[jira] [Created] (HIVE-6598) Importing the project into eclipse as maven project have some issues

2014-03-10 Thread Chinna Rao Lalam (JIRA)
Chinna Rao Lalam created HIVE-6598:
--

 Summary: Importing the project into eclipse as maven project have 
some issues
 Key: HIVE-6598
 URL: https://issues.apache.org/jira/browse/HIVE-6598
 Project: Hive
  Issue Type: Bug
 Environment: Windows 8 ,Eclipse Kepler and Maven 3.1.1
Reporter: Chinna Rao Lalam
Assignee: Chinna Rao Lalam


Importing the project into eclipse as maven project throwing these problems.

Plugin execution not covered by lifecycle configuration: 
org.apache.maven.plugins:maven-antrun-plugin:1.7:run (execution: 
setup-test-dirs, phase: process-test-resources)




--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6594) UnsignedInt128 addition does not increase internal int array count resulting in corrupted values during serialization

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6594?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925477#comment-13925477
 ] 

Hive QA commented on HIVE-6594:
---



{color:green}Overall{color}: +1 all checks pass

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633542/HIVE-6594.2.patch

{color:green}SUCCESS:{color} +1 5375 tests passed

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1685/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1685/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633542

 UnsignedInt128 addition does not increase internal int array count resulting 
 in corrupted values during serialization
 -

 Key: HIVE-6594
 URL: https://issues.apache.org/jira/browse/HIVE-6594
 Project: Hive
  Issue Type: Bug
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
 Attachments: HIVE-6594.1.patch, HIVE-6594.2.patch


 Discovered this while investigating why my fix for HIVE-6222 produced diffs. 
 I discovered that Decimal128.addDestructive does not adjust the internal 
 count when an the number of relevant ints increases. Since this count is used 
 in the fast HiveDecimalWriter conversion code, the results are off. 
 The root cause is UnsignedDecimal128.differenceInternal does not do an 
 updateCount() on the result.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6598) Importing the project into eclipse as maven project have some issues

2014-03-10 Thread Chinna Rao Lalam (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6598?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chinna Rao Lalam updated HIVE-6598:
---

Attachment: HIVE-6598.patch

Added plugin's configuration.

 Importing the project into eclipse as maven project have some issues
 

 Key: HIVE-6598
 URL: https://issues.apache.org/jira/browse/HIVE-6598
 Project: Hive
  Issue Type: Bug
 Environment: Windows 8 ,Eclipse Kepler and Maven 3.1.1
Reporter: Chinna Rao Lalam
Assignee: Chinna Rao Lalam
 Attachments: HIVE-6598.patch


 Importing the project into eclipse as maven project throwing these problems.
 Plugin execution not covered by lifecycle configuration: 
 org.apache.maven.plugins:maven-antrun-plugin:1.7:run (execution: 
 setup-test-dirs, phase: process-test-resources)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6598) Importing the project into eclipse as maven project have some issues

2014-03-10 Thread Chinna Rao Lalam (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6598?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chinna Rao Lalam updated HIVE-6598:
---

Fix Version/s: 0.13.0
Affects Version/s: 0.13.0
   Status: Patch Available  (was: Open)

 Importing the project into eclipse as maven project have some issues
 

 Key: HIVE-6598
 URL: https://issues.apache.org/jira/browse/HIVE-6598
 Project: Hive
  Issue Type: Bug
Affects Versions: 0.13.0
 Environment: Windows 8 ,Eclipse Kepler and Maven 3.1.1
Reporter: Chinna Rao Lalam
Assignee: Chinna Rao Lalam
 Fix For: 0.13.0

 Attachments: HIVE-6598.patch


 Importing the project into eclipse as maven project throwing these problems.
 Plugin execution not covered by lifecycle configuration: 
 org.apache.maven.plugins:maven-antrun-plugin:1.7:run (execution: 
 setup-test-dirs, phase: process-test-resources)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925486#comment-13925486
 ] 

Thejas M Nair commented on HIVE-6486:
-

[~rhbutani] I think it will be very valuable to have this patch committed to 
0.13 as well.


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Reopened] (HIVE-6485) Downgrade to httpclient-4.2.5 in JDBC from httpclient-4.3.2

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6485?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair reopened HIVE-6485:
-


Lets mark it as fixed only after HIVE-4764 goes in. (alternatively, maybe mark 
it as duplicate ).


 Downgrade to httpclient-4.2.5 in JDBC from httpclient-4.3.2
 ---

 Key: HIVE-6485
 URL: https://issues.apache.org/jira/browse/HIVE-6485
 Project: Hive
  Issue Type: Bug
  Components: JDBC
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6485.1.patch


 Had upgraded to the new version while adding SSL over Http mode support for 
 HiveServer2. But that conflicts with httpclient-4.2.5 which is in hadoop 
 classpath. I don't have a good reason to use httpclient-4.3.2, so it's better 
 to match hadoop.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-4629) HS2 should support an API to retrieve query logs

2014-03-10 Thread Carl Steinbach (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-4629?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925491#comment-13925491
 ] 

Carl Steinbach commented on HIVE-4629:
--

Does the new version of the patch address any of the API design issues I 
mentioned earlier?

 HS2 should support an API to retrieve query logs
 

 Key: HIVE-4629
 URL: https://issues.apache.org/jira/browse/HIVE-4629
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Reporter: Shreepadma Venugopalan
Assignee: Shreepadma Venugopalan
 Attachments: HIVE-4629-no_thrift.1.patch, HIVE-4629.1.patch, 
 HIVE-4629.2.patch


 HiveServer2 should support an API to retrieve query logs. This is 
 particularly relevant because HiveServer2 supports async execution but 
 doesn't provide a way to report progress. Providing an API to retrieve query 
 logs will help report progress to the client.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Lefty Leverenz (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925504#comment-13925504
 ] 

Lefty Leverenz commented on HIVE-6486:
--

[~shivshi], the release note looks good to me.  I'll make a few minor edits 
when I put it in the JDBC section of the HS2 Clients wiki (which will probably 
happen tomorrow), then you can review to make sure your meaning didn't get 
changed.

 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925526#comment-13925526
 ] 

Hive QA commented on HIVE-6222:
---



{color:red}Overall{color}: -1 no tests executed

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633560/HIVE-6222.1.patch

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1687/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1687/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Tests exited with: NonZeroExitCodeException
Command 'bash /data/hive-ptest/working/scratch/source-prep.sh' failed with exit 
status 1 and output '+ [[ -n '' ]]
+ export 'ANT_OPTS=-Xmx1g -XX:MaxPermSize=256m '
+ ANT_OPTS='-Xmx1g -XX:MaxPermSize=256m '
+ export 'M2_OPTS=-Xmx1g -XX:MaxPermSize=256m -Dhttp.proxyHost=localhost 
-Dhttp.proxyPort=3128'
+ M2_OPTS='-Xmx1g -XX:MaxPermSize=256m -Dhttp.proxyHost=localhost 
-Dhttp.proxyPort=3128'
+ cd /data/hive-ptest/working/
+ tee /data/hive-ptest/logs/PreCommit-HIVE-Build-1687/source-prep.txt
+ [[ false == \t\r\u\e ]]
+ mkdir -p maven ivy
+ [[ svn = \s\v\n ]]
+ [[ -n '' ]]
+ [[ -d apache-svn-trunk-source ]]
+ [[ ! -d apache-svn-trunk-source/.svn ]]
+ [[ ! -d apache-svn-trunk-source ]]
+ cd apache-svn-trunk-source
+ svn revert -R .
++ awk '{print $2}'
++ egrep -v '^X|^Performing status on external'
++ svn status --no-ignore
+ rm -rf target datanucleus.log ant/target shims/target shims/0.20/target 
shims/0.20S/target shims/0.23/target shims/aggregator/target 
shims/common/target shims/common-secure/target packaging/target 
hbase-handler/target testutils/target jdbc/target metastore/target 
itests/target itests/hcatalog-unit/target itests/test-serde/target 
itests/qtest/target itests/hive-unit/target itests/custom-serde/target 
itests/util/target hcatalog/target hcatalog/storage-handlers/hbase/target 
hcatalog/server-extensions/target hcatalog/core/target 
hcatalog/webhcat/svr/target hcatalog/webhcat/java-client/target 
hcatalog/hcatalog-pig-adapter/target hwi/target common/target common/src/gen 
contrib/target service/target serde/target beeline/target odbc/target 
cli/target ql/dependency-reduced-pom.xml ql/target
+ svn update
Ujdbc/src/java/org/apache/hive/jdbc/HiveConnection.java
Uservice/src/java/org/apache/hive/service/auth/KerberosSaslHelper.java
A
service/src/java/org/apache/hive/service/auth/TSubjectAssumingTransport.java

Fetching external item into 'hcatalog/src/test/e2e/harness'
Updated external to revision 1575861.

Updated to revision 1575861.
+ patchCommandPath=/data/hive-ptest/working/scratch/smart-apply-patch.sh
+ patchFilePath=/data/hive-ptest/working/scratch/build.patch
+ [[ -f /data/hive-ptest/working/scratch/build.patch ]]
+ chmod +x /data/hive-ptest/working/scratch/smart-apply-patch.sh
+ /data/hive-ptest/working/scratch/smart-apply-patch.sh 
/data/hive-ptest/working/scratch/build.patch
The patch does not appear to apply with p0, p1, or p2
+ exit 1
'
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633560

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
 Attachments: HIVE-6222.1.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925529#comment-13925529
 ] 

Remus Rusanu commented on HIVE-6222:


Conflict with HIVE-6531, I'll upload a new patch

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
 Attachments: HIVE-6222.1.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-5155) Support secure proxy user access to HiveServer2

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-5155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925532#comment-13925532
 ] 

Thejas M Nair commented on HIVE-5155:
-

[~prasadm] Can you please check if the test failures are caused by the patch ?


 Support secure proxy user access to HiveServer2
 ---

 Key: HIVE-5155
 URL: https://issues.apache.org/jira/browse/HIVE-5155
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.12.0
Reporter: Prasad Mujumdar
Assignee: Prasad Mujumdar
 Attachments: HIVE-5155-1-nothrift.patch, HIVE-5155-noThrift.2.patch, 
 HIVE-5155-noThrift.4.patch, HIVE-5155-noThrift.5.patch, 
 HIVE-5155-noThrift.6.patch, HIVE-5155-noThrift.7.patch, 
 HIVE-5155-noThrift.8.patch, HIVE-5155.1.patch, HIVE-5155.2.patch, 
 HIVE-5155.3.patch, HIVE-5155.4.patch, ProxyAuth.java, ProxyAuth.out, 
 TestKERBEROS_Hive_JDBC.java


 The HiveServer2 can authenticate a client using via Kerberos and impersonate 
 the connecting user with underlying secure hadoop. This becomes a gateway for 
 a remote client to access secure hadoop cluster. Now this works fine for when 
 the client obtains Kerberos ticket and directly connects to HiveServer2. 
 There's another big use case for middleware tools where the end user wants to 
 access Hive via another server. For example Oozie action or Hue submitting 
 queries or a BI tool server accessing to HiveServer2. In these cases, the 
 third party server doesn't have end user's Kerberos credentials and hence it 
 can't submit queries to HiveServer2 on behalf of the end user.
 This ticket is for enabling proxy access to HiveServer2 for third party tools 
 on behalf of end users. There are two parts of the solution proposed in this 
 ticket:
 1) Delegation token based connection for Oozie (OOZIE-1457)
 This is the common mechanism for Hadoop ecosystem components. Hive Remote 
 Metastore and HCatalog already support this. This is suitable for tool like 
 Oozie that submits the MR jobs as actions on behalf of its client. Oozie 
 already uses similar mechanism for Metastore/HCatalog access.
 2) Direct proxy access for privileged hadoop users
 The delegation token implementation can be a challenge for non-hadoop 
 (especially non-java) components. This second part enables a privileged user 
 to directly specify an alternate session user during the connection. If the 
 connecting user has hadoop level privilege to impersonate the requested 
 userid, then HiveServer2 will run the session as that requested user. For 
 example, user Hue is allowed to impersonate user Bob (via core-site.xml proxy 
 user configuration). Then user Hue can connect to HiveServer2 and specify Bob 
 as session user via a session property. HiveServer2 will verify Hue's proxy 
 user privilege and then impersonate user Bob instead of Hue. This will enable 
 any third party tool to impersonate alternate userid without having to 
 implement delegation token connection.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925534#comment-13925534
 ] 

Thejas M Nair commented on HIVE-6486:
-

I think this should go under JDBC Client Setup for a Secure Cluster in 
https://cwiki.apache.org/confluence/display/Hive/HiveServer2+Clients .
This feature not something most end users would want to learn about. This is 
something users who are implementing a middleware system, where the middleware 
system needs to run the query as the user running the client. HIVE-5155 is 
another feature that middleware systems would be interested in. Mabye we should 
create a sub section under JDBC Client Setup for a Secure Cluster like Using 
jdbc from custom middleware application.


