labels: pull-request-available (was: ) > Move StringableMap tests into a dedicated test class > > > Key: HIVE-26392 > URL: https://issues.apache.org/jira/browse/HIVE-26392 > Project: Hive > Issue Type: Test > Components: Hive >Reporter: Zsolt Miskolczi >Assignee: Zoltán Rátkai >Priority: Minor > Labels: pull-request-available > Time Spent: 10m > Remaining Estimate: 0h > > `StringableMap` has unit tests in `TestWorker.java`. They could be in their > own dedicated test class instead. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824204=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824204 ] ASF GitHub Bot logged work on HIVE-26656: - Author: ASF GitHub Bot Created on: 08/Nov/22 13:05 Start Date: 08/Nov/22 13:05 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3740: URL: https://github.com/apache/hive/pull/3740#issuecomment-1307186388 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3740) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL) [0 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3740=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3740=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824204) Time Spent: 1.5h (was: 1h 20m) > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Attachments: tree.txt > > Time Spent: 1.5h > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch
[ https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824195=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824195 ] ASF GitHub Bot logged work on HIVE-26696: - Author: ASF GitHub Bot Created on: 08/Nov/22 12:52 Start Date: 08/Nov/22 12:52 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3737: URL: https://github.com/apache/hive/pull/3737#issuecomment-1307167669 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [8 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824195) Time Spent: 0.5h (was: 20m) > Implement row iterator for VectorizedRowBatch > - > > Key: HIVE-26696 > URL: https://issues.apache.org/jira/browse/HIVE-26696 > Project: Hive > Issue Type: Sub-task > Components: Iceberg integration >Reporter: Ádám Szita >Assignee: Ádám Szita >Priority: Major > Labels: pull-request-available > Time Spent: 0.5h > Remaining Estimate: 0h > > In order to utilize the existing DeleteFilter implementation of Iceberg we'll > need to provide a row iterator that iterates through the rows of a > VectorizedRowBatch instance. > This can be used during a read with positional deletes, but it will be > especially required for implementing equality deletes. > A HiveRow concept needs to be created along with a converter class that > provides row data information that's usable as an Iceberg Record. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Devaspati Krishnatri updated HIVE-26656: Attachment: tree.txt > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Attachments: tree.txt > > Time Spent: 1h 20m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824190=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824190 ] ASF GitHub Bot logged work on HIVE-26656: - Author: ASF GitHub Bot Created on: 08/Nov/22 12:18 Start Date: 08/Nov/22 12:18 Worklog Time Spent: 10m Work Description: devaspatikrishnatri closed pull request #3694: HIVE-26656:Remove hsqldb dependency in hive due to CVE-2022-41853 URL: https://github.com/apache/hive/pull/3694 Issue Time Tracking --- Worklog Id: (was: 824190) Time Spent: 1h 20m (was: 1h 10m) > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Time Spent: 1h 20m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824189=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824189 ] ASF GitHub Bot logged work on HIVE-26656: - Author: ASF GitHub Bot Created on: 08/Nov/22 12:18 Start Date: 08/Nov/22 12:18 Worklog Time Spent: 10m Work Description: devaspatikrishnatri commented on PR #3740: URL: https://github.com/apache/hive/pull/3740#issuecomment-1307120922 @saihemanth-cloudera please see this Issue Time Tracking --- Worklog Id: (was: 824189) Time Spent: 1h 10m (was: 1h) > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Time Spent: 1h 10m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824188=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824188 ] ASF GitHub Bot logged work on HIVE-26656: - Author: ASF GitHub Bot Created on: 08/Nov/22 12:17 Start Date: 08/Nov/22 12:17 Worklog Time Spent: 10m Work Description: devaspatikrishnatri opened a new pull request, #3740: URL: https://github.com/apache/hive/pull/3740 ### What changes were proposed in this pull request? Remove hsqldb dependency in hive ### Why are the changes needed? fix cve ### Does this PR introduce _any_ user-facing change? no ### How was this patch tested? manual Issue Time Tracking --- Worklog Id: (was: 824188) Time Spent: 1h (was: 50m) > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Time Spent: 1h > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Comment Edited] (HIVE-25483) TxnHandler::acquireLock should close the DB conn to avoid connection leaks
