[jira] [Work logged] (HIVE-27013) Provide an option to enable iceberg manifest caching for all catalogs

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27013?focusedWorklogId=849182=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849182
 ]

ASF GitHub Bot logged work on HIVE-27013:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 05:18
Start Date: 06/Mar/23 05:18
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4088:
URL: https://github.com/apache/hive/pull/4088#issuecomment-1455471161

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4088)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4088=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4088=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849182)
Time Spent: 2h 50m  (was: 2h 40m)

> Provide an option to enable iceberg manifest caching for all catalogs
> -
>
> Key: HIVE-27013
> URL: https://issues.apache.org/jira/browse/HIVE-27013
> Project: Hive
>  Issue Type: Improvement
>  Components: Iceberg integration
>Reporter: Rajesh Balamohan
>Assignee: Ayush Saxena
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 2h 50m
>  Remaining Estimate: 0h
>
> {color:#22}I tried the following thinking that it would work with iceberg 
> manifest caching; but it didn't.{color}
> {noformat}
> alter table store_sales set 
> tblproperties('io.manifest.cache-enabled'='true');{noformat}
> {color:#22}Creating this ticket as a placeholder to fix the same.{color}
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27020) Implement a separate handler to handle aborted transaction cleanup

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27020?focusedWorklogId=849180=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849180
 ]

ASF GitHub Bot logged work on HIVE-27020:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 04:45
Start Date: 06/Mar/23 04:45
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4091:
URL: https://github.com/apache/hive/pull/4091#issuecomment-1455442429

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4091)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
 [2 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
 [1 Security 
Hotspot](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
 [11 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4091=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4091=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849180)
Time Spent: 40m  (was: 0.5h)

> Implement a separate handler to handle aborted transaction cleanup
> --
>
> Key: HIVE-27020
> URL: https://issues.apache.org/jira/browse/HIVE-27020
> Project: Hive
>  Issue Type: Sub-task
>Reporter: Sourabh Badhya
>Assignee: Sourabh Badhya
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> As described in the parent task, once the cleaner is separated into different 
> entities, implement a separate handler which can create requests for aborted 
> transactions cleanup. This would move the aborted transaction cleanup 
> exclusively to the cleaner.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-24429) Figure out a better way to test failed compactions

2023-03-05 Thread KIRTI RUGE (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-24429?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

KIRTI RUGE reassigned HIVE-24429:
-

Assignee: KIRTI RUGE

> Figure out a better way to test failed compactions
> --
>
> Key: HIVE-24429
> URL: https://issues.apache.org/jira/browse/HIVE-24429
> Project: Hive
>  Issue Type: Improvement
>Reporter: Karen Coppage
>Assignee: KIRTI RUGE
>Priority: Major
>
> This block is executed during compaction: 
> {code:java}
> if(conf.getBoolVar(HiveConf.ConfVars.HIVE_IN_TEST) && 
> conf.getBoolVar(HiveConf.ConfVars.HIVETESTMODEFAILCOMPACTION)) {
>  throw new 
> RuntimeException(HiveConf.ConfVars.HIVETESTMODEFAILCOMPACTION.name() + 
> "=true");
> }{code}
> We should figure out a better way to test failed compaction than including 
> test code in the source.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27116) HS2 need to send owner info for UDFs in the HivePrivilegeObject for authorization

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27116?focusedWorklogId=849177=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849177
 ]

ASF GitHub Bot logged work on HIVE-27116:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 04:18
Start Date: 06/Mar/23 04:18
Worklog Time Spent: 10m 
  Work Description: dengzhhu653 commented on code in PR #4092:
URL: https://github.com/apache/hive/pull/4092#discussion_r1125883742


##
ql/src/java/org/apache/hadoop/hive/ql/security/authorization/command/CommandAuthorizerV2.java:
##
@@ -83,17 +84,16 @@ static void doAuthorization(HiveOperation op, 
BaseSemanticAnalyzer sem, SessionS
 ss.getAuthorizerV2().checkPrivileges(hiveOpType, inputsHObjs, outputHObjs, 
authzContextBuilder.build());
   }
 