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6599) Document new jdbc url connection parameters for HiveServer2

2014-03-10 Thread Vaibhav Gumashta (JIRA)
Vaibhav Gumashta created HIVE-6599:
--

 Summary: Document new jdbc url connection parameters for 
HiveServer2
 Key: HIVE-6599
 URL: https://issues.apache.org/jira/browse/HIVE-6599
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0


Need to document the parameters for http mode, ssl mode and secure proxy access.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925536#comment-13925536
 ] 

Thejas M Nair commented on HIVE-6486:
-

I just meant to give out some more context on the change, and suggest possible 
ways of doing it. [~leftylev] , please make the decisions on how to present it 
using your doc expertise ! :)


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Attachment: HIVE-6222.2.patch

Rebased after HIVE-6531

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Status: Patch Available  (was: Open)

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Status: Open  (was: Patch Available)

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Affects Version/s: 0.13.0

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Component/s: Query Processor

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6222:
---

Labels: vectorization  (was: )

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6503) document pluggable authentication modules (PAM) in template config, wiki

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6503?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6503:
---

Component/s: HiveServer2

 document pluggable authentication modules (PAM) in template config, wiki
 

 Key: HIVE-6503
 URL: https://issues.apache.org/jira/browse/HIVE-6503
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
Priority: Blocker
 Fix For: 0.13.0


 HIVE-6466 adds support for PAM as a supported value for 
 hive.server2.authentication. 
 It also adds a config parameter hive.server2.authentication.pam.services.
 The default template file needs to be updated to document these. The wiki 
 docs should also document the support for pluggable authentication modules.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6599) Document new jdbc url connection parameters for HiveServer2

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6599?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6599:
---

Priority: Critical  (was: Major)

 Document new jdbc url connection parameters for HiveServer2
 ---

 Key: HIVE-6599
 URL: https://issues.apache.org/jira/browse/HIVE-6599
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
Priority: Critical
 Fix For: 0.13.0


 Need to document the parameters for http mode, ssl mode and secure proxy 
 access.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6600) Add Remus to Hive people list on credits page

2014-03-10 Thread Remus Rusanu (JIRA)
Remus Rusanu created HIVE-6600:
--

 Summary: Add Remus to Hive people list on credits page
 Key: HIVE-6600
 URL: https://issues.apache.org/jira/browse/HIVE-6600
 Project: Hive
  Issue Type: Task
  Components: Website
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Trivial






--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6597) WebHCat E2E tests doAsTests_6 and doAsTests_7 need to be updated

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6597?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925588#comment-13925588
 ] 

Hive QA commented on HIVE-6597:
---



{color:green}Overall{color}: +1 all checks pass

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633581/HIVE-6597.patch

{color:green}SUCCESS:{color} +1 5374 tests passed

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1689/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1689/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633581

 WebHCat E2E tests doAsTests_6 and doAsTests_7 need to be updated
 

 Key: HIVE-6597
 URL: https://issues.apache.org/jira/browse/HIVE-6597
 Project: Hive
  Issue Type: Bug
  Components: Tests, WebHCat
Affects Versions: 0.13.0
Reporter: Deepesh Khandelwal
Assignee: Deepesh Khandelwal
 Fix For: 0.13.0

 Attachments: HIVE-6597.patch


 Currently the following WebHCat doAsTests need to be fixed:
 In doAsTests_6 REST request url needs to be updated and corresponding 
 expected output to reflect the correct intent.
 doAsTests_7 fails because of the strict error message checking.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925590#comment-13925590
 ] 

Hive QA commented on HIVE-4764:
---



{color:red}Overall{color}: -1 no tests executed

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633588/HIVE-4764.4.patch

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1690/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1690/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Tests exited with: NonZeroExitCodeException
Command 'bash /data/hive-ptest/working/scratch/source-prep.sh' failed with exit 
status 1 and output '+ [[ -n '' ]]
+ export 'ANT_OPTS=-Xmx1g -XX:MaxPermSize=256m '
+ ANT_OPTS='-Xmx1g -XX:MaxPermSize=256m '
+ export 'M2_OPTS=-Xmx1g -XX:MaxPermSize=256m -Dhttp.proxyHost=localhost 
-Dhttp.proxyPort=3128'
+ M2_OPTS='-Xmx1g -XX:MaxPermSize=256m -Dhttp.proxyHost=localhost 
-Dhttp.proxyPort=3128'
+ cd /data/hive-ptest/working/
+ tee /data/hive-ptest/logs/PreCommit-HIVE-Build-1690/source-prep.txt
+ [[ false == \t\r\u\e ]]
+ mkdir -p maven ivy
+ [[ svn = \s\v\n ]]
+ [[ -n '' ]]
+ [[ -d apache-svn-trunk-source ]]
+ [[ ! -d apache-svn-trunk-source/.svn ]]
+ [[ ! -d apache-svn-trunk-source ]]
+ cd apache-svn-trunk-source
+ svn revert -R .
Reverted 'hcatalog/src/test/e2e/templeton/tests/doas.conf'
++ awk '{print $2}'
++ egrep -v '^X|^Performing status on external'
++ svn status --no-ignore
+ rm -rf target datanucleus.log ant/target shims/target shims/0.20/target 
shims/0.20S/target shims/0.23/target shims/aggregator/target 
shims/common/target shims/common-secure/target packaging/target 
hbase-handler/target testutils/target jdbc/target metastore/target 
itests/target itests/hcatalog-unit/target itests/test-serde/target 
itests/qtest/target itests/hive-unit/target itests/custom-serde/target 
itests/util/target hcatalog/target hcatalog/storage-handlers/hbase/target 
hcatalog/server-extensions/target hcatalog/core/target 
hcatalog/webhcat/svr/target hcatalog/webhcat/java-client/target 
hcatalog/hcatalog-pig-adapter/target hwi/target common/target common/src/gen 
contrib/target service/target serde/target beeline/target odbc/target 
cli/target ql/dependency-reduced-pom.xml ql/target
+ svn update

Fetching external item into 'hcatalog/src/test/e2e/harness'
External at revision 1575875.

At revision 1575875.
+ patchCommandPath=/data/hive-ptest/working/scratch/smart-apply-patch.sh
+ patchFilePath=/data/hive-ptest/working/scratch/build.patch
+ [[ -f /data/hive-ptest/working/scratch/build.patch ]]
+ chmod +x /data/hive-ptest/working/scratch/smart-apply-patch.sh
+ /data/hive-ptest/working/scratch/smart-apply-patch.sh 
/data/hive-ptest/working/scratch/build.patch
The patch does not appear to apply with p0, p1, or p2
+ exit 1
'
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633588

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Status: Patch Available  (was: Open)

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Status: Open  (was: Patch Available)

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6558) HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6558?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925635#comment-13925635
 ] 

Thejas M Nair commented on HIVE-6558:
-

+1

 HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade
 -

 Key: HIVE-6558
 URL: https://issues.apache.org/jira/browse/HIVE-6558
 Project: Hive
  Issue Type: Bug
  Components: Authentication, HiveServer2
Affects Versions: 0.13.0
Reporter: Prasad Mujumdar
Assignee: Prasad Mujumdar
Priority: Blocker
 Attachments: HIVE-6558.2.patch


 Java only includes Plain SASL client and not server. Hence HiveServer2 
 includes a Plain SASL server implementation. Now Hadoop has its own Plain 
 SASL server [HADOOP-9020|https://issues.apache.org/jira/browse/HADOOP-9020] 
 which is part of Hadoop 2.3 
 [release|http://hadoop.apache.org/docs/r2.3.0/hadoop-project-dist/hadoop-common/releasenotes.html].
 The two servers use different Sasl callbacks and the servers are registered 
 in java.security.Provider via static code. As a result the HiveServer2 
 instance could be using Hadoop's Plain SASL server which breaks the 
 authentication.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


Re: Review Request 18185: Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/18185/
---

(Updated March 10, 2014, 10:52 a.m.)


Review request for hive and Thejas Nair.


Changes
---

Rebased on trunk


Bugs: HIVE-4764
https://issues.apache.org/jira/browse/HIVE-4764


Repository: hive-git


Description
---

Support Kerberos HTTP authentication for HiveServer2 running in http mode


Diffs (updated)
-

  
itests/hive-unit/src/test/java/org/apache/hive/service/cli/thrift/TestThriftHttpCLIService.java
 57fda94 
  jdbc/src/java/org/apache/hive/jdbc/HiveConnection.java 607fc7a 
  jdbc/src/java/org/apache/hive/jdbc/HttpBasicAuthInterceptor.java 66eba1b 
  jdbc/src/java/org/apache/hive/jdbc/HttpKerberosRequestInterceptor.java 
PRE-CREATION 
  pom.xml cb901ad 
  service/src/java/org/apache/hive/service/auth/HiveAuthFactory.java d8ba3aa 
  service/src/java/org/apache/hive/service/auth/HttpAuthUtils.java PRE-CREATION 
  
service/src/java/org/apache/hive/service/auth/HttpAuthenticationException.java 
PRE-CREATION 
  service/src/java/org/apache/hive/service/auth/HttpCLIServiceUGIProcessor.java 
PRE-CREATION 
  service/src/java/org/apache/hive/service/cli/CLIService.java 2b1e712 
  service/src/java/org/apache/hive/service/cli/session/SessionManager.java 
cec3b04 
  
service/src/java/org/apache/hive/service/cli/thrift/ThriftBinaryCLIService.java 
6fbc847 
  service/src/java/org/apache/hive/service/cli/thrift/ThriftCLIService.java 
26bda5a 
  service/src/java/org/apache/hive/service/cli/thrift/ThriftHttpCLIService.java 
a6ff6ce 
  service/src/java/org/apache/hive/service/cli/thrift/ThriftHttpServlet.java 
e77f043 
  
shims/common-secure/src/main/java/org/apache/hadoop/hive/thrift/HadoopThriftAuthBridge20S.java
 dc89de1 
  shims/common/src/main/java/org/apache/hadoop/hive/shims/HadoopShims.java 
e15ab4e 
  
shims/common/src/main/java/org/apache/hadoop/hive/thrift/HadoopThriftAuthBridge.java
 03f4e51 

Diff: https://reviews.apache.org/r/18185/diff/


Testing
---

Using beeline in a kerberos setup.


Thanks,

Vaibhav Gumashta



[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Attachment: HIVE-4764.4.patch

Rebased on trunk

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Status: Open  (was: Patch Available)

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Attachment: (was: HIVE-4764.4.patch)

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-4764:
---

Status: Patch Available  (was: Open)

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6147) Support avro data stored in HBase columns

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6147?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925658#comment-13925658
 ] 

Hive QA commented on HIVE-6147:
---



{color:red}Overall{color}: -1 at least one tests failed

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633602/HIVE-6147.5.patch.txt

{color:red}ERROR:{color} -1 due to 1 failed/errored test(s), 5381 tests executed
*Failed tests:*
{noformat}
org.apache.hadoop.hive.cli.TestNegativeMinimrCliDriver.testNegativeCliDriver_mapreduce_stack_trace_hadoop20
{noformat}

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1691/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1691/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
Tests exited with: TestsFailedException: 1 tests failed
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633602

 Support avro data stored in HBase columns
 -

 Key: HIVE-6147
 URL: https://issues.apache.org/jira/browse/HIVE-6147
 Project: Hive
  Issue Type: Bug
  Components: HBase Handler
Affects Versions: 0.12.0
Reporter: Swarnim Kulkarni
Assignee: Swarnim Kulkarni
 Attachments: HIVE-6147.1.patch.txt, HIVE-6147.2.patch.txt, 
 HIVE-6147.3.patch.txt, HIVE-6147.3.patch.txt, HIVE-6147.4.patch.txt, 
 HIVE-6147.5.patch.txt


 Presently, the HBase Hive integration supports querying only primitive data 
 types in columns. It would be nice to be able to store and query Avro objects 
 in HBase columns by making them visible as structs to Hive. This will allow 
 Hive to perform ad hoc analysis of HBase data which can be deeply structured.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6466) Add support for pluggable authentication modules (PAM) in Hive

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6466?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6466:
---

Description: 
More on PAM in these articles:
http://www.tuxradar.com/content/how-pam-works
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html

Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1

*Release notes:*
PAM support allows Hive to use existing PAM services for authentication. PAM 
requires the native 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] library. To 
enable PAM usage:
1. Download the JPAM native library 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] for the 
relevant architecture.
2. Unzip and copy libjpam.so to a directory (libjmap-directory) on the system.
3. Add the directory to the LD_LIBRARY_PATH environment variable like so: 
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:libjmap-directory
4. Set the hive.server2.authentication to PAM in hive-site.xml
5. Set the hive.server2.authentication.pam.services to a list of comma 
separated PAM services that will be used. Note that a file with the same name 
as the PAM service must exist in /etc/pam.d
6. Start HiveServer2
 

  was:
More on PAM in these articles:
http://www.tuxradar.com/content/how-pam-works
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html

Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1
 


 Add support for pluggable authentication modules (PAM) in Hive
 --

 Key: HIVE-6466
 URL: https://issues.apache.org/jira/browse/HIVE-6466
 Project: Hive
  Issue Type: New Feature
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6466.1.patch, HIVE-6466.2.patch