[ https://issues.apache.org/jira/browse/HIVE-25483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17629600#comment-17629600 ] KIRTI RUGE edited comment on HIVE-25483 at 11/8/22 12:15 PM: - This has been taken care already. TxnHandler.acquireLock() closes all DB connections . This has been fixed as a part of [*HIVE-24236: Fixed possible Connection leaks in TxnHandler (Yongzhi Chen, reviewed by Denys Kuzmenko)*|https://github.com/apache/hive/pull/1559/files#top] was (Author: JIRAUSER294595): This has been taken care already. TxnHandler.acquireLock() closes all DB connections . > TxnHandler::acquireLock should close the DB conn to avoid connection leaks > -- > > Key: HIVE-25483 > URL: https://issues.apache.org/jira/browse/HIVE-25483 > Project: Hive > Issue Type: Improvement >Reporter: Rajesh Balamohan >Assignee: KIRTI RUGE >Priority: Major > > TxnHandler::acquireLock should close DB connection on exiting the function. > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5688] > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5726] > [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5737-L5740] > If there are any exceptions downstream, this connection isn't closed > cleanly. In a corner case, hikari connection leak detector reported the > following > {noformat} > 2021-08-26 09:19:18,102 WARN com.zaxxer.hikari.pool.ProxyLeakTask: > [HikariPool-4 housekeeper]: Connection leak detection triggered for > org.postgresql.jdbc.PgConnection@77f76747, stack trace follows > java.lang.Exception: Apparent connection leak detected > at > org.apache.hadoop.hive.metastore.txn.TxnHandler.getDbConn(TxnHandler.java:3843) > at > org.apache.hadoop.hive.metastore.txn.TxnHandler.acquireLock(TxnHandler.java:5135) > > at > org.apache.hadoop.hive.ql.txn.compactor.Initiator.run(Initiator.java:107) > {noformat} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (HIVE-26641) Upgrade Guava: Google Core Libraries for Java to v28.2/31.1-jre due to medium CVEs
[ https://issues.apache.org/jira/browse/HIVE-26641?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Devaspati Krishnatri updated HIVE-26641: Attachment: tree.txt > Upgrade Guava: Google Core Libraries for Java to v28.2/31.1-jre due to medium > CVEs > -- > > Key: HIVE-26641 > URL: https://issues.apache.org/jira/browse/HIVE-26641 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Attachments: tree.txt > > Time Spent: 40m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Devaspati Krishnatri updated HIVE-26656: Attachment: (was: tree.txt) > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Time Spent: 50m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853
[ https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Devaspati Krishnatri updated HIVE-26656: Attachment: tree.txt > Remove hsqldb dependency in hive due to CVE-2022-41853 > -- > > Key: HIVE-26656 > URL: https://issues.apache.org/jira/browse/HIVE-26656 > Project: Hive > Issue Type: Task >Reporter: Devaspati Krishnatri >Assignee: Devaspati Krishnatri >Priority: Major > Labels: pull-request-available > Attachments: tree.txt > > Time Spent: 50m > Remaining Estimate: 0h > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Commented] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure
[ https://issues.apache.org/jira/browse/HIVE-26707?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17630299#comment-17630299 ] Ayush Saxena commented on HIVE-26707: - Committed to master. Thanx [~szita] and [~cnauroth] for the reviews!!! > Iceberg: Write failing due to Ranger Authorization failure > -- > > Key: HIVE-26707 > URL: https://issues.apache.org/jira/browse/HIVE-26707 > Project: Hive > Issue Type: Bug >Reporter: Ayush Saxena >Assignee: Ayush Saxena >Priority: Major > Labels: pull-request-available > Time Spent: 1h > Remaining Estimate: 0h > > {noformat} > Caused by: java.lang.RuntimeException: MetaException(message:Permission > denied: user [systest] does not have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243) > at > org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80) > at > org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64) > at > org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51) > at > org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76) > at > org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321) > at > org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277) > ... 36 more > Caused by: MetaException(message:Permission denied: user [systest] does not > have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java) > at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965) > at > org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > {noformat} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Resolved] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure
[ https://issues.apache.org/jira/browse/HIVE-26707?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ayush Saxena resolved HIVE-26707. - Fix Version/s: 4.0.0 Resolution: Fixed > Iceberg: Write failing due to Ranger Authorization failure > -- > > Key: HIVE-26707 > URL: https://issues.apache.org/jira/browse/HIVE-26707 > Project: Hive > Issue Type: Bug >Reporter: Ayush Saxena >Assignee: Ayush Saxena >Priority: Major > Labels: pull-request-available > Fix For: 4.0.0 > > Time Spent: 1h > Remaining Estimate: 0h > > {noformat} > Caused by: java.lang.RuntimeException: MetaException(message:Permission > denied: user [systest] does not have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243) > at > org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80) > at > org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64) > at > org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51) > at > org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76) > at > org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321) > at > org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277) > ... 36 more > Caused by: MetaException(message:Permission denied: user [systest] does not > have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java) > at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965) > at > org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > {noformat} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure
[ https://issues.apache.org/jira/browse/HIVE-26707?focusedWorklogId=824161=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824161 ] ASF GitHub Bot logged work on HIVE-26707: - Author: ASF GitHub Bot Created on: 08/Nov/22 09:19 Start Date: 08/Nov/22 09:19 Worklog Time Spent: 10m Work Description: ayushtkn merged PR #3731: URL: https://github.com/apache/hive/pull/3731 Issue Time Tracking --- Worklog Id: (was: 824161) Time Spent: 1h (was: 50m) > Iceberg: Write failing due to Ranger Authorization failure > -- > > Key: HIVE-26707 > URL: https://issues.apache.org/jira/browse/HIVE-26707 > Project: Hive > Issue Type: Bug >Reporter: Ayush Saxena >Assignee: Ayush Saxena >Priority: Major > Labels: pull-request-available > Time Spent: 1h > Remaining Estimate: 0h > > {noformat} > Caused by: java.lang.RuntimeException: MetaException(message:Permission > denied: user [systest] does not have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243) > at > org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80) > at > org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64) > at > org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58) > at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51) > at > org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76) > at > org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321) > at > org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277) > ... 36 more > Caused by: MetaException(message:Permission denied: user [systest] does not > have [RWSTORAGE] privilege on > [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json]) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java) > at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978) > at > org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965) > at > org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > {noformat} -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Work logged] (HIVE-26713) StringExpr ArrayIndexOutOfBoundsException with LIKE '%xxx%'
[ https://issues.apache.org/jira/browse/HIVE-26713?focusedWorklogId=824137=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824137 ] ASF GitHub Bot logged work on HIVE-26713: - Author: ASF GitHub Bot Created on: 08/Nov/22 08:31 Start Date: 08/Nov/22 08:31 Worklog Time Spent: 10m Work Description: sonarcloud[bot] commented on PR #3739: URL: https://github.com/apache/hive/pull/3739#issuecomment-1306824851 Kudos, SonarCloud Quality Gate passed! [![Quality Gate passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png 'Quality Gate passed')](https://sonarcloud.io/dashboard?id=apache_hive=3739) [![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png 'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG) [0 Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG) [![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png 'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY) [0 Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY) [![Security Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png 'Security Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT) [0 Security Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT) [![Code Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png 'Code Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL) [![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png 'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL) [0 Code Smells](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL) [![No Coverage information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png 'No Coverage information')](https://sonarcloud.io/component_measures?id=apache_hive=3739=coverage=list) No Coverage information [![No Duplication information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png 'No Duplication information')](https://sonarcloud.io/component_measures?id=apache_hive=3739=duplicated_lines_density=list) No Duplication information Issue Time Tracking --- Worklog Id: (was: 824137) Time Spent: 20m (was: 10m) > StringExpr ArrayIndexOutOfBoundsException with LIKE '%xxx%' > --- > > Key: HIVE-26713 > URL: https://issues.apache.org/jira/browse/HIVE-26713 > Project: Hive > Issue Type: Bug > Components: storage-api >Affects Versions: All Versions >Reporter: Ryu Kobayashi >Assignee: Ryu Kobayashi >Priority: Major > Labels: pull-request-available > Time Spent: 20m > Remaining Estimate: 0h > > When LIKE(%xxx%) search is performed, if the character string contains > control characters, overflow occurs as follows. > https://github.com/apache/hive/blob/master/storage-api/src/java/org/apache/hadoop/hive/ql/exec/vector/expressions/StringExpr.java#L345 > {code:java} > // input[next] == -1 > // shift[input[next] & MAX_BYTE] == 255 > next += shift[input[next] & MAX_BYTE]; {code} > > Stack trace: > {code:java} > TaskAttempt 3 failed, info=[Error: Error while running task ( failure ) : > attempt_1665986828766_64791_1_00_00_3:java.lang.RuntimeException: > java.lang.RuntimeException: org.apache.hadoop.hive.ql.metadata.HiveException: > Hive Runtime Error while processing row > 2 at > org.apache.hadoop.hive.ql.exec.tez.TezProcessor.initializeAndRunProcessor(TezProcessor.java:220) > 3 at > org.apache.hadoop.hive.ql.exec.tez.TezProcessor.run(TezProcessor.java:177) > 4 at >