-  private static void addPermanentFunctionEntities(SessionState ss, 
List inputList) throws HiveException {
+  private static void addPermanentFunctionEntities(SessionState ss, 
List inputList, BaseSemanticAnalyzer sem) throws HiveException {
 for (Entry function : 
ss.getCurrentFunctionsInUse().entrySet()) {
   if (function.getValue().getFunctionType() != FunctionType.PERSISTENT) {
 // Built-in function access is allowed to all users. If user can 
create a temp function, they may use it.
 continue;
   }
 
   String[] qualifiedFunctionName = 
FunctionUtils.getQualifiedFunctionNameParts(function.getKey());
-  // this is only for the purpose of authorization, only the name matters.
-  Database db = new Database(qualifiedFunctionName[0], "", "", null);
-  inputList.add(new ReadEntity(db, qualifiedFunctionName[1], 
function.getValue().getClassName(), Type.FUNCTION));
+  // For the purpose of authorization, we need to send full function 
object.
+  inputList.add(new 
ReadEntity(sem.getDb().getFunction(qualifiedFunctionName[0], 
qualifiedFunctionName[1])));

Review Comment:
   Why we fetch the function here?





Issue Time Tracking
---

Worklog Id: (was: 849177)
Time Spent: 1h 10m  (was: 1h)

> HS2 need to send owner info for UDFs in the HivePrivilegeObject for 
> authorization
> -
>
> Key: HIVE-27116
> URL: https://issues.apache.org/jira/browse/HIVE-27116
> Project: Hive
>  Issue Type: Bug
>  Components: HiveServer2, Security
>Reporter: Sai Hemanth Gantasala
>Assignee: Sai Hemanth Gantasala
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> UDFs (Functions) of HivePrivilegeObject should have owner info for 
> authorization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27116) HS2 need to send owner info for UDFs in the HivePrivilegeObject for authorization

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27116?focusedWorklogId=849176=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849176
 ]

ASF GitHub Bot logged work on HIVE-27116:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 04:17
Start Date: 06/Mar/23 04:17
Worklog Time Spent: 10m 
  Work Description: dengzhhu653 commented on code in PR #4092:
URL: https://github.com/apache/hive/pull/4092#discussion_r1125883060


##
ql/src/java/org/apache/hadoop/hive/ql/ddl/function/AbstractFunctionAnalyzer.java:
##
@@ -66,11 +70,24 @@ protected void addEntities(String functionName, String 
className, boolean isTemp
 }
 if (database != null) {
   outputs.add(new WriteEntity(database, 
WriteEntity.WriteType.DDL_NO_LOCK));
+  // Add the permanent function as a WriteEntity
+  Function function;
+  if (isCreate) {
+function = new Function(functionName, database.getName(), className,
+SessionState.getUserFromAuthenticator(), PrincipalType.USER,
+(int) (System.currentTimeMillis() / 1000), FunctionType.JAVA, 
resources);
+  } else {
+try {
+  function = db.getFunction(database.getName(), functionName);

Review Comment:
   Why we fetch the function here, can we just create the function as the 
temporary function does?





Issue Time Tracking
---

Worklog Id: (was: 849176)
Time Spent: 1h  (was: 50m)

> HS2 need to send owner info for UDFs in the HivePrivilegeObject for 
> authorization
> -
>
> Key: HIVE-27116
> URL: https://issues.apache.org/jira/browse/HIVE-27116
> Project: Hive
>  Issue Type: Bug
>  Components: HiveServer2, Security
>Reporter: Sai Hemanth Gantasala
>Assignee: Sai Hemanth Gantasala
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> UDFs (Functions) of HivePrivilegeObject should have owner info for 
> authorization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27116) HS2 need to send owner info for UDFs in the HivePrivilegeObject for authorization

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27116?focusedWorklogId=849175=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849175
 ]

ASF GitHub Bot logged work on HIVE-27116:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 04:16
Start Date: 06/Mar/23 04:16
Worklog Time Spent: 10m 
  Work Description: dengzhhu653 commented on code in PR #4092:
URL: https://github.com/apache/hive/pull/4092#discussion_r1125882214