 More on PAM in these articles:
 http://www.tuxradar.com/content/how-pam-works
 https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html
 Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1
 *Release notes:*
 PAM support allows Hive to use existing PAM services for authentication. PAM 
 requires the native 
 [JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] library. To 
 enable PAM usage:
 1. Download the JPAM native library 
 [JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] for the 
 relevant architecture.
 2. Unzip and copy libjpam.so to a directory (libjmap-directory) on the 
 system.
 3. Add the directory to the LD_LIBRARY_PATH environment variable like so: 
 export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:libjmap-directory
 4. Set the hive.server2.authentication to PAM in hive-site.xml
 5. Set the hive.server2.authentication.pam.services to a list of comma 
 separated PAM services that will be used. Note that a file with the same name 
 as the PAM service must exist in /etc/pam.d
 6. Start HiveServer2
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6600) Add Remus to Hive people list on credits page

2014-03-10 Thread Remus Rusanu (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6600?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Remus Rusanu updated HIVE-6600:
---

Attachment: HIVE-6600.1.patch

NO PRECOMMIT TESTS

 Add Remus to Hive people list on credits page
 -

 Key: HIVE-6600
 URL: https://issues.apache.org/jira/browse/HIVE-6600
 Project: Hive
  Issue Type: Task
  Components: Website
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Trivial
 Attachments: HIVE-6600.1.patch






--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6503) document pluggable authentication modules (PAM) in template config, wiki

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6503?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6503:
---

Attachment: HIVE-6503.1.patch

 document pluggable authentication modules (PAM) in template config, wiki
 

 Key: HIVE-6503
 URL: https://issues.apache.org/jira/browse/HIVE-6503
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
Priority: Blocker
 Fix For: 0.13.0

 Attachments: HIVE-6503.1.patch


 HIVE-6466 adds support for PAM as a supported value for 
 hive.server2.authentication. 
 It also adds a config parameter hive.server2.authentication.pam.services.
 The default template file needs to be updated to document these. The wiki 
 docs should also document the support for pluggable authentication modules.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6503) document pluggable authentication modules (PAM) in template config, wiki

2014-03-10 Thread Vaibhav Gumashta (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6503?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925668#comment-13925668
 ] 

Vaibhav Gumashta commented on HIVE-6503:


[~thejas] [~leftylev] I've added release notes to HIVE-6466 and attached a 
patch to modify hive-default. I don't have wiki privileges yet :(

 document pluggable authentication modules (PAM) in template config, wiki
 

 Key: HIVE-6503
 URL: https://issues.apache.org/jira/browse/HIVE-6503
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
Priority: Blocker
 Fix For: 0.13.0

 Attachments: HIVE-6503.1.patch


 HIVE-6466 adds support for PAM as a supported value for 
 hive.server2.authentication. 
 It also adds a config parameter hive.server2.authentication.pam.services.
 The default template file needs to be updated to document these. The wiki 
 docs should also document the support for pluggable authentication modules.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6601) alter database commands should support schema synonym keyword

2014-03-10 Thread Thejas M Nair (JIRA)
Thejas M Nair created HIVE-6601:
---

 Summary: alter database commands should support schema synonym 
keyword
 Key: HIVE-6601
 URL: https://issues.apache.org/jira/browse/HIVE-6601
 Project: Hive
  Issue Type: Bug
Reporter: Thejas M Nair


It should be possible to use alter schema  as an alternative to alter 
database.  But the syntax is not currently supported.

{code}
alter schema db1 set owner user x;  
NoViableAltException(215@[])
FAILED: ParseException line 1:6 cannot recognize input near 'schema' 'db1' 
'set' in alter statement
{code}





--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6440) sql std auth - add command to change owner of database

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6440?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925673#comment-13925673
 ] 

Thejas M Nair commented on HIVE-6440:
-

bq. But why is username in brackets – can it really be omitted? 
No, it can't be omitted. It should not be in brackets.

bq.  does this also work for alter schema?
I just checked the code, the existing ALTER (DATABASE|SCHEMA) database_name 
SET DBPROPERTIES as well as this one don't work with schema keyword. Created 
HIVE-6601 to track that.

Thanks for bringing up these issues!

Please go ahead and update the wiki if you can. 

 sql std auth - add command to change owner of database
 --

 Key: HIVE-6440
 URL: https://issues.apache.org/jira/browse/HIVE-6440
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
Assignee: Thejas M Nair
 Fix For: 0.13.0

 Attachments: HIVE-6440.1.patch, HIVE-6440.2.patch, HIVE-6440.3.patch


 It should be possible to change the owner of a database once it is created.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6466) Add support for pluggable authentication modules (PAM) in Hive

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6466?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-6466:


Description: 
More on PAM in these articles:
http://www.tuxradar.com/content/how-pam-works
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html

Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1



  was:
More on PAM in these articles:
http://www.tuxradar.com/content/how-pam-works
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html

Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1

*Release notes:*
PAM support allows Hive to use existing PAM services for authentication. PAM 
requires the native 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] library. To 
enable PAM usage:
1. Download the JPAM native library 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] for the 
relevant architecture.
2. Unzip and copy libjpam.so to a directory (libjmap-directory) on the system.
3. Add the directory to the LD_LIBRARY_PATH environment variable like so: 
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:libjmap-directory
4. Set the hive.server2.authentication to PAM in hive-site.xml
5. Set the hive.server2.authentication.pam.services to a list of comma 
separated PAM services that will be used. Note that a file with the same name 
as the PAM service must exist in /etc/pam.d
6. Start HiveServer2
 


 Add support for pluggable authentication modules (PAM) in Hive
 --

 Key: HIVE-6466
 URL: https://issues.apache.org/jira/browse/HIVE-6466
 Project: Hive
  Issue Type: New Feature
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6466.1.patch, HIVE-6466.2.patch


 More on PAM in these articles:
 http://www.tuxradar.com/content/how-pam-works
 https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html
 Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6466) Add support for pluggable authentication modules (PAM) in Hive

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6466?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-6466:


Release Note: 
*Release notes:*
PAM support allows Hive to use existing PAM services for authentication. PAM 
requires the native 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] library. To 
enable PAM usage:
1. Download the JPAM native library 
[JPAM|http://sourceforge.net/projects/jpam/files/jpam/jpam-1.1/] for the 
relevant architecture.
2. Unzip and copy libjpam.so to a directory (libjmap-directory) on the system.
3. Add the directory to the LD_LIBRARY_PATH environment variable like so: 
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:libjmap-directory
4. Set the hive.server2.authentication to PAM in hive-site.xml
5. Set the hive.server2.authentication.pam.services to a list of comma 
separated PAM services that will be used. Note that a file with the same name 
as the PAM service must exist in /etc/pam.d
6. Start HiveServer2
 

 Add support for pluggable authentication modules (PAM) in Hive
 --

 Key: HIVE-6466
 URL: https://issues.apache.org/jira/browse/HIVE-6466
 Project: Hive
  Issue Type: New Feature
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6466.1.patch, HIVE-6466.2.patch


 More on PAM in these articles:
 http://www.tuxradar.com/content/how-pam-works
 https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/Pluggable_Authentication_Modules.html
 Usage from JPAM api: http://jpam.sourceforge.net/JPamUserGuide.html#id.s7.1



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6109) Support customized location for EXTERNAL tables created by Dynamic Partitioning

2014-03-10 Thread Satish Mittal (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925683#comment-13925683
 ] 

Satish Mittal commented on HIVE-6109:
-

[~leftylev], can you please update the HCatalog wikidoc section on 'external 
tables' in 'dynamic partitioning' with release notes of this ticket?

 Support customized location for EXTERNAL tables created by Dynamic 
 Partitioning
 ---

 Key: HIVE-6109
 URL: https://issues.apache.org/jira/browse/HIVE-6109
 Project: Hive
  Issue Type: Improvement
  Components: HCatalog
Reporter: Satish Mittal
Assignee: Satish Mittal
 Fix For: 0.13.0

 Attachments: HIVE-6109.1.patch.txt, HIVE-6109.2.patch.txt, 
 HIVE-6109.3.patch.txt, HIVE-6109.pdf


 Currently when dynamic partitions are created by HCatalog, the underlying 
 directories for the partitions are created in a fixed 'Hive-style' format, 
 i.e. root_dir/key1=value1/key2=value2/ and so on. However in case of 
 external table, user should be able to control the format of directories 
 created for dynamic partitions.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6068) HiveServer2 client on windows does not handle the non-ascii characters properly

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6068?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6068:
---

Attachment: HIVE-6068.1.patch

cc [~thejas]

 HiveServer2 client on windows does not handle the non-ascii characters 
 properly
 ---

 Key: HIVE-6068
 URL: https://issues.apache.org/jira/browse/HIVE-6068
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
 Environment: Windows 
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6068.1.patch


 When running a select query against a table which contains rows with 
 non-ascii characters HiveServer2 Beeline client returns them wrong. Example:
 {noformat}
 738;Garçu, Le (1995);Drama
 741;Ghost in the Shell (Kôkaku kidôtai) (1995);Animation|Sci-Fi
 {noformat}
 come out from a HiveServer2 beeline client as:
 {noformat}
 '738' 'Gar?u, Le (1995)'  'Drama'
 '741' 'Ghost in the Shell (K?kaku kid?tai) (1995)''Animation|Sci-Fi'
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6600) Add Remus to Hive people list on credits page

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925686#comment-13925686
 ] 

Thejas M Nair commented on HIVE-6600:
-

+1

 Add Remus to Hive people list on credits page
 -

 Key: HIVE-6600
 URL: https://issues.apache.org/jira/browse/HIVE-6600
 Project: Hive
  Issue Type: Task
  Components: Website
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Trivial
 Attachments: HIVE-6600.1.patch






--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-5958) SQL std auth - authorize statements that work with paths

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-5958?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925684#comment-13925684
 ] 

Thejas M Nair commented on HIVE-5958:
-

I will document this along with the parent jira.


 SQL std auth - authorize statements that work with paths
 

 Key: HIVE-5958
 URL: https://issues.apache.org/jira/browse/HIVE-5958
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
Assignee: Thejas M Nair
 Fix For: 0.13.0

 Attachments: HIVE-5958.1.patch, HIVE-5958.2.patch, HIVE-5958.3.patch, 
 HIVE-5958.4.patch, HIVE-5958.5.patch, HIVE-5958.6.patch, HIVE-5958.7.patch

   Original Estimate: 72h
  Remaining Estimate: 72h

 Statement such as create table, alter table that specify an path uri should 
 be allowed under the new authorization scheme only if URI(Path) specified has 
 permissions including read/write and ownership of the file/dir and its 
 children.
 Also, fix issue of database not getting set as output for create-table.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6068) HiveServer2 client on windows does not handle the non-ascii characters properly

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6068?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6068:
---

Status: Patch Available  (was: Open)

 HiveServer2 client on windows does not handle the non-ascii characters 
 properly
 ---

 Key: HIVE-6068
 URL: https://issues.apache.org/jira/browse/HIVE-6068
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
 Environment: Windows 
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6068.1.patch


 When running a select query against a table which contains rows with 
 non-ascii characters HiveServer2 Beeline client returns them wrong. Example:
 {noformat}
 738;Garçu, Le (1995);Drama
 741;Ghost in the Shell (Kôkaku kidôtai) (1995);Animation|Sci-Fi
 {noformat}
 come out from a HiveServer2 beeline client as:
 {noformat}
 '738' 'Gar?u, Le (1995)'  'Drama'
 '741' 'Ghost in the Shell (K?kaku kid?tai) (1995)''Animation|Sci-Fi'
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Summary: SQL std auth - add metastore get_principals_in_role api, support 
DESCRIBE ROLE  (was: SQL std auth - add metastore get_role_participants api - 
to support DESCRIBE ROLE)

 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.thriftapi.2.patch, 
 HIVE-5931.thriftapi.3.patch, HIVE-5931.thriftapi.followup.patch, 
 HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Attachment: (was: HIVE-5931.nothrifgen.1.patch)

 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Attachment: HIVE-5931.nothrifgen.1.patch

 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Attachment: HIVE-5931.nothrifgen.1.patch

 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Attachment: HIVE-5931.1.patch

 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925702#comment-13925702
 ] 

Thejas M Nair commented on HIVE-5931:
-

Instead of describe-role,  I have added support for the command: SHOW ROLE 
PRINCIPALS role_name;

Attaching a patch file without the thrift generated files as well, for ease of 
review ( HIVE-5931.nothrifgen.1.patch  is no thrift-gen version of 
HIVE-5931.1.patch )



 SQL std auth - add metastore get_principals_in_role api, support DESCRIBE ROLE
 --

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Vaibhav Gumashta (JIRA)
Vaibhav Gumashta created HIVE-6602:
--

 Summary: Multi-user HiveServer2 throws error
 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0


Error thrown:
Error while processing statement: FAILED: RuntimeException 
org.apache.hadoop.security.AccessControlException: Permission denied: 
user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x

