[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824437=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824437
 ]

ASF GitHub Bot logged work on HIVE-26696:
-

Author: ASF GitHub Bot
Created on: 09/Nov/22 07:36
Start Date: 09/Nov/22 07:36
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3737:
URL: https://github.com/apache/hive/pull/3737#issuecomment-1308334967

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 [8 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824437)
Time Spent: 1h  (was: 50m)

> Implement row iterator for VectorizedRowBatch
> -
>
> Key: HIVE-26696
> URL: https://issues.apache.org/jira/browse/HIVE-26696
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> In order to utilize the existing DeleteFilter implementation of Iceberg we'll 
> need to provide a row iterator that iterates through the rows of a 
> VectorizedRowBatch instance.
> This can be used during a read with positional deletes, but it will be 
> especially required for implementing equality deletes.
> A HiveRow concept needs to be created along with a converter class that 
> provides row data information that's usable as an Iceberg Record.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-21599) Remove predicate on partition columns from Table Scan operator

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-21599?focusedWorklogId=824421=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824421
 ]

ASF GitHub Bot logged work on HIVE-21599:
-

Author: ASF GitHub Bot
Created on: 09/Nov/22 05:43
Start Date: 09/Nov/22 05:43
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3742:
URL: https://github.com/apache/hive/pull/3742#issuecomment-1308240915

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3742)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
 [1 Code 
Smell](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824421)
Time Spent: 50m  (was: 40m)

> Remove predicate on partition columns from Table Scan operator
> --
>
> Key: HIVE-21599
> URL: https://issues.apache.org/jira/browse/HIVE-21599
> Project: Hive
>  Issue Type: Improvement
>  Components: Query Planning
>Reporter: Vineet Garg
>Assignee: Vineet Garg
>Priority: Major
>  Labels: pull-request-available
> Attachments: HIVE-21599.1.patch
>
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> Filter predicates are pushed to Table Scan (to be pushed to and used by 
> storage handler/input format). Such predicates could consist of partition 
> columns which are of no use to storage handler  or input formats. Therefore 
> it should be removed from TS filter expression.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26085) "getTableObjectByName method should ignore it" exception doesn't include cause

2022-11-08 Thread KIRTI RUGE (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26085?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

KIRTI RUGE reassigned HIVE-26085:
-

Assignee: KIRTI RUGE

> "getTableObjectByName method should ignore it" exception doesn't include cause
> --
>
> Key: HIVE-26085
> URL: https://issues.apache.org/jira/browse/HIVE-26085
> Project: Hive
>  Issue Type: Improvement
>  Components: Parser
> Environment: HDP 3.1.5
>Reporter: Wataru Yukawa
>Assignee: KIRTI RUGE
>Priority: Major
>
> current logic doesn't contain cause
> https://github.com/apache/hive/blob/a6e93633dc15aba179fb6ad422be4cbc88adf071/ql/src/java/org/apache/hadoop/hive/ql/parse/SemanticAnalyzer.java#L12208
> but
> {code}
> throw new SemanticException("Got exception though getTableObjectByName method 
> should ignore it", e)
> {code}
> seems better for troubleshooting.
> We encounter this issue when user access hive view where user doesn't hive 
> permission in original hive table.
> {code}
> create view aaa_view
> as
> select ... from aaa
> {code}
> "getTableObjectByName" exception happens when user try to access "aaa_view" 
> but doesn't have permission "aaa" table with apache ranger.
> {code}
> Caused by: java.lang.RuntimeException: 
> org.apache.hadoop.hive.ql.parse.SemanticException:Got exception though 
> getTableObjectByName method should ignore it
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.walkASTMarkTABREF(SemanticAnalyzer.java:12020)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.rewriteASTWithMaskAndFilter(SemanticAnalyzer.java:12139)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.replaceViewReferenceWithDefinition(SemanticAnalyzer.java:2608)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2192)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2103)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2257)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2088)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.genResolvedParseTree(SemanticAnalyzer.java:12234)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeInternal(SemanticAnalyzer.java:12328)
> at 
> org.apache.hadoop.hive.ql.parse.CalcitePlanner.analyzeInternal(CalcitePlanner.java:367)
> at 
> org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.analyze(BaseSemanticAnalyzer.java:290)
> at org.apache.hadoop.hive.ql.Driver.compile(Driver.java:664)
> at org.apache.hadoop.hive.ql.Driver.compileInternal(Driver.java:1870)
> at 
> org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1817)
> at 
> org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1812)
> at 
> org.apache.hadoop.hive.ql.reexec.ReExecDriver.compileAndRespond(ReExecDriver.java:126)
> at 
> org.apache.hive.service.cli.operation.SQLOperation.prepare(SQLOperation.java:197)
> ... 26 common frames omitted
> {code}
> In this case, we can't see error log like "permission denied" when user try 
> to access "aaa_view".
> So, it would be nice to add cause