##
ql/src/java/org/apache/hadoop/hive/ql/ddl/function/AbstractFunctionAnalyzer.java:
##
@@ -66,11 +70,24 @@ protected void addEntities(String functionName, String 
className, boolean isTemp
 }
 if (database != null) {
   outputs.add(new WriteEntity(database, 
WriteEntity.WriteType.DDL_NO_LOCK));
+  // Add the permanent function as a WriteEntity
+  Function function;
+  if (isCreate) {

Review Comment:
   Can we use `queryState.getHiveOperation() == HiveOperation.CREATEFUNCTION` 
instead of passing an argument `isCreate`?





Issue Time Tracking
---

Worklog Id: (was: 849175)
Time Spent: 50m  (was: 40m)

> HS2 need to send owner info for UDFs in the HivePrivilegeObject for 
> authorization
> -
>
> Key: HIVE-27116
> URL: https://issues.apache.org/jira/browse/HIVE-27116
> Project: Hive
>  Issue Type: Bug
>  Components: HiveServer2, Security
>Reporter: Sai Hemanth Gantasala
>Assignee: Sai Hemanth Gantasala
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> UDFs (Functions) of HivePrivilegeObject should have owner info for 
> authorization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26891) Fix TestArrowColumnarBatchSerDe test failures in branch-3

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26891?focusedWorklogId=849162=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849162
 ]

ASF GitHub Bot logged work on HIVE-26891:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 00:22
Start Date: 06/Mar/23 00:22
Worklog Time Spent: 10m 
  Work Description: github-actions[bot] closed pull request #3897: 
HIVE-26891: Fix TestArrowColumnarBatchSerDe test failures in branch-3
URL: https://github.com/apache/hive/pull/3897




Issue Time Tracking
---

Worklog Id: (was: 849162)
Time Spent: 0.5h  (was: 20m)

> Fix TestArrowColumnarBatchSerDe test failures in branch-3
> -
>
> Key: HIVE-26891
> URL: https://issues.apache.org/jira/browse/HIVE-26891
> Project: Hive
>  Issue Type: Bug
>Affects Versions: 3.0.0
>Reporter: Raghav Aggarwal
>Assignee: Raghav Aggarwal
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> Because of the _*Jackson*_ version upgrade to {_}2.12.0 in this 
> [commit|https://github.com/apache/hive/commit/0ba9b619ddea3ef2bbc067927c5ea598caa002f7]{_},
>  there are unit test failure which are related to {_}*arrow*{_}.
> Stack Trace:
> {code:java}
> [ERROR] 
> testMapDTI(org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe)  
> Time elapsed: 0.034 s  <<< ERROR!
> java.lang.IllegalStateException: Cannot serialize array list to JSON string
>     at 
> org.apache.arrow.vector.util.JsonStringArrayList.toString(JsonStringArrayList.java:47)
>     at java.lang.String.valueOf(String.java:2994)
>     at java.lang.StringBuilder.append(StringBuilder.java:137)
>     at 
> org.apache.arrow.vector.VectorSchemaRoot.printRow(VectorSchemaRoot.java:128)
>     at 
> org.apache.arrow.vector.VectorSchemaRoot.contentToTSVString(VectorSchemaRoot.java:145)
>     at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.serializeAndDeserialize(TestArrowColumnarBatchSerDe.java:242)
>     at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.initAndSerializeAndDeserialize(TestArrowColumnarBatchSerDe.java:204)
>     at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.testMapDTI(TestArrowColumnarBatchSerDe.java:750)
>     at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>     at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>     at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>     at java.lang.reflect.Method.invoke(Method.java:498)
>     at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
>     at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>     at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
>     at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>     at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>     at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
>     at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
>     at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
>     at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
>     at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
>     at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
>     at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
>     at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
>     at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
>     at 
> org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
>     at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
>     at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
>     at 
> org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
>     at 
> org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:379)
>     at 
> org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:340)
>     at 
> org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:125)
>     at 
> org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:413)
> Caused by: com.fasterxml.jackson.databind.exc.InvalidDefinitionException: 
> Joda date/time type `org.joda.time.Period` not supported by default: add 
> Module "com.fasterxml.jackson.datatype:jackson-datatype-joda" to enable 
> handling (through 