For hive query execution, a scratch directory specified by hive.exec.scratchdir 
is created with default permission 700. In HiveServer2, during the CLIService 
startup, we check for the presence of scratch directories (local + dfs) and if 
they don't exist, create them with permission 777. However, we should also 
change the permission from the default 700 to 777 in case the dfs scratch 
directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6602?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6602:
---

Status: Patch Available  (was: Open)

 Multi-user HiveServer2 throws error
 ---

 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6602.1.patch


 Error thrown:
 Error while processing statement: FAILED: RuntimeException 
 org.apache.hadoop.security.AccessControlException: Permission denied: 
 user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x
 For hive query execution, a scratch directory specified by 
 hive.exec.scratchdir is created with default permission 700. In HiveServer2, 
 during the CLIService startup, we check for the presence of scratch 
 directories (local + dfs) and if they don't exist, create them with 
 permission 777. However, we should also change the permission from the 
 default 700 to 777 in case the dfs scratch directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Vaibhav Gumashta (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6602?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vaibhav Gumashta updated HIVE-6602:
---

Attachment: HIVE-6602.1.patch

cc [~thejas]

 Multi-user HiveServer2 throws error
 ---

 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6602.1.patch


 Error thrown:
 Error while processing statement: FAILED: RuntimeException 
 org.apache.hadoop.security.AccessControlException: Permission denied: 
 user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x
 For hive query execution, a scratch directory specified by 
 hive.exec.scratchdir is created with default permission 700. In HiveServer2, 
 during the CLIService startup, we check for the presence of scratch 
 directories (local + dfs) and if they don't exist, create them with 
 permission 777. However, we should also change the permission from the 
 default 700 to 777 in case the dfs scratch directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE PRINCIPALS

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Summary: SQL std auth - add metastore get_principals_in_role api, support 
SHOW ROLE PRINCIPALS  (was: SQL std auth - add metastore get_principals_in_role 
api, support DESCRIBE ROLE)

 SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE 
 PRINCIPALS
 -

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 This is necessary for DESCRIBE ROLE role statement. This will list
 all users and roles that participate in a role. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925707#comment-13925707
 ] 

Hive QA commented on HIVE-6568:
---



{color:red}Overall{color}: -1 at least one tests failed

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633603/HIVE-6568.2.patch

{color:red}ERROR:{color} -1 due to 2 failed/errored test(s), 5375 tests executed
*Failed tests:*
{noformat}
org.apache.hadoop.hive.ql.exec.vector.expressions.TestVectorTypeCasts.testCastDecimalToString
org.apache.hive.service.cli.TestEmbeddedThriftBinaryCLIService.testExecuteStatementAsync
{noformat}

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1692/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1692/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
Tests exited with: TestsFailedException: 2 tests failed
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633603

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE PRINCIPALS

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Description: 
Support command for listing all members of a role.
A new metastore api call also needs to be added for this.



  was:
This is necessary for DESCRIBE ROLE role statement. This will list
all users and roles that participate in a role. 



 SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE 
 PRINCIPALS
 -

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 Support command for listing all members of a role.
 A new metastore api call also needs to be added for this.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5931) SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE PRINCIPALS

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5931?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-5931:


Status: Patch Available  (was: Open)

 SQL std auth - add metastore get_principals_in_role api, support SHOW ROLE 
 PRINCIPALS
 -

 Key: HIVE-5931
 URL: https://issues.apache.org/jira/browse/HIVE-5931
 Project: Hive
  Issue Type: Sub-task
  Components: Authorization
Reporter: Thejas M Nair
 Attachments: HIVE-5931.1.patch, HIVE-5931.nothrifgen.1.patch, 
 HIVE-5931.thriftapi.2.patch, HIVE-5931.thriftapi.3.patch, 
 HIVE-5931.thriftapi.followup.patch, HIVE-5931.thriftapi.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 Support command for listing all members of a role.
 A new metastore api call also needs to be added for this.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


Re: Proposal to switch to pull requests

2014-03-10 Thread Thejas Nair
Agree with Carl about git merge commits, they make the changes hard to
follow. But it should be OK, if there is no way to disable it in the
main git repo, it is a small set of active committers, we can make a
policy and expect people to follow it.
But we should certainly disable 'git push -f' (and anything as distruptive).


On Sun, Mar 9, 2014 at 3:51 PM, Carl Steinbach cwsteinb...@gmail.com wrote:
 I'm +1 on switching to git, but only if we can find a way to disable merge
 commits to trunk and feature branches. I'm -1 on switching to Github since,
 as far as I know, it only supports merge based workflows.


 On Sun, Mar 9, 2014 at 12:25 PM, Edward Capriolo edlinuxg...@gmail.comwrote:

 I do not think we want Pull Requests coming at us. Better way is let
 someone open a git branch for the changes, then we review and merge the
 branch.


 On Sat, Mar 8, 2014 at 4:25 PM, Brock Noland br...@cloudera.com wrote:

  In my read of the Apache git - github integration blog post we cannot use
  pull requests as patches. Just that we'll be notified of them and could
  perhaps use them as code review.
 
  One additional item I think we should investigate is disabling merge
  commits on trunk and feature branches.
  On Mar 7, 2014 7:57 PM, Edward Capriolo edlinuxg...@gmail.com wrote:
 
   We need to keep patches in Jira I feel. We have gotten better on the
   documentation front but having a patch in the jira is critical I feel.
 We
   must at least have a perma link to the changes.
  
  
   On Fri, Mar 7, 2014 at 8:40 PM, Sergey Shelukhin 
 ser...@hortonworks.com
   wrote:
  
+1 to git!
   
   
On Fri, Mar 7, 2014 at 12:46 PM, Xuefu Zhang xzh...@cloudera.com
   wrote:
   
 Switching to git from svn seems to be a proposal slightly different
   from
 that of switching to pull request from the head of the thread.
   Personally
 I'm +1 to git, but I think patches are very portable and widely
  adopted
in
 Hadoop ecosystem and we should keep the practice. Thus, +1 to that
   also.

 --Xuefu


 On Fri, Mar 7, 2014 at 12:27 PM, Gunther Hagleitner 
 ghagleit...@hortonworks.com wrote:

  Once Prasad's loop finishes I'd like to add my +1 too.
 
 
  On Fri, Mar 7, 2014 at 11:44 AM, Vaibhav Gumashta 
  vgumas...@hortonworks.com
   wrote:
 
   +1 for moving to git!
  
   Thanks,
   --Vaibhav
  
  
   On Fri, Mar 7, 2014 at 9:46 AM, Prasad Mujumdar 
pras...@cloudera.com
   wrote:
  
  while (true) {
   +1
  }
   
  +1  // another, just in case ;)
   
thanks
Prasad
   
   
   
On Fri, Mar 7, 2014 at 6:47 AM, kulkarni.swar...@gmail.com 
kulkarni.swar...@gmail.com wrote:
   
 +1


 On Fri, Mar 7, 2014 at 1:05 AM, Thejas Nair 
 the...@hortonworks.com
 wrote:

  Should we start with moving our primary source code
   repository
 from
  svn to git ? I feel git is more powerful and easy to use
   (once
 you
  go
  past the learning curve!).
 
 
  On Wed, Mar 5, 2014 at 7:39 AM, Brock Noland 
br...@cloudera.com
 
wrote:
   Personally I prefer the Github workflow, but I believe
   there
 have
been
   some challenges with that since the source for apache
projects
  must
be
   stored in apache source control (git or svn).
  
   Relevent:
 

   
  
 

   
  
 
 https://blogs.apache.org/infra/entry/improved_integration_between_apache_and
  
   On Wed, Mar 5, 2014 at 9:19 AM,
  kulkarni.swar...@gmail.com
   kulkarni.swar...@gmail.com wrote:
   Hello,
  
   Since we have a nice mirrored git repository for
  hive[1],
any
specific
   reason why we can't switch to doing pull requests
  instead
   of
patches?
  IMHO
   pull requests are awesome for peer review plus it is
  also
very
   easy
to
  keep
   track of JIRAs with open pull requests instead of
  looking
for
   JIRAs
 in a
   Patch Available state. Also since they get updated
   automatically,
it
  is
   also very easy to see if a review comment made by a
   reviewer
 was
  addressed
   properly or not.
  
   Thoughts?
  
   Thanks,
  
   [1] https://github.com/apache/hive
  
   --
   Swarnim
  
  
  
   --
   Apache MRUnit - Unit testing MapReduce -
  http://mrunit.apache.org
 
  --
  CONFIDENTIALITY NOTICE
  NOTICE: This message is intended for the use of the
   individual
or
entity
 to
  

[jira] [Resolved] (HIVE-3033) Loading data from a file in hdfs to hive table is failing if we try to load the same file into the same table second time

2014-03-10 Thread Chinna Rao Lalam (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3033?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chinna Rao Lalam resolved HIVE-3033.


Resolution: Not A Problem

This is not an issue with current current code base..

 Loading data from a file in hdfs to hive table is failing if we try to load 
 the same file into the same table second time
 -

 Key: HIVE-3033
 URL: https://issues.apache.org/jira/browse/HIVE-3033
 Project: Hive
  Issue Type: Bug
  Components: Metastore
Affects Versions: 0.8.1, 0.9.0, 0.9.1
Reporter: Kristam Subba Swathi
Assignee: Chinna Rao Lalam
 Attachments: HIVE-3033.patch


 Steps to reproduce
 -
 1)create table in hive
 create table emp(IP STRING,showtime double) ROW FORMAT DELIMITED FIELDS 
 TERMINATED BY '\040'
 2)load data into the table
 LOAD DATA INPATH '/hive/input/data2.txt' OVERWRITE INTO TABLE emp
 LOAD DATA INPATH '/hive/input/data2.txt' OVERWRITE INTO TABLE emp
 Loading the same file into the same table is failing 
 {noformat}
 2012-05-11 19:28:54,415 DEBUG metadata.Hive (Hive.java:checkPaths(1937)) - 
 Successfully renamed 
 hdfs://10.18.40.25:54310/HiveNFT_testLoadDataShouldOverWriteIfSameFileAlreadyExistsInTableByGivingTheRooTPath/data2.txt
  to 
 hdfs://10.18.40.25:54310/HiveNFT_testLoadDataShouldOverWriteIfSameFileAlreadyExistsInTableByGivingTheRooTPath/data2_copy_3.txt
 2012-05-11 19:28:54,416 DEBUG ipc.Client (Client.java:sendParam(786)) - IPC 
 Client (32955489) connection to HOST-10-18-40-25/10.18.40.25:54310 from root 
 sending #5749
 2012-05-11 19:28:54,416 DEBUG ipc.Client (Client.java:receiveResponse(821)) - 
 IPC Client (32955489) connection to HOST-10-18-40-25/10.18.40.25:54310 from 
 root got value #5749
 2012-05-11 19:28:54,417 DEBUG ipc.RPC (WritableRpcEngine.java:invoke(197)) - 
 Call: getFileInfo 2
 2012-05-11 19:28:54,417 DEBUG ipc.Client (Client.java:sendParam(786)) - IPC 
 Client (32955489) connection to HOST-10-18-40-25/10.18.40.25:54310 from root 
 sending #5750
 2012-05-11 19:28:54,419 DEBUG ipc.Client (Client.java:receiveResponse(821)) - 
 IPC Client (32955489) connection to HOST-10-18-40-25/10.18.40.25:54310 from 
 root got value #5750
 2012-05-11 19:28:54,419 DEBUG ipc.RPC (WritableRpcEngine.java:invoke(197)) - 
 Call: getListing 2
 2012-05-11 19:28:54,420 ERROR exec.Task (SessionState.java:printError(380)) - 
 Failed with exception copyFiles: error while moving files!!!
 org.apache.hadoop.hive.ql.metadata.HiveException: copyFiles: error while 
 moving files!!!
   at org.apache.hadoop.hive.ql.metadata.Hive.copyFiles(Hive.java:1989)
   at org.apache.hadoop.hive.ql.metadata.Table.copyFiles(Table.java:547)
   at org.apache.hadoop.hive.ql.metadata.Hive.loadTable(Hive.java:1283)
   at org.apache.hadoop.hive.ql.exec.MoveTask.execute(MoveTask.java:234)
   at org.apache.hadoop.hive.ql.exec.Task.executeTask(Task.java:133)
   at 
 org.apache.hadoop.hive.ql.exec.TaskRunner.runSequential(TaskRunner.java:57)
   at org.apache.hadoop.hive.ql.Driver.launchTask(Driver.java:1332)
   at org.apache.hadoop.hive.ql.Driver.execute(Driver.java:1123)
   at org.apache.hadoop.hive.ql.Driver.run(Driver.java:931)
   at 
 org.apache.hadoop.hive.service.HiveServer$HiveServerHandler.execute(HiveServer.java:191)
   at 
 org.apache.hadoop.hive.service.ThriftHive$Processor$execute.getResult(ThriftHive.java:629)
   at 
 org.apache.hadoop.hive.service.ThriftHive$Processor$execute.getResult(ThriftHive.java:617)
   at org.apache.thrift.ProcessFunction.process(ProcessFunction.java:32)
   at org.apache.thrift.TBaseProcessor.process(TBaseProcessor.java:34)
   at 
 org.apache.thrift.server.TThreadPoolServer$WorkerProcess.run(TThreadPoolServer.java:176)
   at 
 java.util.concurrent.ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java:886)
   at 
 java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:908)
   at java.lang.Thread.run(Thread.java:619)
 Caused by: java.io.FileNotFoundException: File 
 hdfs://10.18.40.25:54310/HiveNFT_testLoadDataShouldOverWriteIfSameFileAlreadyExistsInTableByGivingTheRooTPath/data2.txt
  does not exist.
   at 
 org.apache.hadoop.hdfs.DistributedFileSystem.listStatus(DistributedFileSystem.java:353)
   at org.apache.hadoop.hive.ql.metadata.Hive.copyFiles(Hive.java:1979)
   ... 17 more
 {noformat}
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


Re: Review Request 17566: Support to query avro data stored in HBase

2014-03-10 Thread Swarnim Kulkarni

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/17566/
---

(Updated March 10, 2014, 2:17 p.m.)


