mirror of
https://github.com/apache/impala.git
synced 2025-12-19 18:12:08 -05:00
To remove the dependency on Python 2, existing scripts need to use python3 rather than python. These commands find those locations (for impala-python and regular python): git grep impala-python | grep -v impala-python3 | grep -v impala-python-common | grep -v init-impala-python git grep bin/python | grep -v python3 This removes or switches most of these locations by various means: 1. If a python file has a #!/bin/env impala-python (or python) but doesn't have a main function, it removes the hash-bang and makes sure that the file is not executable. 2. Most scripts can simply switch from impala-python to impala-python3 (or python to python3) with minimal changes. 3. The cm-api pypi package (which doesn't support Python 3) has been replaced by the cm-client pypi package and interfaces have changed. Rather than migrating the code (which hasn't been used in years), this deletes the old code and stops installing cm-api into the virtualenv. The code can be restored and revamped if there is any interest in interacting with CM clusters. 4. This switches tests/comparison over to impala-python3, but this code has bit-rotted. Some pieces can be run manually, but it can't be fully verified with Python 3. It shouldn't hold back the migration on its own. 5. This also replaces locations of impala-python in comments / documentation / READMEs. 6. kazoo (used for interacting with HBase) needed to be upgraded to a version that supports Python 3. The newest version of kazoo requires upgrades of other component versions, so this uses kazoo 2.8.0 to avoid needing other upgrades. The two remaining uses of impala-python are: - bin/cmake_aux/create_virtualenv.sh - bin/impala-env-versioned-python These will be removed separately when we drop Python 2 support completely. In particular, these are useful for testing impala-shell with Python 2 until we stop supporting Python 2 for impala-shell. The docker-based tests still use /usr/bin/python, but this can be switched over independently (and doesn't impact impala-python) Testing: - Ran core job - Ran build + dataload on Centos 7, Redhat 8 - Manual testing of individual scripts (except some bitrotted areas like the random query generator) Change-Id: If209b761290bc7e7c716c312ea757da3e3bca6dc Reviewed-on: http://gerrit.cloudera.org:8080/23468 Reviewed-by: Michael Smith <michael.smith@cloudera.com> Tested-by: Michael Smith <michael.smith@cloudera.com>
307 lines
11 KiB
Python
307 lines
11 KiB
Python
# Licensed to the Apache Software Foundation (ASF) under one
|
|
# or more contributor license agreements. See the NOTICE file
|
|
# distributed with this work for additional information
|
|
# regarding copyright ownership. The ASF licenses this file
|
|
# to you under the Apache License, Version 2.0 (the
|
|
# "License"); you may not use this file except in compliance
|
|
# with the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing,
|
|
# software distributed under the License is distributed on an
|
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
# KIND, either express or implied. See the License for the
|
|
# specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
'''Helpers for parsing command line options'''
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
import logging
|
|
import os
|
|
import sys
|
|
from getpass import getuser
|
|
from requests.packages.urllib3.exceptions import (
|
|
InsecurePlatformWarning,
|
|
InsecureRequestWarning,
|
|
SecurityWarning)
|
|
from tempfile import gettempdir
|
|
from warnings import filterwarnings
|
|
|
|
from tests.comparison import db_connection
|
|
from tests.comparison.cluster import (
|
|
DEFAULT_HIVE_HOST,
|
|
DEFAULT_HIVE_PASSWORD,
|
|
DEFAULT_HIVE_PORT,
|
|
DEFAULT_HIVE_USER,
|
|
MiniCluster,
|
|
MiniHiveCluster,
|
|
)
|
|
from tests.comparison.db_types import TYPES
|
|
|
|
|
|
def add_logging_options(parser, default_debug_log_file=None):
|
|
if not default_debug_log_file:
|
|
default_debug_log_file = os.path.join(
|
|
gettempdir(), os.path.basename(sys.modules["__main__"].__file__) + ".log")
|
|
parser.add_argument(
|
|
'--log-level', default='INFO',
|
|
help='The log level to use.', choices=('DEBUG', 'INFO', 'WARN', 'ERROR'))
|
|
parser.add_argument(
|
|
'--debug-log-file', default=default_debug_log_file,
|
|
help='Path to debug log file.')