[jira] [Work logged] (HIVE-26863) Fix TestArrowColumnarBatchSerDe test failures in branch-3.1

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26863?focusedWorklogId=849163=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849163
 ]

ASF GitHub Bot logged work on HIVE-26863:
-

Author: ASF GitHub Bot
Created on: 06/Mar/23 00:22
Start Date: 06/Mar/23 00:22
Worklog Time Spent: 10m 
  Work Description: github-actions[bot] closed pull request #3866: 
HIVE-26863: Fix TestArrowColumnarBatchSerDe test failures in branch-3.1
URL: https://github.com/apache/hive/pull/3866




Issue Time Tracking
---

Worklog Id: (was: 849163)
Time Spent: 1h 20m  (was: 1h 10m)

> Fix TestArrowColumnarBatchSerDe test failures in branch-3.1
> ---
>
> Key: HIVE-26863
> URL: https://issues.apache.org/jira/browse/HIVE-26863
> Project: Hive
>  Issue Type: Bug
>Affects Versions: 3.1.3
>Reporter: Raghav Aggarwal
>Assignee: Raghav Aggarwal
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>
> Because of the _*Jackson*_ version upgrade to {_}2.12.0 in this 
> [commit|https://github.com/apache/hive/commit/e9b2acf3fe2d564b1da2b3e637f6748c7db4a613]{_},
>  there are unit test failure which are related to {_}*arrow*{_}.
>  
> *Stack Trace:*
>  
> {code:java}
> [ERROR] 
> testMapDTI(org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe)  
> Time elapsed: 0.037 s  <<< ERROR!
> java.lang.IllegalStateException: Cannot serialize array list to JSON string
>   at 
> org.apache.arrow.vector.util.JsonStringArrayList.toString(JsonStringArrayList.java:47)
>   at java.lang.String.valueOf(String.java:2994)
>   at java.lang.StringBuilder.append(StringBuilder.java:137)
>   at 
> org.apache.arrow.vector.VectorSchemaRoot.printRow(VectorSchemaRoot.java:128)
>   at 
> org.apache.arrow.vector.VectorSchemaRoot.contentToTSVString(VectorSchemaRoot.java:145)
>   at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.serializeAndDeserialize(TestArrowColumnarBatchSerDe.java:242)
>   at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.initAndSerializeAndDeserialize(TestArrowColumnarBatchSerDe.java:204)
>   at 
> org.apache.hadoop.hive.ql.io.arrow.TestArrowColumnarBatchSerDe.testMapDTI(TestArrowColumnarBatchSerDe.java:750)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at 
> org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
>   at 
> org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
>   at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
>   at 
> org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
>   at 
> org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
>   at 
> org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:379)
>   at 
> org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:340)
>   at 
> org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:125)
>   at 
> org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:413)
> Caused by: com.fasterxml.jackson.databind.exc.InvalidDefinitionException: 
> Joda date/time type `org.joda.time.Period` not supported by default: add 
> Module 

[jira] [Work logged] (HIVE-27013) Provide an option to enable iceberg manifest caching for all catalogs

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27013?focusedWorklogId=849159=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849159
 ]

ASF GitHub Bot logged work on HIVE-27013:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 22:20
Start Date: 05/Mar/23 22:20
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4088:
URL: https://github.com/apache/hive/pull/4088#issuecomment-1455225003

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4088)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4088=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4088=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4088=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4088=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849159)
Time Spent: 2h 40m  (was: 2.5h)