Review request for hive.


Bugs: HIVE-6147
https://issues.apache.org/jira/browse/HIVE-6147


Repository: hive-git


Description
---

Support to query avro data stored in HBase.


Diffs (updated)
-

  hbase-handler/pom.xml 132af43 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/Address.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/ContactInfo.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/Employee.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/EmployeeAvro.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/Gender.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/HomePhone.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/Magic.java
 PRE-CREATION 
  
hbase-handler/src/gen/avro/gen-java/org/apache/hadoop/hive/hbase/avro/OfficePhone.java
 PRE-CREATION 
  hbase-handler/src/if/avro/avro_test.avpr PRE-CREATION 
  hbase-handler/src/java/org/apache/hadoop/hive/hbase/HBaseCompositeKey.java 
5008f15 
  hbase-handler/src/java/org/apache/hadoop/hive/hbase/HBaseSerDe.java 2cd65cb 
  hbase-handler/src/java/org/apache/hadoop/hive/hbase/HBaseSerDeHelper.java 
PRE-CREATION 
  hbase-handler/src/java/org/apache/hadoop/hive/hbase/LazyHBaseCellMap.java 
cedef10 
  
hbase-handler/src/test/org/apache/hadoop/hive/hbase/HBaseTestAvroSchemaRetriever.java
 PRE-CREATION 
  
hbase-handler/src/test/org/apache/hadoop/hive/hbase/HBaseTestCompositeKey.java 
13c344b 
  hbase-handler/src/test/org/apache/hadoop/hive/hbase/TestHBaseSerDe.java 
089a31a 
  
serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroGenericRecordWritable.java
 8beffd7 
  
serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroLazyObjectInspector.java 
PRE-CREATION 
  
serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroObjectInspectorException.java
 PRE-CREATION 
  
serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroObjectInspectorGenerator.java
 46cdb4f 
  serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroSchemaRetriever.java 
PRE-CREATION 
  serde/src/java/org/apache/hadoop/hive/serde2/avro/AvroSerdeUtils.java 9d58d13 
  serde/src/java/org/apache/hadoop/hive/serde2/lazy/LazyFactory.java d9a38ba 
  serde/src/java/org/apache/hadoop/hive/serde2/lazy/LazySimpleSerDe.java 
82c1263 
  serde/src/java/org/apache/hadoop/hive/serde2/lazy/LazyStruct.java 8a1ea46 
  serde/src/java/org/apache/hadoop/hive/serde2/lazy/LazyUnion.java 9f6bc3f 
  
serde/src/java/org/apache/hadoop/hive/serde2/lazy/objectinspector/LazyObjectInspectorFactory.java
 ed670b0 
  
serde/src/java/org/apache/hadoop/hive/serde2/lazy/objectinspector/LazySimpleStructObjectInspector.java
 8a5386a 
  
serde/src/java/org/apache/hadoop/hive/serde2/objectinspector/ObjectInspectorFactory.java
 9a226b3 

Diff: https://reviews.apache.org/r/17566/diff/


Testing
---

New unit tests added to demonstrate the functionality.


Thanks,

Swarnim Kulkarni



[jira] [Commented] (HIVE-4764) Support Kerberos HTTP authentication for HiveServer2 running in http mode

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-4764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925753#comment-13925753
 ] 

Thejas M Nair commented on HIVE-4764:
-

+1

 Support Kerberos HTTP authentication for HiveServer2 running in http mode
 -

 Key: HIVE-4764
 URL: https://issues.apache.org/jira/browse/HIVE-4764
 Project: Hive
  Issue Type: Sub-task
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Thejas M Nair
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-4764.1.patch, HIVE-4764.2.patch, HIVE-4764.3.patch, 
 HIVE-4764.4.patch


 Support Kerberos authentication for HiveServer2 running in http mode.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6147) Support avro data stored in HBase columns

2014-03-10 Thread Swarnim Kulkarni (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6147?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925754#comment-13925754
 ] 

Swarnim Kulkarni commented on HIVE-6147:


[~xuefuz] As the previously failing tests now pass, I have updated the RB with 
the latest patch for review.

 Support avro data stored in HBase columns
 -

 Key: HIVE-6147
 URL: https://issues.apache.org/jira/browse/HIVE-6147
 Project: Hive
  Issue Type: Bug
  Components: HBase Handler
Affects Versions: 0.12.0
Reporter: Swarnim Kulkarni
Assignee: Swarnim Kulkarni
 Attachments: HIVE-6147.1.patch.txt, HIVE-6147.2.patch.txt, 
 HIVE-6147.3.patch.txt, HIVE-6147.3.patch.txt, HIVE-6147.4.patch.txt, 
 HIVE-6147.5.patch.txt


 Presently, the HBase Hive integration supports querying only primitive data 
 types in columns. It would be nice to be able to store and query Avro objects 
 in HBase columns by making them visible as structs to Hive. This will allow 
 Hive to perform ad hoc analysis of HBase data which can be deeply structured.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6598) Importing the project into eclipse as maven project have some issues

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6598?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925762#comment-13925762
 ] 

Hive QA commented on HIVE-6598:
---



{color:green}Overall{color}: +1 all checks pass

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633644/HIVE-6598.patch

{color:green}SUCCESS:{color} +1 5374 tests passed

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1695/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1695/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633644

 Importing the project into eclipse as maven project have some issues
 

 Key: HIVE-6598
 URL: https://issues.apache.org/jira/browse/HIVE-6598
 Project: Hive
  Issue Type: Bug
Affects Versions: 0.13.0
 Environment: Windows 8 ,Eclipse Kepler and Maven 3.1.1
Reporter: Chinna Rao Lalam
Assignee: Chinna Rao Lalam
 Fix For: 0.13.0

 Attachments: HIVE-6598.patch


 Importing the project into eclipse as maven project throwing these problems.
 Plugin execution not covered by lifecycle configuration: 
 org.apache.maven.plugins:maven-antrun-plugin:1.7:run (execution: 
 setup-test-dirs, phase: process-test-resources)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6359) beeline -f fails on scripts with tabs in them.

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6359?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-6359:


Resolution: Fixed
Status: Resolved  (was: Patch Available)

Patch committed to trunk and 0.13 branch (It was already in the list maintained 
by Harish).
cc [~rhbutani]


 beeline -f fails on scripts with tabs in them.
 --

 Key: HIVE-6359
 URL: https://issues.apache.org/jira/browse/HIVE-6359
 Project: Hive
  Issue Type: Bug
Reporter: Carter Shanklin
Assignee: Navis
Priority: Minor
 Fix For: 0.13.0

 Attachments: HIVE-6359.1.patch.txt, HIVE-6359.2.patch.txt


 NO PRECOMMIT TESTS
 On a recent trunk build I used beeline -f on a script with tabs in it.
 Beeline rather unhelpfully attempts to perform tab expansion on the tabs and 
 the query fails. Here's a screendump.
 {code}
 Connecting to jdbc:hive2://mymachine:1/mydb
 Connected to: Apache Hive (version 0.13.0-SNAPSHOT)
 Driver: Hive JDBC (version 0.13.0-SNAPSHOT)
 Transaction isolation: TRANSACTION_REPEATABLE_READ
 Beeline version 0.13.0-SNAPSHOT by Apache Hive
 0: jdbc:hive2://mymachine:1/mydb select  i_brand_id as brand_id, i_brand 
 as brand,
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  ager_id=36
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  d d_moy=12
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  d d_year=2001
 . . . . . . . . . . . . . . . . . . . . . . . and ss_sold_date 
 between '2001-12-01' and '2001-12-31'
 . . . . . . . . . . . . . . . . . . . . . . .  group by i_brand, i_brand_id
 . . . . . . . . . . . . . . . . . . . . . . .  order by ext_price desc, 
 brand_id
 . . . . . . . . . . . . . . . . . . . . . . . limit 100 ;
 Error: Error while compiling statement: FAILED: ParseException line 1:65 
 missing FROM at 'd_moy' near 'd' in from source (state=42000,code=4)
 Closing: org.apache.hive.jdbc.HiveConnection
 {code}
 The same query works fine if I replace tabs with some spaces.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6359) beeline -f fails on scripts with tabs in them.

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6359?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-6359:


Fix Version/s: 0.13.0

 beeline -f fails on scripts with tabs in them.
 --

 Key: HIVE-6359
 URL: https://issues.apache.org/jira/browse/HIVE-6359
 Project: Hive
  Issue Type: Bug
Reporter: Carter Shanklin
Assignee: Navis
Priority: Minor
 Fix For: 0.13.0

 Attachments: HIVE-6359.1.patch.txt, HIVE-6359.2.patch.txt


 NO PRECOMMIT TESTS
 On a recent trunk build I used beeline -f on a script with tabs in it.
 Beeline rather unhelpfully attempts to perform tab expansion on the tabs and 
 the query fails. Here's a screendump.
 {code}
 Connecting to jdbc:hive2://mymachine:1/mydb
 Connected to: Apache Hive (version 0.13.0-SNAPSHOT)
 Driver: Hive JDBC (version 0.13.0-SNAPSHOT)
 Transaction isolation: TRANSACTION_REPEATABLE_READ
 Beeline version 0.13.0-SNAPSHOT by Apache Hive
 0: jdbc:hive2://mymachine:1/mydb select  i_brand_id as brand_id, i_brand 
 as brand,
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  ager_id=36
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  d d_moy=12
 . . . . . . . . . . . . . . . . . . . . . . .  
 Display all 560 possibilities? (y or n) 
 . . . . . . . . . . . . . . . . . . . . . . .  d d_year=2001
 . . . . . . . . . . . . . . . . . . . . . . . and ss_sold_date 
 between '2001-12-01' and '2001-12-31'
 . . . . . . . . . . . . . . . . . . . . . . .  group by i_brand, i_brand_id
 . . . . . . . . . . . . . . . . . . . . . . .  order by ext_price desc, 
 brand_id
 . . . . . . . . . . . . . . . . . . . . . . . limit 100 ;
 Error: Error while compiling statement: FAILED: ParseException line 1:65 
 missing FROM at 'd_moy' near 'd' in from source (state=42000,code=4)
 Closing: org.apache.hive.jdbc.HiveConnection
 {code}
 The same query works fine if I replace tabs with some spaces.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6068) HiveServer2 client on windows does not handle the non-ascii characters properly

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6068?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925766#comment-13925766
 ] 

Thejas M Nair commented on HIVE-6068:
-

Looks good. Can you also include a test case ?