|
|
|
|
|
|
def configure_logging(log_level, debug_log_file=None, log_thread_name=False,
|
|
log_process_id=False):
|
|
root_logger = logging.getLogger()
|
|
root_logger.setLevel(logging.DEBUG)
|
|
|
|
console_logger = logging.StreamHandler(sys.stdout)
|
|
console_logger.name = "console"
|
|
console_logger.setLevel(getattr(logging, log_level))
|
|
format = "%(asctime)s"
|
|
if log_process_id:
|
|
format += " %(process)d"
|
|
if log_thread_name:
|
|
format += " %(threadName)s"
|
|
format += " %(levelname)s:%(module)s[%(lineno)s]:%(message)s"
|
|
console_logger.setFormatter(logging.Formatter(format))
|
|
root_logger.addHandler(console_logger)
|
|
|
|
if debug_log_file:
|
|
file_logger = logging.FileHandler(debug_log_file)
|
|
file_logger.name = "file"
|
|
file_logger.setFormatter(logging.Formatter(format))
|
|
file_logger.setLevel(logging.DEBUG)
|
|
root_logger.addHandler(file_logger)
|
|
|
|
def create_third_party_filter(level):
|
|
def filter_record(record):
|
|
name = record.name
|
|
if name.startswith("impala.") or name.startswith("paramiko.") or \
|
|
name.startswith("hdfs") or name.startswith("requests"):
|
|
return record.levelno >= level
|
|
return True
|
|
log_filter = logging.Filter()
|
|
log_filter.filter = filter_record
|
|
return log_filter
|
|
console_logger.addFilter(create_third_party_filter(logging.WARN))
|
|
if debug_log_file:
|
|
file_logger.addFilter(create_third_party_filter(logging.INFO))
|
|
|
|
|
|
def add_ssh_options(parser):
|
|
parser.add_argument(
|
|
'--ssh-user', metavar='user name', default=getuser(),
|
|
help='The user name to use for SSH connections to cluster nodes.')
|
|
parser.add_argument(
|
|
'--ssh-key-file', metavar='path to file',
|
|
help='Specify an additional SSH key other than the defaults in ~/.ssh.')
|
|
parser.add_argument(
|
|
'--ssh-port', metavar='number', type=int, default=22,
|
|
help='The port number to use when connecting through SSH.')
|
|
|
|
|
|
def add_db_name_option(parser):
|
|
parser.add_argument(
|
|
'--db-name', default='randomness',
|
|
help='The name of the database to use. Ex: functional.')
|
|
|
|
|
|
def add_cluster_options(parser):
|
|
add_minicluster_options(parser)
|
|
add_ssh_options(parser)
|
|
parser.add_argument(
|
|
'--hadoop-user-name', default=getuser(),
|
|
help='The user name to use when interacting with hadoop.')
|
|
|
|
|
|
def add_minicluster_options(parser):
|
|
group = parser.add_argument_group('Hive Options')
|
|
group.add_argument(
|
|
'--use-hive', action='store_true', default=False,
|
|
help='Use Hive (Impala will be skipped)')
|
|
group.add_argument(
|
|
'--hive-host', default=DEFAULT_HIVE_HOST,
|
|
help='The name of the host running the HS2')
|
|
group.add_argument(
|
|
'--hive-port', default=DEFAULT_HIVE_PORT, type=int,
|
|
help='The port of HiveServer2')
|
|
group.add_argument(
|
|
'--hive-user', default=DEFAULT_HIVE_USER,
|
|
help='The user name to use when connecting to HiveServer2')
|
|
group.add_argument(
|
|
'--hive-password', default=DEFAULT_HIVE_PASSWORD,
|
|
help='The password to use when connecting to HiveServer2')
|
|
parser.add_argument_group(group)
|
|
|
|
parser.add_argument(
|
|
'--minicluster-num-impalads', default=3, type=int, metavar='num impalads',
|
|
help='The number of impalads in the mini cluster.')
|
|
|
|
|
|
def add_ssl_options(parser):
|
|
group = parser.add_argument_group('SSL Options')
|
|
group.add_argument(
|
|
'--use-ssl', action='store_true', default=False,
|
|
help='Use SSL to connect')
|
|
group.add_argument(
|
|
'--ca_cert', default=None, metavar='CA cert path',
|
|
help='Path to optional CA certificate. This is needed to verify SSL requests if '
|
|
'the Impala certificate is self-signed in a test environment.')
|
|
|
|
|
|
def create_cluster(args):
|
|
if args.use_hive:
|
|
cluster = MiniHiveCluster(args.hive_host, args.hive_port)
|
|
else:
|
|
cluster = MiniCluster(args.hive_host, args.hive_port, args.minicluster_num_impalads)
|
|
cluster.hadoop_user_name = args.hadoop_user_name
|
|
cluster.use_kerberos = getattr(args, 'use_kerberos', False)
|
|
cluster.use_ssl = getattr(args, 'use_ssl', False)
|
|
if cluster.use_ssl:
|
|
# Prevent excessive warning spam on the console.
|
|
#
|
|
# The first warning is related to certificates that do not comply with RFC 2818.
|
|
# https://github.com/shazow/urllib3/issues/497 . Permit one warning.
|
|
filterwarnings(
|
|
'once',
|
|
'Certificate has no `subjectAltName`',
|
|
SecurityWarning)
|
|
# Permit one warning with unverified HTTPS requests
|
|
filterwarnings(
|
|
'once',
|
|
'Unverified HTTPS request is being made',
|
|
InsecureRequestWarning)
|
|
# TODO: IMPALA-5264 to fix python environment to prevent InsecurePlatformWarning .
|
|
# Once we fix that we should remove this suppression.
|
|
filterwarnings(
|
|
'once',
|
|
'A true SSLContext object is not available',
|
|
InsecurePlatformWarning)
|
|
cluster.ca_cert = getattr(args, 'ca_cert', None)
|
|
return cluster
|
|
|
|
|
|
def add_storage_format_options(parser):
|
|
storage_formats = ['avro', 'parquet', 'orc', 'rcfile', 'sequencefile', 'textfile']
|
|
parser.add_argument(
|
|
'--storage-file-formats', default=','.join(storage_formats),
|
|
help='A comma separated list of storage formats to use.')