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (HIVE-25483) TxnHandler::acquireLock should close the DB conn to avoid connection leaks

2022-11-08 Thread KIRTI RUGE (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

KIRTI RUGE resolved HIVE-25483.
---
Resolution: Fixed

> TxnHandler::acquireLock should close the DB conn to avoid connection leaks
> --
>
> Key: HIVE-25483
> URL: https://issues.apache.org/jira/browse/HIVE-25483
> Project: Hive
>  Issue Type: Improvement
>Reporter: Rajesh Balamohan
>Assignee: KIRTI RUGE
>Priority: Major
>
> TxnHandler::acquireLock should close DB connection on exiting the function. 
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5688]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5726]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5737-L5740]
>  If there are any exceptions downstream, this connection isn't closed 
> cleanly. In a corner case, hikari connection leak detector reported the 
> following
> {noformat}
> 2021-08-26 09:19:18,102 WARN  com.zaxxer.hikari.pool.ProxyLeakTask: 
> [HikariPool-4 housekeeper]: Connection leak detection triggered for 
> org.postgresql.jdbc.PgConnection@77f76747, stack trace follows
> java.lang.Exception: Apparent connection leak detected
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.getDbConn(TxnHandler.java:3843)
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.acquireLock(TxnHandler.java:5135)
>  
> at 
> org.apache.hadoop.hive.ql.txn.compactor.Initiator.run(Initiator.java:107) 
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-21599) Remove predicate on partition columns from Table Scan operator

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-21599?focusedWorklogId=824393=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824393
 ]

ASF GitHub Bot logged work on HIVE-21599:
-

Author: ASF GitHub Bot
Created on: 09/Nov/22 01:03
Start Date: 09/Nov/22 01:03
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3742:
URL: https://github.com/apache/hive/pull/3742#issuecomment-1308050324

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3742)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3742=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3742=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3742=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824393)
Time Spent: 40m  (was: 0.5h)

> Remove predicate on partition columns from Table Scan operator
> --
>
> Key: HIVE-21599
> URL: https://issues.apache.org/jira/browse/HIVE-21599
> Project: Hive
>  Issue Type: Improvement
>  Components: Query Planning
>Reporter: Vineet Garg
>Assignee: Vineet Garg
>Priority: Major
>  Labels: pull-request-available
> Attachments: HIVE-21599.1.patch
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> Filter predicates are pushed to Table Scan (to be pushed to and used by 
> storage handler/input format). Such predicates could consist of partition 
> columns which are of no use to storage handler  or input formats. Therefore 
> it should be removed from TS filter expression.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-25845) Support ColumnIndexes for Parq files

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25845?focusedWorklogId=824384=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824384
 ]

ASF GitHub Bot logged work on HIVE-25845:
-

Author: ASF GitHub Bot
Created on: 09/Nov/22 00:24
Start Date: 09/Nov/22 00:24
Worklog Time Spent: 10m 
  Work Description: github-actions[bot] closed pull request #3551: 
HIVE-25845: Support ColumnIndexes for Parq files
URL: https://github.com/apache/hive/pull/3551




Issue Time Tracking
---

Worklog Id: (was: 824384)
Time Spent: 3h 10m  (was: 3h)

> Support ColumnIndexes for Parq files
> 
>
> Key: HIVE-25845
> URL: https://issues.apache.org/jira/browse/HIVE-25845
> Project: Hive
>  Issue Type: Improvement
>Reporter: Rajesh Balamohan
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 3h 10m
>  Remaining Estimate: 0h
>
> https://issues.apache.org/jira/browse/PARQUET-1201
>  
> [https://github.com/apache/hive/blob/master/ql/src/java/org/apache/hadoop/hive/ql/io/parquet/vector/VectorizedParquetRecordReader.java#L271-L273]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26706) Add datalake to Hive metadata