 HiveServer2 client on windows does not handle the non-ascii characters 
 properly
 ---

 Key: HIVE-6068
 URL: https://issues.apache.org/jira/browse/HIVE-6068
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
 Environment: Windows 
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6068.1.patch


 When running a select query against a table which contains rows with 
 non-ascii characters HiveServer2 Beeline client returns them wrong. Example:
 {noformat}
 738;Garçu, Le (1995);Drama
 741;Ghost in the Shell (Kôkaku kidôtai) (1995);Animation|Sci-Fi
 {noformat}
 come out from a HiveServer2 beeline client as:
 {noformat}
 '738' 'Gar?u, Le (1995)'  'Drama'
 '741' 'Ghost in the Shell (K?kaku kid?tai) (1995)''Animation|Sci-Fi'
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6602?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925770#comment-13925770
 ] 

Thejas M Nair commented on HIVE-6602:
-

This looks like a race condition between threads, where one thread has created 
the dir but not set the permissions, and at that instance another thread finds 
that dir has been created but later finds permissions are not what it expects.
Should we just synchronize this section of code ?
{code}
if (!fs.exists(scratchDir)) {
  fs.mkdirs(scratchDir);
  FsPermission fsPermission = new FsPermission((short)0777);
  fs.setPermission(scratchDir, fsPermission);
}
{code}

 Multi-user HiveServer2 throws error
 ---

 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6602.1.patch


 Error thrown:
 Error while processing statement: FAILED: RuntimeException 
 org.apache.hadoop.security.AccessControlException: Permission denied: 
 user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x
 For hive query execution, a scratch directory specified by 
 hive.exec.scratchdir is created with default permission 700. In HiveServer2, 
 during the CLIService startup, we check for the presence of scratch 
 directories (local + dfs) and if they don't exist, create them with 
 permission 777. However, we should also change the permission from the 
 default 700 to 777 in case the dfs scratch directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6602?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925770#comment-13925770
 ] 

Thejas M Nair edited comment on HIVE-6602 at 3/10/14 2:47 PM:
--

Deleting the earlier comment, as I had misread the code.


was (Author: thejas):
This looks like a race condition between threads, where one thread has created 
the dir but not set the permissions, and at that instance another thread finds 
that dir has been created but later finds permissions are not what it expects.
Should we just synchronize this section of code ?
{code}
if (!fs.exists(scratchDir)) {
  fs.mkdirs(scratchDir);
  FsPermission fsPermission = new FsPermission((short)0777);
  fs.setPermission(scratchDir, fsPermission);
}
{code}

 Multi-user HiveServer2 throws error
 ---

 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6602.1.patch


 Error thrown:
 Error while processing statement: FAILED: RuntimeException 
 org.apache.hadoop.security.AccessControlException: Permission denied: 
 user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x
 For hive query execution, a scratch directory specified by 
 hive.exec.scratchdir is created with default permission 700. In HiveServer2, 
 during the CLIService startup, we check for the presence of scratch 
 directories (local + dfs) and if they don't exist, create them with 
 permission 777. However, we should also change the permission from the 
 default 700 to 777 in case the dfs scratch directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6602) Multi-user HiveServer2 throws error

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6602?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925774#comment-13925774
 ] 

Thejas M Nair commented on HIVE-6602:
-

+1

 Multi-user HiveServer2 throws error
 ---

 Key: HIVE-6602
 URL: https://issues.apache.org/jira/browse/HIVE-6602
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
 Fix For: 0.13.0

 Attachments: HIVE-6602.1.patch


 Error thrown:
 Error while processing statement: FAILED: RuntimeException 
 org.apache.hadoop.security.AccessControlException: Permission denied: 
 user=user_1, access=WRITE, inode=/tmp/hive-hive:hdfs:drwxr-xr-x
 For hive query execution, a scratch directory specified by 
 hive.exec.scratchdir is created with default permission 700. In HiveServer2, 
 during the CLIService startup, we check for the presence of scratch 
 directories (local + dfs) and if they don't exist, create them with 
 permission 777. However, we should also change the permission from the 
 default 700 to 777 in case the dfs scratch directory already exists.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


Re: Review Request 18925: HIVE-6575 select * fails on parquet table with map datatype

2014-03-10 Thread justin coffey

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/18925/#review36644
---

Ship it!


go for r3 with the getClass (and no instanceof) check and {} formatting.

- justin coffey


On March 8, 2014, 12:01 a.m., Szehon Ho wrote:
 
 ---
 This is an automatically generated e-mail. To reply, visit:
 https://reviews.apache.org/r/18925/
 ---
 
 (Updated March 8, 2014, 12:01 a.m.)
 
 
 Review request for hive, Brock Noland, justin coffey, and Xuefu Zhang.
 
 
 Repository: hive-git
 
 
 Description
 ---
 
 The issue is, as part of select * query, a DeepParquetHiveMapInspector is 
 used for one column of an overall parquet-table struct object inspector.  
 
 The problem lies in the ObjectInspectorFactory's cache for struct object 
 inspector.  For performance, there is a cache keyed on an array list, of all 
 object inspectors of columns.  The second time the query is run, it attempts 
 to lookup cached struct inspector.  But when the hashmap looks up the part of 
 the key consisting of the DeepParquetHiveMapInspector, java calls .equals 
 against the existing DeepParquetHivemapInspector.  This fails, as the .equals 
 method casted the other to a StandardParquetHiveInspector.
 
 Regenerating the .equals and .hashcode from eclipse.  
 
 Also adding one more check in .equals before casting, to handle the case if 
 another class of object inspector gets hashed to the same hashcode in the 
 cache.  Then java would call .equals against the other, which in this case is 
 not of the same class.
 
 
 Diffs
 -
 
   
 ql/src/java/org/apache/hadoop/hive/ql/io/parquet/serde/AbstractParquetMapInspector.java
  1d72747 
 
 Diff: https://reviews.apache.org/r/18925/diff/
 
 
 Testing
 ---
 
 Manual testing.
 
 
 Thanks,
 
 Szehon Ho
 




[jira] [Commented] (HIVE-6558) HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade

2014-03-10 Thread Ashutosh Chauhan (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6558?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925790#comment-13925790
 ] 

Ashutosh Chauhan commented on HIVE-6558:


[~prasadm] I guess you need to reupload the patch for Hive QA to pick it up.

 HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade
 -

 Key: HIVE-6558
 URL: https://issues.apache.org/jira/browse/HIVE-6558
 Project: Hive
  Issue Type: Bug
  Components: Authentication, HiveServer2
Affects Versions: 0.13.0
Reporter: Prasad Mujumdar
Assignee: Prasad Mujumdar
Priority: Blocker
 Attachments: HIVE-6558.2.patch


 Java only includes Plain SASL client and not server. Hence HiveServer2 
 includes a Plain SASL server implementation. Now Hadoop has its own Plain 
 SASL server [HADOOP-9020|https://issues.apache.org/jira/browse/HADOOP-9020] 
 which is part of Hadoop 2.3 
 [release|http://hadoop.apache.org/docs/r2.3.0/hadoop-project-dist/hadoop-common/releasenotes.html].
 The two servers use different Sasl callbacks and the servers are registered 
 in java.security.Provider via static code. As a result the HiveServer2 
 instance could be using Hadoop's Plain SASL server which breaks the 
 authentication.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6599) Document new jdbc url connection parameters for HiveServer2

2014-03-10 Thread Kevin Minder (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6599?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925826#comment-13925826
 ] 

Kevin Minder commented on HIVE-6599:


Should there be a different jira filed for setting up the server side or will 
that be covered by this jira as well?

 Document new jdbc url connection parameters for HiveServer2
 ---

 Key: HIVE-6599
 URL: https://issues.apache.org/jira/browse/HIVE-6599
 Project: Hive
  Issue Type: Bug
  Components: HiveServer2, JDBC
Affects Versions: 0.13.0
Reporter: Vaibhav Gumashta
Assignee: Vaibhav Gumashta
Priority: Critical
 Fix For: 0.13.0


 Need to document the parameters for http mode, ssl mode and secure proxy 
 access.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6222) Make Vector Group By operator abandon grouping if too many distinct keys

2014-03-10 Thread Hive QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6222?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925836#comment-13925836
 ] 

Hive QA commented on HIVE-6222:
---



{color:red}Overall{color}: -1 at least one tests failed

Here are the results of testing the latest attachment:
https://issues.apache.org/jira/secure/attachment/12633651/HIVE-6222.2.patch

{color:red}ERROR:{color} -1 due to 1 failed/errored test(s), 5374 tests executed
*Failed tests:*
{noformat}
org.apache.hadoop.hive.cli.TestCliDriver.testCliDriver_vectorization_short_regress
{noformat}

Test results: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1696/testReport
Console output: 
http://bigtop01.cloudera.org:8080/job/PreCommit-HIVE-Build/1696/console

Messages:
{noformat}
Executing org.apache.hive.ptest.execution.PrepPhase
Executing org.apache.hive.ptest.execution.ExecutionPhase
Executing org.apache.hive.ptest.execution.ReportingPhase
Tests exited with: TestsFailedException: 1 tests failed
{noformat}

This message is automatically generated.

ATTACHMENT ID: 12633651

 Make Vector Group By operator abandon grouping if too many distinct keys
 

 Key: HIVE-6222
 URL: https://issues.apache.org/jira/browse/HIVE-6222
 Project: Hive
  Issue Type: Sub-task
  Components: Query Processor
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Remus Rusanu
Priority: Minor
  Labels: vectorization
 Attachments: HIVE-6222.1.patch, HIVE-6222.2.patch


 Row mode GBY is becoming a pass-through if not enough aggregation occurs on 
 the map side, relying on the shuffle+reduce side to do the work. Have VGBY do 
 the same.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-5155) Support secure proxy user access to HiveServer2

2014-03-10 Thread Prasad Mujumdar (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-5155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925875#comment-13925875
 ] 

Prasad Mujumdar commented on HIVE-5155:
---

[~thejas] will take a look shortly. Thanks!

 Support secure proxy user access to HiveServer2
 ---

 Key: HIVE-5155
 URL: https://issues.apache.org/jira/browse/HIVE-5155
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.12.0
Reporter: Prasad Mujumdar
Assignee: Prasad Mujumdar
 Attachments: HIVE-5155-1-nothrift.patch, HIVE-5155-noThrift.2.patch, 
 HIVE-5155-noThrift.4.patch, HIVE-5155-noThrift.5.patch, 
 HIVE-5155-noThrift.6.patch, HIVE-5155-noThrift.7.patch, 
 HIVE-5155-noThrift.8.patch, HIVE-5155.1.patch, HIVE-5155.2.patch, 
 HIVE-5155.3.patch, HIVE-5155.4.patch, ProxyAuth.java, ProxyAuth.out, 
 TestKERBEROS_Hive_JDBC.java


 The HiveServer2 can authenticate a client using via Kerberos and impersonate 
 the connecting user with underlying secure hadoop. This becomes a gateway for 
 a remote client to access secure hadoop cluster. Now this works fine for when 
 the client obtains Kerberos ticket and directly connects to HiveServer2. 
 There's another big use case for middleware tools where the end user wants to 
 access Hive via another server. For example Oozie action or Hue submitting 
 queries or a BI tool server accessing to HiveServer2. In these cases, the 
 third party server doesn't have end user's Kerberos credentials and hence it 
 can't submit queries to HiveServer2 on behalf of the end user.
 This ticket is for enabling proxy access to HiveServer2 for third party tools 
 on behalf of end users. There are two parts of the solution proposed in this 
 ticket:
 1) Delegation token based connection for Oozie (OOZIE-1457)
 This is the common mechanism for Hadoop ecosystem components. Hive Remote 
 Metastore and HCatalog already support this. This is suitable for tool like 
 Oozie that submits the MR jobs as actions on behalf of its client. Oozie 
 already uses similar mechanism for Metastore/HCatalog access.
 2) Direct proxy access for privileged hadoop users
 The delegation token implementation can be a challenge for non-hadoop 
 (especially non-java) components. This second part enables a privileged user 
 to directly specify an alternate session user during the connection. If the 
 connecting user has hadoop level privilege to impersonate the requested 
 userid, then HiveServer2 will run the session as that requested user. For 
 example, user Hue is allowed to impersonate user Bob (via core-site.xml proxy 
 user configuration). Then user Hue can connect to HiveServer2 and specify Bob 
 as session user via a session property. HiveServer2 will verify Hue's proxy 
 user privilege and then impersonate user Bob instead of Hue. This will enable 
 any third party tool to impersonate alternate userid without having to 
 implement delegation token connection.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6558) HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade

2014-03-10 Thread Prasad Mujumdar (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6558?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Prasad Mujumdar updated HIVE-6558:
--

Attachment: HIVE-6558.2.patch

Re-attaching the patch for pre-commit test run

 HiveServer2 Plain SASL authentication broken after hadoop 2.3 upgrade
 -

 Key: HIVE-6558
 URL: https://issues.apache.org/jira/browse/HIVE-6558
 Project: Hive
  Issue Type: Bug
  Components: Authentication, HiveServer2
Affects Versions: 0.13.0
Reporter: Prasad Mujumdar
Assignee: Prasad Mujumdar
Priority: Blocker
 Attachments: HIVE-6558.2.patch, HIVE-6558.2.patch


 Java only includes Plain SASL client and not server. Hence HiveServer2 
 includes a Plain SASL server implementation. Now Hadoop has its own Plain 
 SASL server [HADOOP-9020|https://issues.apache.org/jira/browse/HADOOP-9020] 
 which is part of Hadoop 2.3 
 [release|http://hadoop.apache.org/docs/r2.3.0/hadoop-project-dist/hadoop-common/releasenotes.html].
 The two servers use different Sasl callbacks and the servers are registered 
 in java.security.Provider via static code. As a result the HiveServer2 
 instance could be using Hadoop's Plain SASL server which breaks the 
 authentication.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6603) Separate out Hiveserver2 service and JDBC packages from old HiveServer

2014-03-10 Thread Prasad Mujumdar (JIRA)
Prasad Mujumdar created HIVE-6603:
-

 Summary: Separate out Hiveserver2 service and JDBC packages from 
old HiveServer
 Key: HIVE-6603
 URL: https://issues.apache.org/jira/browse/HIVE-6603
 Project: Hive
  Issue Type: Improvement
  Components: Build Infrastructure, HiveServer2, JDBC
Affects Versions: 0.13.0
Reporter: Prasad Mujumdar


Currently both HiveServer2 and old Thrift HiveServer are part of same jar, for 
both service and JDBC client. The old HiveServer, especially on the client side 
has many dependencies that are not required for HiveServer2. It would be a good 
idea to separate out these two components.

In the last Hive contributor meetup, there was a general consensus on 
deprecating old HiveServer. The code separation would help if/when community 
decides to stop supporting it.