|
|
|
|
|
|
def add_data_types_options(parser):
|
|
parser.add_argument(
|
|
'--data-types', default=','.join(type_.__name__ for type_ in TYPES),
|
|
help='A comma separated list of data types to use.')
|
|
|
|
|
|
def add_timeout_option(parser):
|
|
parser.add_argument(
|
|
'--timeout', default=(3 * 60), type=int, help='Query timeout in seconds')
|
|
|
|
|
|
def add_connection_option_groups(parser):
|
|
|
|
group = parser.add_argument_group('MySQL Options')
|
|
group.add_argument(
|
|
'--use-mysql', action='store_true', help='Use MySQL')
|
|
group.add_argument(
|
|
'--mysql-host', default='localhost',
|
|
help='The name of the host running the MySQL database.')
|
|
group.add_argument(
|
|
'--mysql-port', default=3306, type=int,
|
|
help='The port of the host running the MySQL database.')
|
|
group.add_argument(
|
|
'--mysql-user', default='root',
|
|
help='The user name to use when connecting to the MySQL database.')
|
|
group.add_argument(
|
|
'--mysql-password',
|
|
help='The password to use when connecting to the MySQL database.')
|
|
parser.add_argument_group(group)
|
|
|
|
group = parser.add_argument_group('Oracle Options')
|
|
group.add_argument('--use-oracle', action='store_true', help='Use Oracle')
|
|
group.add_argument(
|
|
'--oracle-host', default='localhost',
|
|
help='The name of the host running the Oracle database.')
|
|
group.add_argument(
|
|
'--oracle-port', default=1521, type=int,
|
|
help='The port of the host running the Oracle database.')
|
|
group.add_argument(
|
|
'--oracle-user', default='system',
|
|
help='The user name to use when connecting to the Oracle database.')
|
|
group.add_argument(
|
|
'--oracle-password',
|
|
help='The password to use when connecting to the Oracle database.')
|
|
parser.add_argument_group(group)
|
|
|
|
group = parser.add_argument_group('Postgresql Options')
|
|
group.add_argument(
|
|
'--use-postgresql', action='store_true', help='Use Postgresql')
|
|
group.add_argument(
|
|
'--postgresql-host', default='localhost',
|
|
help='The name of the host running the Postgresql database.')
|
|
group.add_argument(
|
|
'--postgresql-port', default=5432, type=int,
|
|
help='The port of the host running the Postgresql database.')
|
|
group.add_argument(
|
|
'--postgresql-user', default='postgres',
|
|
help='The user name to use when connecting to the Postgresql database.')
|
|
group.add_argument(
|
|
'--postgresql-password',
|
|
help='The password to use when connecting to the Postgresql database.')
|
|
parser.add_argument_group(group)
|
|
|
|
|
|
def get_db_type(args):
|
|
db_types = list()
|
|
if args.use_mysql:
|
|
db_types.append(db_connection.MYSQL)
|
|
if args.use_oracle:
|
|
db_types.append(db_connection.ORACLE)
|
|
if args.use_postgresql:
|
|
db_types.append(db_connection.POSTGRESQL)
|
|
if not db_types:
|
|
raise Exception(
|
|
"At least one of --use-mysql, --use-oracle, or --use-postgresql must be used")
|
|
elif len(db_types) > 1:
|
|
raise Exception("Too many databases requested: %s" % db_types)
|
|
return db_types[0]
|
|
|
|
|
|
def create_connection(args, db_type=None, db_name=None):
|
|
if not db_type:
|
|
db_type = get_db_type(args)
|
|
if db_type == db_connection.POSTGRESQL:
|
|
conn_class = db_connection.PostgresqlConnection
|
|
elif db_type == db_connection.MYSQL:
|
|
conn_class = db_connection.MySQLConnection
|
|
elif db_type == db_connection.ORACLE:
|
|
conn_class = db_connection.OracleConnection
|
|
elif db_type == db_connection.HIVE:
|
|
conn_class = db_connection.HiveConnection
|
|
else:
|
|
raise Exception(
|
|
'Unexpected db_type: %s; expected one of %s.' % (
|
|
db_type, ', '.join([db_connection.POSTGRESQL, db_connection.MYSQL,
|
|
db_connection.ORACLE])))
|
|
prefix = db_type.lower()
|
|
return conn_class(
|
|
user_name=getattr(args, prefix + '_user'),
|
|
password=getattr(args, prefix + '_password'),
|
|
host_name=getattr(args, prefix + '_host'),
|
|
port=getattr(args, prefix + '_port'),
|
|
db_name=db_name)
|
|
|
|
|
|
def add_kerberos_options(parser):
|
|
parser.add_argument(
|
|
"--use-kerberos", action="store_true",
|
|
help="Use kerberos when communicating with Impala. This requires that kinit has"
|
|
" already been done before running this script.")
|
|
parser.add_argument(
|
|
"--kerberos-principal", default=getuser(), help="The principal name to use.")
|