Thank you, Laura, that’s a good point too.
Meanwhile, I guess the answer to the original question, judging from the error
indicating the default jetty form size in fuseki is that the limit is 10Mb.
I’ll chunk away or maybe work around with the LOAD requirements, although I
might open a new
Thank you, Lorenz.
I did as you suggest and made the changes indicated.
Fuseki started and seems to have accepted the jetty config. But then when
trying to send the update the same error occurs and the limit seems unmodified
(I used2).
Caused by: java.lang.IllegalStateException:
Basically, this request should work?
POST /database HTTP/1.1
Host: example.com
Content-Type: application/sparql-update
INSERT DATA { < 100 MB of triples > }
> Sent: Wednesday, August 07, 2019 at 10:44 AM
> From: "Andy Seaborne"
> To: users@jena.apache.org
> Subject: Re:
>
> "http://www.eclipse.org/jetty/configure_9_3.dtd;>
>
>
>
> org.eclipse.jetty.server.Request.maxFormContentSize
>
>
>
> [2019-08-06 17:07:48] Server ERROR SPARQLServer: Failed to configure
> server: 0
> java.lang.ArrayIndexOutOfBoundsException: 0
> at
>
Pierre,
what are you trying to do? Does the INSERT contain some variables/do
some pattern matching?
If not (e.g. it's INSERT DATA), then you might be better off using the
Graph Store Protocol:
https://jena.apache.org/documentation/fuseki2/soh.html#soh-sparql-http
On Wed, Aug 7, 2019 at 9:49 AM
Pierre,
RDFLib/SPARQLWrapper is using an HTML form upload.
The scalable way is to POST with "Content-type:
application/sparql-update" and the INSERT in the body, then it will
stream - directly reading the update from the HTTP input stream with no
HTML Form (Request.extractFormParameters) on
Yasunori,
It should be possible to pass the InputStream for the tar entry contents
directly to the RDFParserBuilder.source, no need to convert to a string
first.
IIRC TarArchiveInputStream is a bit weird - it signals "end of file" at
the end of the tar archive entry, the the app moves to
Thanks, Andy.
I'll drop the jetty config attempt. (I surmise that the concern with bumping
very high the form size would cause 'performance' issues.) I can somewhat toy
with the jetty locally for testing but in any event it becomes tedious when
working with remote servers deployed in varied
> from SPARQLWrapper import SPARQLWrapper
>
> # a lot longer
> myString = "INSERT DATA {}"
>
> def insertFromString(url, sparql):
> endpoint = SPARQLWrapper(url)
> endpoint.setQuery(sparql)
> endpoint.method = 'POST'
> endpoint.query()
>
>
Following Andy's suggestion works perfectly indeed --- many thanks again!
Best,
Pierre
import requests
THIS E-MAIL MAY CONTAIN CONFIDENTIAL AND/OR PRIVILEGED INFORMATION.
IF YOU ARE NOT THE INTENDED RECIPIENT (OR HAVE RECEIVED THIS E-MAIL
IN ERROR) PLEASE NOTIFY THE SENDER IMMEDIATELY AND
As indicated by Andy, not with that library but just using requests work -- see
follow up email
Best,
P
THIS E-MAIL MAY CONTAIN CONFIDENTIAL AND/OR PRIVILEGED INFORMATION.
IF YOU ARE NOT THE INTENDED RECIPIENT (OR HAVE RECEIVED THIS E-MAIL
IN ERROR) PLEASE NOTIFY THE SENDER IMMEDIATELY AND
FYC I basically do this
from SPARQLWrapper import SPARQLWrapper
# a lot longer
myString = "INSERT DATA {}"
def insertFromString(url, sparql):
endpoint = SPARQLWrapper(url)
endpoint.setQuery(sparql)
endpoint.method = 'POST'
endpoint.query()
Hi Andy,
Thank you for your reply.
Is the following code what you assume?
If so, it crashed with Exception in thread "main"
java.lang.NullPointerException.
TarArchiveInputStream tarInput = new TarArchiveInputStream(new ...);
TarArchiveEntry currentEntry;
while ((currentEntry =
Presumably on the second entry?
Protect the parser stream from the unwanted close with
CloseShieldInputStream:
On 07/08/2019 17:57, Yasunori Yamamoto wrote:
Hi Andy,
Thank you for your reply.
Is the following code what you assume?
If so, it crashed with Exception in thread "main"
Thank you very much!
Yes, the crash was on the second entry, and I modified the code to use
CloseShieldInputStream.
It works without any problems.
2019年8月8日(木) 2:32 Andy Seaborne :
>
> Presumably on the second entry?
>
> Protect the parser stream from the unwanted close with
>
15 matches
Mail list logo