2022-11-08 Thread heng.zhao (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26706?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

heng.zhao reassigned HIVE-26706:


Assignee: KIRTI RUGE

> Add datalake to Hive metadata
> -
>
> Key: HIVE-26706
> URL: https://issues.apache.org/jira/browse/HIVE-26706
> Project: Hive
>  Issue Type: New Feature
>  Components: Database/Schema, Metastore
>Reporter: heng.zhao
>Assignee: KIRTI RUGE
>Priority: Major
>
> 0: jdbc:hive2://localhost:1> show tables;
> +---+---+
> | tab_name  | type           |
> +---+---+
> | test1     | warehouse      |
> | test2     | iceberg           |
> +---+---+
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824360=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824360
 ]

ASF GitHub Bot logged work on HIVE-26696:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 22:02
Start Date: 08/Nov/22 22:02
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3737:
URL: https://github.com/apache/hive/pull/3737#issuecomment-1307884454

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 [8 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824360)
Time Spent: 50m  (was: 40m)

> Implement row iterator for VectorizedRowBatch
> -
>
> Key: HIVE-26696
> URL: https://issues.apache.org/jira/browse/HIVE-26696
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> In order to utilize the existing DeleteFilter implementation of Iceberg we'll 
> need to provide a row iterator that iterates through the rows of a 
> VectorizedRowBatch instance.
> This can be used during a read with positional deletes, but it will be 
> especially required for implementing equality deletes.
> A HiveRow concept needs to be created along with a converter class that 
> provides row data information that's usable as an Iceberg Record.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824287=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824287
 ]

ASF GitHub Bot logged work on HIVE-26696:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 17:37
Start Date: 08/Nov/22 17:37
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3737:
URL: https://github.com/apache/hive/pull/3737#issuecomment-1307589709

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 [8 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824287)
Time Spent: 40m  (was: 0.5h)

> Implement row iterator for VectorizedRowBatch
> -
>
> Key: HIVE-26696
> URL: https://issues.apache.org/jira/browse/HIVE-26696
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> In order to utilize the existing DeleteFilter implementation of Iceberg we'll 
> need to provide a row iterator that iterates through the rows of a 
> VectorizedRowBatch instance.
> This can be used during a read with positional deletes, but it will be 
> especially required for implementing equality deletes.
> A HiveRow concept needs to be created along with a converter class that 
> provides row data information that's usable as an Iceberg Record.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-26592) TestMiniLlapLocalCliDriver test runs throw NoSuchMethodError since log4j 2.18 upgrade

2022-11-08 Thread Raghav Aggarwal (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-26592?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17630518#comment-17630518
 ] 

Raghav Aggarwal commented on HIVE-26592:


[~ghanko] , I am also facing this issue. Can you please elaborate how you 
resolved it. If possible can you provide the maven command to rebuild it.