--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6603) Separate out Hiveserver2 service and JDBC packages from old HiveServer

2014-03-10 Thread Prasad Mujumdar (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6603?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Prasad Mujumdar updated HIVE-6603:
--

Description: 
Currently both HiveServer2 and old Thrift HiveServer are part of same jar, for 
both service and JDBC client. The old HiveServer, especially on the client side 
has many dependencies that are not required for HiveServer2. It would be a good 
idea to separate out these two components.

In the last Hive contributor meetup 
(http://www.meetup.com/Hive-Contributors-Group/events/150001922/), there was a 
general consensus on deprecating old HiveServer. The code separation would help 
if/when community decides to stop supporting it.


  was:
Currently both HiveServer2 and old Thrift HiveServer are part of same jar, for 
both service and JDBC client. The old HiveServer, especially on the client side 
has many dependencies that are not required for HiveServer2. It would be a good 
idea to separate out these two components.

In the last Hive contributor meetup, there was a general consensus on 
deprecating old HiveServer. The code separation would help if/when community 
decides to stop supporting it.



 Separate out Hiveserver2 service and JDBC packages from old HiveServer
 --

 Key: HIVE-6603
 URL: https://issues.apache.org/jira/browse/HIVE-6603
 Project: Hive
  Issue Type: Improvement
  Components: Build Infrastructure, HiveServer2, JDBC
Affects Versions: 0.13.0
Reporter: Prasad Mujumdar

 Currently both HiveServer2 and old Thrift HiveServer are part of same jar, 
 for both service and JDBC client. The old HiveServer, especially on the 
 client side has many dependencies that are not required for HiveServer2. It 
 would be a good idea to separate out these two components.
 In the last Hive contributor meetup 
 (http://www.meetup.com/Hive-Contributors-Group/events/150001922/), there was 
 a general consensus on deprecating old HiveServer. The code separation would 
 help if/when community decides to stop supporting it.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Nath Pandey (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jitendra Nath Pandey updated HIVE-6568:
---

Status: Open  (was: Patch Available)

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Nath Pandey (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jitendra Nath Pandey updated HIVE-6568:
---

Attachment: HIVE-6568.3.patch

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch, HIVE-6568.3.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Nath Pandey (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jitendra Nath Pandey updated HIVE-6568:
---

Status: Patch Available  (was: Open)

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch, HIVE-6568.3.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Nath Pandey (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925892#comment-13925892
 ] 

Jitendra Nath Pandey commented on HIVE-6568:


Updated patch fixes the test TestVectorTypeCasts.testCastDecimalToString.
testExecuteStatementAsync is not related to the patch.

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch, HIVE-6568.3.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


Review Request 18972: Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Pandey

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/18972/
---

Review request for hive and Eric Hanson.


Repository: hive-git


Description
---

Vectorized cast of decimal to string and timestamp produces incorrect result.


Diffs
-

  common/src/java/org/apache/hadoop/hive/common/type/Decimal128.java 9d25620 
  common/src/java/org/apache/hadoop/hive/common/type/UnsignedInt128.java 
34bd9d0 
  common/src/test/org/apache/hadoop/hive/common/type/TestDecimal128.java 
debc270 
  common/src/test/org/apache/hadoop/hive/common/type/TestUnsignedInt128.java 
9ac68fe 
  
ql/src/java/org/apache/hadoop/hive/ql/exec/vector/expressions/CastDecimalToString.java
 2e8c3a4 
  
ql/src/java/org/apache/hadoop/hive/ql/exec/vector/expressions/CastDecimalToTimestamp.java
 df7e1ee 
  
ql/src/test/org/apache/hadoop/hive/ql/exec/vector/expressions/TestVectorTypeCasts.java
 832463d 
  ql/src/test/queries/clientpositive/vector_decimal_expressions.q 38934d2 
  ql/src/test/results/clientpositive/vector_decimal_expressions.q.out 629f5d5 

Diff: https://reviews.apache.org/r/18972/diff/


Testing
---


Thanks,

Jitendra Pandey



[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Shivaraju Gowda (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925894#comment-13925894
 ] 

Shivaraju Gowda commented on HIVE-6486:
---

Lefty Leverenz : OK sounds good.

Thejas M Nair: While my main intention to add this improvement was for 
middle-ware server, I think it can be helpful even for regular Kerberos use 
case, the advantage being no dependency on hadoop-core*.jar and more 
flexibility on Kerberos login. The disadvantage being to know the details of 
how to login to Kerberos programmatically(an example of how to do it will ease 
this though).


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6568) Vectorized cast of decimal to string and timestamp produces incorrect result.

2014-03-10 Thread Jitendra Nath Pandey (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6568?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925895#comment-13925895
 ] 

Jitendra Nath Pandey commented on HIVE-6568:


Review board: https://reviews.apache.org/r/18972/

 Vectorized cast of decimal to string and timestamp produces incorrect result.
 -

 Key: HIVE-6568
 URL: https://issues.apache.org/jira/browse/HIVE-6568
 Project: Hive
  Issue Type: Bug
  Components: Vectorization
Affects Versions: 0.13.0
Reporter: Jitendra Nath Pandey
Assignee: Jitendra Nath Pandey
 Attachments: HIVE-6568.1.patch, HIVE-6568.2.patch, HIVE-6568.3.patch


 A decimal value 1.23 with scale 5 is represented in string as 1.23000. This 
 behavior is different from HiveDecimal behavior.
 The difference in cast to timestamp is due to more aggressive rounding in 
 vectorized expression.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-5607) Hive fails to parse the % (mod) sign after brackets.

2014-03-10 Thread Xuefu Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-5607?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Xuefu Zhang updated HIVE-5607:
--

   Resolution: Fixed
Fix Version/s: 0.14.0
 Release Note: 
From 0.10.0 to 0.13.0, the following syntax for order by is allowed (though 
the doc doesn't specify):

select * from table order by (expr1, exp2);

From 0.14, the above syntax is illegal. Instead, the following should be used:

select * from table order by expr1, exp2;

   Status: Resolved  (was: Patch Available)

Patch committed to trunk. Thanks Prasad for the review.

 Hive fails to parse the % (mod) sign after brackets.
 --

 Key: HIVE-5607
 URL: https://issues.apache.org/jira/browse/HIVE-5607
 Project: Hive
  Issue Type: Bug
  Components: Query Processor
Affects Versions: 0.10.0
Reporter: dima machlin
Assignee: Xuefu Zhang
Priority: Minor
 Fix For: 0.14.0

 Attachments: HIVE-5607.1.patch, HIVE-5607.patch


 the scenario :
 create table t(a int);
 select * from t order by (a)%7;
 will fail with the following exception :
 FAILED: ParseException line 1:28 mismatched input '%' expecting EOF near ')'
 I must mention that this *does* work in 0.7.1 and doesn't work in 0.10



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (HIVE-6604) Fix vectorized input to work with ACID

2014-03-10 Thread Owen O'Malley (JIRA)
Owen O'Malley created HIVE-6604:
---

 Summary: Fix vectorized input to work with ACID
 Key: HIVE-6604
 URL: https://issues.apache.org/jira/browse/HIVE-6604
 Project: Hive
  Issue Type: Sub-task
Reporter: Owen O'Malley
Assignee: Owen O'Malley


Fix the VectorizedOrcInputFormat to work with the ACID directories.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6551) group by after join with skew join optimization references invalid task sometimes

2014-03-10 Thread Harish Butani (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6551?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Harish Butani updated HIVE-6551:


Fix Version/s: (was: 0.14.0)
   0.13.0

 group by after join with skew join optimization references invalid task 
 sometimes
 -

 Key: HIVE-6551
 URL: https://issues.apache.org/jira/browse/HIVE-6551
 Project: Hive
  Issue Type: Bug
Reporter: Navis
Assignee: Navis
Priority: Trivial
 Fix For: 0.13.0

 Attachments: HIVE-6551.1.patch.txt


 For example,
 {noformat}
 hive set hive.auto.convert.join = true;
 hive set hive.optimize.skewjoin = true;
 hive set hive.skewjoin.key = 3;
 hive 
  EXPLAIN FROM 
  (SELECT src.* FROM src) x
  JOIN 
  (SELECT src.* FROM src) Y
  ON (x.key = Y.key)
  SELECT sum(hash(Y.key)), sum(hash(Y.value));
 OK
 STAGE DEPENDENCIES:
   Stage-8 is a root stage
   Stage-6 depends on stages: Stage-8
   Stage-5 depends on stages: Stage-6 , consists of Stage-4, Stage-2
   Stage-4
   Stage-2 depends on stages: Stage-4, Stage-1
   Stage-0 is a root stage
 ...
 {noformat}
 Stage-2 references not-existing Stage-1



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6551) group by after join with skew join optimization references invalid task sometimes

2014-03-10 Thread Harish Butani (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6551?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925956#comment-13925956
 ] 

Harish Butani commented on HIVE-6551:
-

ported to 0.13

 group by after join with skew join optimization references invalid task 
 sometimes
 -

 Key: HIVE-6551
 URL: https://issues.apache.org/jira/browse/HIVE-6551
 Project: Hive
  Issue Type: Bug
Reporter: Navis
Assignee: Navis
Priority: Trivial
 Fix For: 0.13.0

 Attachments: HIVE-6551.1.patch.txt


 For example,
 {noformat}
 hive set hive.auto.convert.join = true;
 hive set hive.optimize.skewjoin = true;
 hive set hive.skewjoin.key = 3;
 hive 
  EXPLAIN FROM 
  (SELECT src.* FROM src) x
  JOIN 
  (SELECT src.* FROM src) Y
  ON (x.key = Y.key)
  SELECT sum(hash(Y.key)), sum(hash(Y.value));
 OK
 STAGE DEPENDENCIES:
   Stage-8 is a root stage
   Stage-6 depends on stages: Stage-8
   Stage-5 depends on stages: Stage-6 , consists of Stage-4, Stage-2
   Stage-4
   Stage-2 depends on stages: Stage-4, Stage-1
   Stage-0 is a root stage
 ...
 {noformat}
 Stage-2 references not-existing Stage-1



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6559) sourcing txn-script from schema script results in failure for mysql oracle

2014-03-10 Thread Alan Gates (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alan Gates updated HIVE-6559:
-

Attachment: HIVE-6559.patch

I fixed the issue by removing the invocations from the hive-schema-0.13 scripts 
and inlining the table creation.

 sourcing txn-script from schema script results in failure for mysql  oracle
 

 Key: HIVE-6559
 URL: https://issues.apache.org/jira/browse/HIVE-6559
 Project: Hive
  Issue Type: Bug
  Components: Metastore
Affects Versions: 0.13.0
Reporter: Ashutosh Chauhan
Assignee: Alan Gates
 Fix For: 0.13.0

 Attachments: HIVE-6559.patch


 On mysql, I got:
 ERROR 1064 (42000): You have an error in your SQL syntax; check the manual 
 that corresponds to your MySQL server version for the right syntax to use 
 near '
 
 SOURCE hive-txn-schem' at line 1
 On Oracle, I got:
 SP2-0310: unable to open file hive-txn-schema-0.13.0.oracle.sql 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6574) Type in ql/pom.xml prevents jobs from parquet queries from running on a cluster

2014-03-10 Thread Harish Butani (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6574?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925968#comment-13925968
 ] 

Harish Butani commented on HIVE-6574:
-

ported to 0.13

 Type in ql/pom.xml prevents jobs from parquet queries from running on a 
 cluster
 ---

 Key: HIVE-6574
 URL: https://issues.apache.org/jira/browse/HIVE-6574
 Project: Hive
  Issue Type: Bug
  Components: Serializers/Deserializers
Affects Versions: 0.13.0
Reporter: Xuefu Zhang
Assignee: Xuefu Zhang
Priority: Blocker
 Fix For: 0.13.0

 Attachments: HIVE-6574.patch


 MR job complains about not found class:
 {code}
 Caused by: java.lang.ClassNotFoundException: parquet.hadoop.ParquetInputFormat
   at java.net.URLClassLoader$1.run(URLClassLoader.java:366)
   at java.net.URLClassLoader$1.run(URLClassLoader.java:355)
   at java.security.AccessController.doPrivileged(Native Method)
   at java.net.URLClassLoader.findClass(URLClassLoader.java:354)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:423)
   at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:356)
   ... 64 more
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6574) Type in ql/pom.xml prevents jobs from parquet queries from running on a cluster

2014-03-10 Thread Harish Butani (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6574?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Harish Butani updated HIVE-6574:


Fix Version/s: (was: 0.14.0)
   0.13.0

 Type in ql/pom.xml prevents jobs from parquet queries from running on a 
 cluster
 ---

 Key: HIVE-6574
 URL: https://issues.apache.org/jira/browse/HIVE-6574
 Project: Hive
  Issue Type: Bug
  Components: Serializers/Deserializers
Affects Versions: 0.13.0
Reporter: Xuefu Zhang
Assignee: Xuefu Zhang
Priority: Blocker
 Fix For: 0.13.0

 Attachments: HIVE-6574.patch


 MR job complains about not found class:
 {code}
 Caused by: java.lang.ClassNotFoundException: parquet.hadoop.ParquetInputFormat
   at java.net.URLClassLoader$1.run(URLClassLoader.java:366)
   at java.net.URLClassLoader$1.run(URLClassLoader.java:355)
   at java.security.AccessController.doPrivileged(Native Method)
   at java.net.URLClassLoader.findClass(URLClassLoader.java:354)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:423)
   at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:356)
   ... 64 more
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Thejas M Nair (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925973#comment-13925973
 ] 

Thejas M Nair commented on HIVE-6486:
-

[~shivshi] I would still consider it an advance user scenario, as it involves 
understanding of non jdbc classes and API's . Since it is on the same page 
users can go further and read how the client library can be used this way.