> Provide an option to enable iceberg manifest caching for all catalogs
> -
>
> Key: HIVE-27013
> URL: https://issues.apache.org/jira/browse/HIVE-27013
> Project: Hive
>  Issue Type: Improvement
>  Components: Iceberg integration
>Reporter: Rajesh Balamohan
>Assignee: Ayush Saxena
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 2h 40m
>  Remaining Estimate: 0h
>
> {color:#22}I tried the following thinking that it would work with iceberg 
> manifest caching; but it didn't.{color}
> {noformat}
> alter table store_sales set 
> tblproperties('io.manifest.cache-enabled'='true');{noformat}
> {color:#22}Creating this ticket as a placeholder to fix the same.{color}
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27020) Implement a separate handler to handle aborted transaction cleanup

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27020?focusedWorklogId=849156=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849156
 ]

ASF GitHub Bot logged work on HIVE-27020:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 19:39
Start Date: 05/Mar/23 19:39
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4091:
URL: https://github.com/apache/hive/pull/4091#issuecomment-1455183891

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4091)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
 [2 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
 [1 Security 
Hotspot](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4091=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
 [11 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4091=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4091=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4091=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849156)
Time Spent: 0.5h  (was: 20m)

> Implement a separate handler to handle aborted transaction cleanup
> --
>
> Key: HIVE-27020
> URL: https://issues.apache.org/jira/browse/HIVE-27020
> Project: Hive
>  Issue Type: Sub-task
>Reporter: Sourabh Badhya
>Assignee: Sourabh Badhya
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> As described in the parent task, once the cleaner is separated into different 
> entities, implement a separate handler which can create requests for aborted 
> transactions cleanup. This would move the aborted transaction cleanup 
> exclusively to the cleaner.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26900) Error message not representing the correct line number with a syntax error in a HQL File

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26900?focusedWorklogId=849154=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849154
 ]

ASF GitHub Bot logged work on HIVE-26900:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 18:33
Start Date: 05/Mar/23 18:33
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4097:
URL: https://github.com/apache/hive/pull/4097#issuecomment-1455168198

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4097)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4097=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4097=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4097=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=CODE_SMELL)
 [2 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4097=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4097=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4097=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849154)
Time Spent: 20m  (was: 10m)

> Error message not representing the correct line number with a syntax error in 
> a HQL File
> 
>
> Key: HIVE-26900
> URL: https://issues.apache.org/jira/browse/HIVE-26900
> Project: Hive
>  Issue Type: Bug
>Affects Versions: 3.1.2, 4.0.0-alpha-1, 4.0.0-alpha-2
>Reporter: Vikram Ahuja
>Priority: Minor
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> When a wrong syntax is added in a HQL file, the error thrown by beeline while 
> running the HQL file is having the wrong line number.  The line number and 
> even the position is incorrect. Seems like parser is not considering spaces 
> and new lines and always throwing the error on line number 1 irrespective of 
> what line the error is on in the HQL file
>  
> For instance, consider the following test.hql file:
>  # --comment
>  # --comment
>  # SET hive.server2.logging.operation.enabled=true;
>  # SET hive.server2.logging.operation.level=VERBOSE;
>  # show tables;
>  #  
>  #  
>  #       CREATE TABLEE DUMMY;
>  
> when we call !run  test.hql in beeline or trigger ./beeline -u 
> jdbc:hive2://localhost:1 -f test.hql, The issue thrown by beeline is
> >>> CREATE TABLEE DUMMY;
> Error: Error while compiling statement: FAILED: ParseException line 1:7 
> cannot recongize input near 'CREATE' 'TABLEE' 

[jira] [Work logged] (HIVE-26900) Error message not representing the correct line number with a syntax error in a HQL File

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26900?focusedWorklogId=849152=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849152
 ]

ASF GitHub Bot logged work on HIVE-26900:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 17:50
Start Date: 05/Mar/23 17:50
Worklog Time Spent: 10m 
  Work Description: shreeyasand opened a new pull request, #4097:
URL: https://github.com/apache/hive/pull/4097

   …th a syntax error in a HQL File
   
   ### What changes were proposed in this pull request?
   
   1.  In the Beeline class: 
   
   - the execute method (at line 1362) has been modified to make one string out 
of all the contents of the hql file separated by newline characters (the 
comments are excluded).
   - if the final string is null, the code exits the while loop (it implies 
that there is no command to be executed).
   