> TestMiniLlapLocalCliDriver test runs throw NoSuchMethodError since log4j 2.18 
> upgrade
> -
>
> Key: HIVE-26592
> URL: https://issues.apache.org/jira/browse/HIVE-26592
> Project: Hive
>  Issue Type: Bug
>Reporter: Hankó Gergely
>Assignee: Hankó Gergely
>Priority: Major
>
> The issue exists since 
> [https://github.com/apache/hive/commit/c9e7f5dd6191636232921279acc1a5dd5a6fcaff]
> {code:java}
> [INFO] Running org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver
> [ERROR] Tests run: 1, Failures: 0, Errors: 1, Skipped: 0, Time elapsed: 8.03 
> s <<< FAILURE! - in org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver
> [ERROR] org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver  Time elapsed: 
> 8.028 s  <<< ERROR!
> java.lang.NoSuchMethodError: 
> org.apache.logging.log4j.util.StackLocatorUtil.getCallerClassLoader(I)Ljava/lang/ClassLoader;
>         at org.apache.log4j.Logger.getLogger(Logger.java:35)
>         at 
> org.apache.hadoop.hive.ql.udf.esri.ST_GeometryRelational.(ST_GeometryRelational.java:36)
>         at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native 
> Method)
>         at 
> sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
>         at 
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
>         at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
>         at 
> org.apache.hive.common.util.ReflectionUtil.newInstance(ReflectionUtil.java:83)
>         at 
> org.apache.hadoop.hive.ql.exec.Registry.registerGenericUDF(Registry.java:193)
>         at 
> org.apache.hadoop.hive.ql.exec.Registry.registerFunction(Registry.java:128)
>         at 
> org.apache.hadoop.hive.ql.exec.Registry.registerFunction(Registry.java:115)
>         at 
> org.apache.hadoop.hive.ql.exec.FunctionRegistry.(FunctionRegistry.java:689)
>         at 
> org.apache.hadoop.hive.ql.metadata.Hive.reloadFunctions(Hive.java:345)
>         at 
> org.apache.hadoop.hive.ql.metadata.Hive.registerAllFunctionsOnce(Hive.java:325)
>         at org.apache.hadoop.hive.ql.metadata.Hive.(Hive.java:551)
>         at org.apache.hadoop.hive.ql.metadata.Hive.create(Hive.java:443)
>         at org.apache.hadoop.hive.ql.metadata.Hive.getInternal(Hive.java:430)
>         at org.apache.hadoop.hive.ql.metadata.Hive.get(Hive.java:386)
>         at 
> org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.createHiveDB(BaseSemanticAnalyzer.java:291)
>         at 
> org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.(BaseSemanticAnalyzer.java:269)
>         at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.(SemanticAnalyzer.java:477)
>         at org.apache.hadoop.hive.ql.QTestUtil.postInit(QTestUtil.java:565)
>         at 
> org.apache.hadoop.hive.cli.control.CliAdapter$1$1.evaluate(CliAdapter.java:88)
>         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
>         at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
>         at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
>         at 
> org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:369)
>         at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:275)
>         at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:239)
>         at 
> org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:160)
>         at 
> org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:373)
>         at 
> org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:334)
>         at 
> org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:119)
>         at 
> org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:407)[INFO]
>  
> [INFO] Results:
> [INFO] 
> [ERROR] Errors: 
> [ERROR]   
> TestMiniLlapLocalCliDriver.org.apache.hadoop.hive.cli.TestMiniLlapLocalCliDriver
>  » NoSuchMethod
>  {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26392) Move StringableMap tests into a dedicated test class

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26392?focusedWorklogId=824257=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824257
 ]

ASF GitHub Bot logged work on HIVE-26392:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 15:50
Start Date: 08/Nov/22 15:50
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3741:
URL: https://github.com/apache/hive/pull/3741#issuecomment-1307432083

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3741)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3741=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3741=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3741=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3741=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824257)
Time Spent: 20m  (was: 10m)

> Move StringableMap tests into a dedicated test class
> 
>
> Key: HIVE-26392
> URL: https://issues.apache.org/jira/browse/HIVE-26392
> Project: Hive
>  Issue Type: Test
>  Components: Hive
>Reporter: Zsolt Miskolczi
>Assignee: Zoltán Rátkai
>Priority: Minor
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> `StringableMap` has unit tests in `TestWorker.java`. They could be in their 
> own dedicated test class instead. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26392) Move StringableMap tests into a dedicated test class

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26392?focusedWorklogId=824239=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824239
 ]

ASF GitHub Bot logged work on HIVE-26392:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 15:06
Start Date: 08/Nov/22 15:06
Worklog Time Spent: 10m 
  Work Description: zratkai opened a new pull request, #3741:
URL: https://github.com/apache/hive/pull/3741

   Moved unit test for StringableList, StringableMap to they own dedicated test 
classes instead.  




Issue Time Tracking
---

Worklog Id: (was: 824239)
Remaining Estimate: 0h
Time Spent: 10m

> Move StringableMap tests into a dedicated test class
> 
>
> Key: HIVE-26392
> URL: https://issues.apache.org/jira/browse/HIVE-26392
> Project: Hive
>  Issue Type: Test
>  Components: Hive
>Reporter: Zsolt Miskolczi
>Assignee: Zoltán Rátkai
>Priority: Minor
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> `StringableMap` has unit tests in `TestWorker.java`. They could be in their 
> own dedicated test class instead. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26392) Move StringableMap tests into a dedicated test class

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26392?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

ASF GitHub Bot updated HIVE-26392:
--
Labels: pull-request-available  (was: )