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6574) Type in ql/pom.xml prevents jobs from parquet queries from running on a cluster

2014-03-10 Thread Xuefu Zhang (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6574?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925972#comment-13925972
 ] 

Xuefu Zhang commented on HIVE-6574:
---

Thanks, Harish!

 Type in ql/pom.xml prevents jobs from parquet queries from running on a 
 cluster
 ---

 Key: HIVE-6574
 URL: https://issues.apache.org/jira/browse/HIVE-6574
 Project: Hive
  Issue Type: Bug
  Components: Serializers/Deserializers
Affects Versions: 0.13.0
Reporter: Xuefu Zhang
Assignee: Xuefu Zhang
Priority: Blocker
 Fix For: 0.13.0

 Attachments: HIVE-6574.patch


 MR job complains about not found class:
 {code}
 Caused by: java.lang.ClassNotFoundException: parquet.hadoop.ParquetInputFormat
   at java.net.URLClassLoader$1.run(URLClassLoader.java:366)
   at java.net.URLClassLoader$1.run(URLClassLoader.java:355)
   at java.security.AccessController.doPrivileged(Native Method)
   at java.net.URLClassLoader.findClass(URLClassLoader.java:354)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:423)
   at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308)
   at java.lang.ClassLoader.loadClass(ClassLoader.java:356)
   ... 64 more
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6559) sourcing txn-script from schema script results in failure for mysql oracle

2014-03-10 Thread Alan Gates (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alan Gates updated HIVE-6559:
-

Status: Patch Available  (was: Open)

 sourcing txn-script from schema script results in failure for mysql  oracle
 

 Key: HIVE-6559
 URL: https://issues.apache.org/jira/browse/HIVE-6559
 Project: Hive
  Issue Type: Bug
  Components: Metastore
Affects Versions: 0.13.0
Reporter: Ashutosh Chauhan
Assignee: Alan Gates
 Fix For: 0.13.0

 Attachments: HIVE-6559.patch


 On mysql, I got:
 ERROR 1064 (42000): You have an error in your SQL syntax; check the manual 
 that corresponds to your MySQL server version for the right syntax to use 
 near '
 
 SOURCE hive-txn-schem' at line 1
 On Oracle, I got:
 SP2-0310: unable to open file hive-txn-schema-0.13.0.oracle.sql 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6486) Support secure Subject.doAs() in HiveServer2 JDBC client.

2014-03-10 Thread Thejas M Nair (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6486?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Thejas M Nair updated HIVE-6486:


Resolution: Fixed
Status: Resolved  (was: Patch Available)

Patch committed to trunk and 0.13 branch (this is a patch included by Harish in 
the list for 0.13 in the cwiki page).

Thanks for the contribution [~shivshi] !


 Support secure Subject.doAs() in HiveServer2 JDBC client.
 -

 Key: HIVE-6486
 URL: https://issues.apache.org/jira/browse/HIVE-6486
 Project: Hive
  Issue Type: Improvement
  Components: Authentication, HiveServer2, JDBC
Affects Versions: 0.11.0, 0.12.0
Reporter: Shivaraju Gowda
Assignee: Shivaraju Gowda
 Fix For: 0.13.0

 Attachments: HIVE-6486.1.patch, HIVE-6486.2.patch, HIVE-6486.3.patch, 
 Hive_011_Support-Subject_doAS.patch, TestHive_SujectDoAs.java


 HIVE-5155 addresses the problem of kerberos authentication in multi-user 
 middleware server using proxy user.  In this mode the principal used by the 
 middle ware server has privileges to impersonate selected users in 
 Hive/Hadoop. 
 This enhancement is to support Subject.doAs() authentication in  Hive JDBC 
 layer so that the end users Kerberos Subject is passed through in the middle 
 ware server. With this improvement there won't be any additional setup in the 
 server to grant proxy privileges to some users and there won't be need to 
 specify a proxy user in the JDBC client. This version should also be more 
 secure since it won't require principals with the privileges to impersonate 
 other users in Hive/Hadoop setup.
  



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (HIVE-6414) ParquetInputFormat provides data values that do not match the object inspectors

2014-03-10 Thread Harish Butani (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-6414?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925998#comment-13925998
 ] 

Harish Butani commented on HIVE-6414:
-

ported to 0.13 branch

 ParquetInputFormat provides data values that do not match the object 
 inspectors
 ---

 Key: HIVE-6414
 URL: https://issues.apache.org/jira/browse/HIVE-6414
 Project: Hive
  Issue Type: Bug
  Components: Serializers/Deserializers
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Justin Coffey
  Labels: Parquet
 Fix For: 0.13.0

 Attachments: HIVE-6414.2.patch, HIVE-6414.3.patch, HIVE-6414.3.patch, 
 HIVE-6414.3.patch, HIVE-6414.patch


 While working on HIVE-5998 I noticed that the ParquetRecordReader returns 
 IntWritable for all 'int like' types, in disaccord with the row object 
 inspectors. I though fine, and I worked my way around it. But I see now that 
 the issue trigger failuers in other places, eg. in aggregates:
 {noformat}
 Caused by: org.apache.hadoop.hive.ql.metadata.HiveException: Hive Runtime 
 Error while processing row 
 {cint:528534767,ctinyint:31,csmallint:4963,cfloat:31.0,cdouble:4963.0,cstring1:cvLH6Eat2yFsyy7p}
 at 
 org.apache.hadoop.hive.ql.exec.MapOperator.process(MapOperator.java:534)
 at 
 org.apache.hadoop.hive.ql.exec.mr.ExecMapper.map(ExecMapper.java:177)
 ... 8 more
 Caused by: org.apache.hadoop.hive.ql.metadata.HiveException: 
 java.lang.ClassCastException: org.apache.hadoop.io.IntWritable cannot be cast 
 to java.lang.Short
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processOp(GroupByOperator.java:808)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.SelectOperator.processOp(SelectOperator.java:87)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.TableScanOperator.processOp(TableScanOperator.java:92)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.MapOperator.process(MapOperator.java:524)
 ... 9 more
 Caused by: java.lang.ClassCastException: org.apache.hadoop.io.IntWritable 
 cannot be cast to java.lang.Short
 at 
 org.apache.hadoop.hive.serde2.objectinspector.primitive.JavaShortObjectInspector.get(JavaShortObjectInspector.java:41)
 at 
 org.apache.hadoop.hive.serde2.objectinspector.ObjectInspectorUtils.compare(ObjectInspectorUtils.java:671)
 at 
 org.apache.hadoop.hive.serde2.objectinspector.ObjectInspectorUtils.compare(ObjectInspectorUtils.java:631)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFMin$GenericUDAFMinEvaluator.merge(GenericUDAFMin.java:109)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFMin$GenericUDAFMinEvaluator.iterate(GenericUDAFMin.java:96)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFEvaluator.aggregate(GenericUDAFEvaluator.java:183)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.updateAggregations(GroupByOperator.java:641)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processHashAggr(GroupByOperator.java:838)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processKey(GroupByOperator.java:735)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processOp(GroupByOperator.java:803)
 ... 15 more
 {noformat}
 My test is (I'm writing a test .q from HIVE-5998, but the repro does not 
 involve vectorization):
 {noformat}
 create table if not exists alltypes_parquet (
   cint int,
   ctinyint tinyint,
   csmallint smallint,
   cfloat float,
   cdouble double,
   cstring1 string) stored as parquet;
 insert overwrite table alltypes_parquet
   select cint,
 ctinyint,
 csmallint,
 cfloat,
 cdouble,
 cstring1
   from alltypesorc;
 explain select * from alltypes_parquet limit 10; select * from 
 alltypes_parquet limit 10;
 explain select ctinyint,
   max(cint),
   min(csmallint),
   count(cstring1),
   avg(cfloat),
   stddev_pop(cdouble)
   from alltypes_parquet
   group by ctinyint;
 select ctinyint,
   max(cint),
   min(csmallint),
   count(cstring1),
   avg(cfloat),
   stddev_pop(cdouble)
   from alltypes_parquet
   group by ctinyint;
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (HIVE-6414) ParquetInputFormat provides data values that do not match the object inspectors

2014-03-10 Thread Harish Butani (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6414?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Harish Butani updated HIVE-6414:


Fix Version/s: (was: 0.14.0)
   0.13.0

 ParquetInputFormat provides data values that do not match the object 
 inspectors
 ---

 Key: HIVE-6414
 URL: https://issues.apache.org/jira/browse/HIVE-6414
 Project: Hive
  Issue Type: Bug
  Components: Serializers/Deserializers
Affects Versions: 0.13.0
Reporter: Remus Rusanu
Assignee: Justin Coffey
  Labels: Parquet
 Fix For: 0.13.0

 Attachments: HIVE-6414.2.patch, HIVE-6414.3.patch, HIVE-6414.3.patch, 
 HIVE-6414.3.patch, HIVE-6414.patch


 While working on HIVE-5998 I noticed that the ParquetRecordReader returns 
 IntWritable for all 'int like' types, in disaccord with the row object 
 inspectors. I though fine, and I worked my way around it. But I see now that 
 the issue trigger failuers in other places, eg. in aggregates:
 {noformat}
 Caused by: org.apache.hadoop.hive.ql.metadata.HiveException: Hive Runtime 
 Error while processing row 
 {cint:528534767,ctinyint:31,csmallint:4963,cfloat:31.0,cdouble:4963.0,cstring1:cvLH6Eat2yFsyy7p}
 at 
 org.apache.hadoop.hive.ql.exec.MapOperator.process(MapOperator.java:534)
 at 
 org.apache.hadoop.hive.ql.exec.mr.ExecMapper.map(ExecMapper.java:177)
 ... 8 more
 Caused by: org.apache.hadoop.hive.ql.metadata.HiveException: 
 java.lang.ClassCastException: org.apache.hadoop.io.IntWritable cannot be cast 
 to java.lang.Short
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processOp(GroupByOperator.java:808)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.SelectOperator.processOp(SelectOperator.java:87)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.TableScanOperator.processOp(TableScanOperator.java:92)
 at org.apache.hadoop.hive.ql.exec.Operator.forward(Operator.java:790)
 at 
 org.apache.hadoop.hive.ql.exec.MapOperator.process(MapOperator.java:524)
 ... 9 more
 Caused by: java.lang.ClassCastException: org.apache.hadoop.io.IntWritable 
 cannot be cast to java.lang.Short
 at 
 org.apache.hadoop.hive.serde2.objectinspector.primitive.JavaShortObjectInspector.get(JavaShortObjectInspector.java:41)
 at 
 org.apache.hadoop.hive.serde2.objectinspector.ObjectInspectorUtils.compare(ObjectInspectorUtils.java:671)
 at 
 org.apache.hadoop.hive.serde2.objectinspector.ObjectInspectorUtils.compare(ObjectInspectorUtils.java:631)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFMin$GenericUDAFMinEvaluator.merge(GenericUDAFMin.java:109)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFMin$GenericUDAFMinEvaluator.iterate(GenericUDAFMin.java:96)
 at 
 org.apache.hadoop.hive.ql.udf.generic.GenericUDAFEvaluator.aggregate(GenericUDAFEvaluator.java:183)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.updateAggregations(GroupByOperator.java:641)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processHashAggr(GroupByOperator.java:838)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processKey(GroupByOperator.java:735)
 at 
 org.apache.hadoop.hive.ql.exec.GroupByOperator.processOp(GroupByOperator.java:803)
 ... 15 more
 {noformat}
 My test is (I'm writing a test .q from HIVE-5998, but the repro does not 
 involve vectorization):
 {noformat}
 create table if not exists alltypes_parquet (
   cint int,
   ctinyint tinyint,
   csmallint smallint,
   cfloat float,
   cdouble double,
   cstring1 string) stored as parquet;
 insert overwrite table alltypes_parquet
   select cint,
 ctinyint,
 csmallint,
 cfloat,
 cdouble,
 cstring1
   from alltypesorc;
 explain select * from alltypes_parquet limit 10; select * from 
 alltypes_parquet limit 10;
 explain select ctinyint,
   max(cint),
   min(csmallint),
   count(cstring1),
   avg(cfloat),
   stddev_pop(cdouble)
   from alltypes_parquet
   group by ctinyint;
 select ctinyint,
   max(cint),
   min(csmallint),
   count(cstring1),
   avg(cfloat),
   stddev_pop(cdouble)
   from alltypes_parquet
   group by ctinyint;
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


  1   2   3   >