   2. In the Commands class:
   
   - the methods handleMultiLineCmd (at line 1090) and isMultiLine (at line 
1131) and the try-catch loop calling the method has been removed. This is done 
since the changes in the Beeline class handles the functionality ensured by 
these two methods, rendering these methods redundant.
   - Each hql file is handled same as multiple sql in a single line would be. 
The for-loop (starting at line 1213) separates each command from the string of 
command and then that command is executed, followed by the next command.
   
   In both the classes, the trim() method has been removed from a few places. 
This is done so that the whitespaces and empty lines are not ignored while 
counting the line numbers.
   
   
   ### Why are the changes needed?
   
   Hive Cli throws error line number correctly when reading HQL files, but 
Beeline does not. These changes are needed so that the error line number is 
thrown correctly and there is no discrepancy between the functioning of Beeline 
and Hive Cli. 
   
   
   ### Does this PR introduce _any_ user-facing change?
   
   Error message in Beeline was not representing the correct line number prior 
to the changes. Now Beeline prints the correct error line number.
   
   
   
   ### How was this patch tested?
   
   The testing was done locally on Beeline with multiple scenarios. The test 
were verified against the correctly functioning Hive Cli.
   As an example, for the given hql file:
   https://user-images.githubusercontent.com/50237152/222977016-e8a72f33-2f47-4ad4-aeff-2afb6f4a3bc9.png;>
   Error message prior to the changes:
   https://user-images.githubusercontent.com/50237152/222977044-90f746ee-1958-4c6a-9627-c1c1e2a173cc.png;>
   Error message after the changes:
   https://user-images.githubusercontent.com/50237152/222977064-d19b6bb8-b2bc-4292-a24a-1a14d04ab3eb.png;>
   
   
   




Issue Time Tracking
---

Worklog Id: (was: 849152)
Remaining Estimate: 0h
Time Spent: 10m

> Error message not representing the correct line number with a syntax error in 
> a HQL File
> 
>
> Key: HIVE-26900
> URL: https://issues.apache.org/jira/browse/HIVE-26900
> Project: Hive
>  Issue Type: Bug
>Affects Versions: 3.1.2, 4.0.0-alpha-1, 4.0.0-alpha-2
>Reporter: Vikram Ahuja
>Priority: Minor
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> When a wrong syntax is added in a HQL file, the error thrown by beeline while 
> running the HQL file is having the wrong line number.  The line number and 
> even the position is incorrect. Seems like parser is not considering spaces 
> and new lines and always throwing the error on line number 1 irrespective of 
> what line the error is on in the HQL file
>  
> For instance, consider the following test.hql file:
>  # --comment
>  # --comment
>  # SET hive.server2.logging.operation.enabled=true;
>  # SET hive.server2.logging.operation.level=VERBOSE;
>  # show tables;
>  #  
>  #  
>  #       CREATE TABLEE DUMMY;
>  
> when we call !run  test.hql in beeline or trigger ./beeline -u 
> jdbc:hive2://localhost:1 -f test.hql, The issue thrown by beeline is
> >>> CREATE TABLEE DUMMY;
> Error: Error while compiling statement: FAILED: ParseException line 1:7 
> cannot recongize input near 'CREATE' 'TABLEE' 'DUMMY' in ddl statement 
> (state=42000,code=4)
> The parser seems to be taking all the lines from 1 and is ignoring spaces in 
> the line.
> The error line in the parse exception is shown as 1:7 but it should have been 
> 8:13.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26900) Error message not representing the correct line number with a syntax error in a HQL File

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26900?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

ASF GitHub Bot updated HIVE-26900:
--
Labels: pull-request-available  (was: )