> Move StringableMap tests into a dedicated test class
> 
>
> Key: HIVE-26392
> URL: https://issues.apache.org/jira/browse/HIVE-26392
> Project: Hive
>  Issue Type: Test
>  Components: Hive
>Reporter: Zsolt Miskolczi
>Assignee: Zoltán Rátkai
>Priority: Minor
>  Labels: pull-request-available
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> `StringableMap` has unit tests in `TestWorker.java`. They could be in their 
> own dedicated test class instead. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824204=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824204
 ]

ASF GitHub Bot logged work on HIVE-26656:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 13:05
Start Date: 08/Nov/22 13:05
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3740:
URL: https://github.com/apache/hive/pull/3740#issuecomment-1307186388

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3740)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3740=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3740=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3740=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3740=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824204)
Time Spent: 1.5h  (was: 1h 20m)

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
> Attachments: tree.txt
>
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26696) Implement row iterator for VectorizedRowBatch

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26696?focusedWorklogId=824195=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824195
 ]

ASF GitHub Bot logged work on HIVE-26696:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 12:52
Start Date: 08/Nov/22 12:52
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3737:
URL: https://github.com/apache/hive/pull/3737#issuecomment-1307167669

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3737)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3737=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
 [8 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3737=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3737=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824195)
Time Spent: 0.5h  (was: 20m)

> Implement row iterator for VectorizedRowBatch
> -
>
> Key: HIVE-26696
> URL: https://issues.apache.org/jira/browse/HIVE-26696
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> In order to utilize the existing DeleteFilter implementation of Iceberg we'll 
> need to provide a row iterator that iterates through the rows of a 
> VectorizedRowBatch instance.
> This can be used during a read with positional deletes, but it will be 
> especially required for implementing equality deletes.
> A HiveRow concept needs to be created along with a converter class that 
> provides row data information that's usable as an Iceberg Record.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread Devaspati Krishnatri (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Devaspati Krishnatri updated HIVE-26656:

Attachment: tree.txt

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
> Attachments: tree.txt
>
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824190=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824190
 ]

ASF GitHub Bot logged work on HIVE-26656:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 12:18
Start Date: 08/Nov/22 12:18
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri closed pull request #3694: 
HIVE-26656:Remove hsqldb dependency in hive due to CVE-2022-41853
URL: https://github.com/apache/hive/pull/3694




Issue Time Tracking
---

Worklog Id: (was: 824190)
Time Spent: 1h 20m  (was: 1h 10m)

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824189=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824189
 ]

ASF GitHub Bot logged work on HIVE-26656:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 12:18
Start Date: 08/Nov/22 12:18
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri commented on PR #3740:
URL: https://github.com/apache/hive/pull/3740#issuecomment-1307120922

   @saihemanth-cloudera please see this




Issue Time Tracking
---

Worklog Id: (was: 824189)
Time Spent: 1h 10m  (was: 1h)

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?focusedWorklogId=824188=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824188
 ]

ASF GitHub Bot logged work on HIVE-26656:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 12:17
Start Date: 08/Nov/22 12:17
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri opened a new pull request, #3740:
URL: https://github.com/apache/hive/pull/3740

   
   
   ### What changes were proposed in this pull request?
   Remove hsqldb dependency in hive 
   
   
   ### Why are the changes needed?
   fix cve
   
   
   ### Does this PR introduce _any_ user-facing change?
   no
   
   
   ### How was this patch tested?
   manual




Issue Time Tracking
---

Worklog Id: (was: 824188)
Time Spent: 1h  (was: 50m)

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (HIVE-25483) TxnHandler::acquireLock should close the DB conn to avoid connection leaks

2022-11-08 Thread KIRTI RUGE (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-25483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17629600#comment-17629600
 ] 

KIRTI RUGE edited comment on HIVE-25483 at 11/8/22 12:15 PM:
-

This has been taken care already.

TxnHandler.acquireLock() closes all DB connections .

This has been fixed as a part of 

[*HIVE-24236: Fixed possible Connection leaks in TxnHandler (Yongzhi Chen, 
reviewed by Denys Kuzmenko)*|https://github.com/apache/hive/pull/1559/files#top]


was (Author: JIRAUSER294595):
This has been taken care already.

TxnHandler.acquireLock() closes all DB connections .