> Error message not representing the correct line number with a syntax error in 
> a HQL File
> 
>
> Key: HIVE-26900
> URL: https://issues.apache.org/jira/browse/HIVE-26900
> Project: Hive
>  Issue Type: Bug
>Affects Versions: 3.1.2, 4.0.0-alpha-1, 4.0.0-alpha-2
>Reporter: Vikram Ahuja
>Priority: Minor
>  Labels: pull-request-available
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> When a wrong syntax is added in a HQL file, the error thrown by beeline while 
> running the HQL file is having the wrong line number.  The line number and 
> even the position is incorrect. Seems like parser is not considering spaces 
> and new lines and always throwing the error on line number 1 irrespective of 
> what line the error is on in the HQL file
>  
> For instance, consider the following test.hql file:
>  # --comment
>  # --comment
>  # SET hive.server2.logging.operation.enabled=true;
>  # SET hive.server2.logging.operation.level=VERBOSE;
>  # show tables;
>  #  
>  #  
>  #       CREATE TABLEE DUMMY;
>  
> when we call !run  test.hql in beeline or trigger ./beeline -u 
> jdbc:hive2://localhost:1 -f test.hql, The issue thrown by beeline is
> >>> CREATE TABLEE DUMMY;
> Error: Error while compiling statement: FAILED: ParseException line 1:7 
> cannot recongize input near 'CREATE' 'TABLEE' 'DUMMY' in ddl statement 
> (state=42000,code=4)
> The parser seems to be taking all the lines from 1 and is ignoring spaces in 
> the line.
> The error line in the parse exception is shown as 1:7 but it should have been 
> 8:13.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27120) Warn when Authorizer V2 is configured

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27120?focusedWorklogId=849149=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849149
 ]

ASF GitHub Bot logged work on HIVE-27120:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 14:44
Start Date: 05/Mar/23 14:44
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #4095:
URL: https://github.com/apache/hive/pull/4095#issuecomment-1455111829

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=4095)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4095=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4095=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=4095=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=4095=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4095=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=4095=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 849149)
Time Spent: 50m  (was: 40m)

> Warn when Authorizer V2 is configured
> -
>
> Key: HIVE-27120
> URL: https://issues.apache.org/jira/browse/HIVE-27120
> Project: Hive
>  Issue Type: Improvement
>Reporter: okumin
>Assignee: okumin
>Priority: Minor
>  Labels: pull-request-available
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> SessionState configures an internal param that is not listed in HiveConf. It 
> causes WARN.
> {code:java}
> pod/hive-hiveserver2-7fc4df88b6-dmn8v: 2023-03-01T13:50:38,959  WARN [main] 
> conf.HiveConf: HiveConf of name 
> hive.internal.ss.authz.settings.applied.marker does not exist {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-27094) Big numbers support for `conv` function

2023-03-05 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-27094?focusedWorklogId=849141=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-849141
 ]

ASF GitHub Bot logged work on HIVE-27094:
-

Author: ASF GitHub Bot
Created on: 05/Mar/23 08:31
Start Date: 05/Mar/23 08:31
Worklog Time Spent: 10m 
  Work Description: NarekDW commented on PR #4074:
URL: https://github.com/apache/hive/pull/4074#issuecomment-1455024828

   @kgyrtkirk could you take a look, pls?




Issue Time Tracking
---

Worklog Id: (was: 849141)
Time Spent: 1h 10m  (was: 1h)

> Big numbers support for `conv` function 
> 
>
> Key: HIVE-27094
> URL: https://issues.apache.org/jira/browse/HIVE-27094
> Project: Hive
>  Issue Type: New Feature
>  Components: SQL
>Affects Versions: 4.0.0
>Reporter: Narek Karapetian
>Assignee: Narek Karapetian
>Priority: Minor
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Add support for converting big numbers between different radixes, without an 
> overflow.
> For example such a query:
> {code:java}
> SELECT
>   conv(9223372036854775807, 36, 16),
>   conv(9223372036854775807, 36, -16),
>   conv(-9223372036854775807, 36, 16),
>   conv(-9223372036854775807, 36, -16)
> FROM src tablesample (1 rows); {code}
>  Should give a correct result, like:
> {code:java}
> 12DDAC15F246BAF8C0D551AC7   12DDAC15F246BAF8C0D551AC7  
> D2253EA0DB945073F2AAE539   -12DDAC15F246BAF8C0D551AC7
>  {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)