> TxnHandler::acquireLock should close the DB conn to avoid connection leaks
> --
>
> Key: HIVE-25483
> URL: https://issues.apache.org/jira/browse/HIVE-25483
> Project: Hive
>  Issue Type: Improvement
>Reporter: Rajesh Balamohan
>Assignee: KIRTI RUGE
>Priority: Major
>
> TxnHandler::acquireLock should close DB connection on exiting the function. 
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5688]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5726]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5737-L5740]
>  If there are any exceptions downstream, this connection isn't closed 
> cleanly. In a corner case, hikari connection leak detector reported the 
> following
> {noformat}
> 2021-08-26 09:19:18,102 WARN  com.zaxxer.hikari.pool.ProxyLeakTask: 
> [HikariPool-4 housekeeper]: Connection leak detection triggered for 
> org.postgresql.jdbc.PgConnection@77f76747, stack trace follows
> java.lang.Exception: Apparent connection leak detected
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.getDbConn(TxnHandler.java:3843)
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.acquireLock(TxnHandler.java:5135)
>  
> at 
> org.apache.hadoop.hive.ql.txn.compactor.Initiator.run(Initiator.java:107) 
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26641) Upgrade Guava: Google Core Libraries for Java to v28.2/31.1-jre due to medium CVEs

2022-11-08 Thread Devaspati Krishnatri (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26641?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Devaspati Krishnatri updated HIVE-26641:

Attachment: tree.txt

> Upgrade Guava: Google Core Libraries for Java to v28.2/31.1-jre due to medium 
> CVEs
> --
>
> Key: HIVE-26641
> URL: https://issues.apache.org/jira/browse/HIVE-26641
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
> Attachments: tree.txt
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread Devaspati Krishnatri (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Devaspati Krishnatri updated HIVE-26656:

Attachment: (was: tree.txt)

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 50m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26656) Remove hsqldb dependency in hive due to CVE-2022-41853

2022-11-08 Thread Devaspati Krishnatri (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Devaspati Krishnatri updated HIVE-26656:

Attachment: tree.txt

> Remove hsqldb dependency in hive due to CVE-2022-41853
> --
>
> Key: HIVE-26656
> URL: https://issues.apache.org/jira/browse/HIVE-26656
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
> Attachments: tree.txt
>
>  Time Spent: 50m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure

2022-11-08 Thread Ayush Saxena (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-26707?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17630299#comment-17630299
 ] 

Ayush Saxena commented on HIVE-26707:
-

Committed to master. 

Thanx [~szita] and [~cnauroth] for the reviews!!!

> Iceberg: Write failing due to Ranger Authorization failure
> --
>
> Key: HIVE-26707
> URL: https://issues.apache.org/jira/browse/HIVE-26707
> Project: Hive
>  Issue Type: Bug
>Reporter: Ayush Saxena
>Assignee: Ayush Saxena
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> {noformat}
> Caused by: java.lang.RuntimeException: MetaException(message:Permission 
> denied: user [systest] does not have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243)
>   at 
> org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80)
>   at 
> org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51)
>   at 
> org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277)
>   ... 36 more
> Caused by: MetaException(message:Permission denied: user [systest] does not 
> have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java)
>   at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965)
>   at 
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure

2022-11-08 Thread Ayush Saxena (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26707?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ayush Saxena resolved HIVE-26707.
-
Fix Version/s: 4.0.0
   Resolution: Fixed

> Iceberg: Write failing due to Ranger Authorization failure
> --
>
> Key: HIVE-26707
> URL: https://issues.apache.org/jira/browse/HIVE-26707
> Project: Hive
>  Issue Type: Bug
>Reporter: Ayush Saxena
>Assignee: Ayush Saxena
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> {noformat}
> Caused by: java.lang.RuntimeException: MetaException(message:Permission 
> denied: user [systest] does not have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243)
>   at 
> org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80)
>   at 
> org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51)
>   at 
> org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277)
>   ... 36 more
> Caused by: MetaException(message:Permission denied: user [systest] does not 
> have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java)
>   at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965)
>   at 
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26707) Iceberg: Write failing due to Ranger Authorization failure

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26707?focusedWorklogId=824161=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824161
 ]

ASF GitHub Bot logged work on HIVE-26707:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 09:19
Start Date: 08/Nov/22 09:19
Worklog Time Spent: 10m 
  Work Description: ayushtkn merged PR #3731:
URL: https://github.com/apache/hive/pull/3731




Issue Time Tracking
---

Worklog Id: (was: 824161)
Time Spent: 1h  (was: 50m)

> Iceberg: Write failing due to Ranger Authorization failure
> --
>
> Key: HIVE-26707
> URL: https://issues.apache.org/jira/browse/HIVE-26707
> Project: Hive
>  Issue Type: Bug
>Reporter: Ayush Saxena
>Assignee: Ayush Saxena
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> {noformat}
> Caused by: java.lang.RuntimeException: MetaException(message:Permission 
> denied: user [systest] does not have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.iceberg.relocated.com.google.common.base.Throwables.propagate(Throwables.java:243)
>   at 
> org.apache.iceberg.common.DynMethods$UnboundMethod.invoke(DynMethods.java:80)
>   at 
> org.apache.iceberg.hive.MetastoreUtil.alterTable(MetastoreUtil.java:64)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.lambda$persistTable$3(HiveTableOperations.java:322)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:58)
>   at org.apache.iceberg.ClientPoolImpl.run(ClientPoolImpl.java:51)
>   at 
> org.apache.iceberg.hive.CachedClientPool.run(CachedClientPool.java:76)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.persistTable(HiveTableOperations.java:321)
>   at 
> org.apache.iceberg.hive.HiveTableOperations.doCommit(HiveTableOperations.java:277)
>   ... 36 more
> Caused by: MetaException(message:Permission denied: user [systest] does not 
> have [RWSTORAGE] privilege on 
> [iceberg%3A%2F%2Fspark_iceberg%2Fsimple_types_avro%3Fsnapshot%3D%2Fwarehouse%2Ftablespace%2Fexternal%2Fhive%2Fspark_iceberg.db%2Fsimple_types_avro%2Fmetadata%2F0-50dd01bd-15d9-49bd-a970-80d89231d36c.metadata.json])
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result$alter_table_req_resultStandardScheme.read(ThriftHiveMetastore.java)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$alter_table_req_result.read(ThriftHiveMetastore.java)
>   at org.apache.thrift.TServiceClient.receiveBase(TServiceClient.java:88)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.recv_alter_table_req(ThriftHiveMetastore.java:2978)
>   at 
> org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Client.alter_table_req(ThriftHiveMetastore.java:2965)
>   at 
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.alter_table_with_environmentContext(HiveMetaStoreClient.java:482)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26713) StringExpr ArrayIndexOutOfBoundsException with LIKE '%xxx%'

2022-11-08 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26713?focusedWorklogId=824137=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-824137
 ]

ASF GitHub Bot logged work on HIVE-26713:
-

Author: ASF GitHub Bot
Created on: 08/Nov/22 08:31
Start Date: 08/Nov/22 08:31
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3739:
URL: https://github.com/apache/hive/pull/3739#issuecomment-1306824851

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3739)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3739=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3739=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3739=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3739=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 824137)
Time Spent: 20m  (was: 10m)

> StringExpr ArrayIndexOutOfBoundsException with LIKE '%xxx%'
> ---
>
> Key: HIVE-26713
> URL: https://issues.apache.org/jira/browse/HIVE-26713
> Project: Hive
>  Issue Type: Bug
>  Components: storage-api
>Affects Versions: All Versions
>Reporter: Ryu Kobayashi
>Assignee: Ryu Kobayashi
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> When LIKE(%xxx%) search is performed, if the character string contains 
> control characters, overflow occurs as follows.
> https://github.com/apache/hive/blob/master/storage-api/src/java/org/apache/hadoop/hive/ql/exec/vector/expressions/StringExpr.java#L345
> {code:java}
> // input[next] == -1
> // shift[input[next] & MAX_BYTE] == 255
> next += shift[input[next] & MAX_BYTE]; {code}
>  
> Stack trace:
> {code:java}
> TaskAttempt 3 failed, info=[Error: Error while running task ( failure ) : 
> attempt_1665986828766_64791_1_00_00_3:java.lang.RuntimeException: 
> java.lang.RuntimeException: org.apache.hadoop.hive.ql.metadata.HiveException: 
> Hive Runtime Error while processing row 
> 2 at 
> org.apache.hadoop.hive.ql.exec.tez.TezProcessor.initializeAndRunProcessor(TezProcessor.java:220)
> 3 at 
> org.apache.hadoop.hive.ql.exec.tez.TezProcessor.run(TezProcessor.java:177)
> 4 at 
>