/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.ambari.server.upgrade; import java.net.URI; import java.net.URISyntaxException; import java.sql.ResultSet; import java.sql.SQLException; import java.sql.Statement; import java.text.MessageFormat; import java.util.ArrayList; import java.util.Arrays; import java.util.HashMap; import java.util.HashSet; import java.util.List; import java.util.Map; import java.util.Set; import java.util.UUID; import java.util.regex.Matcher; import javax.persistence.EntityManager; import javax.persistence.Query; import javax.persistence.criteria.CriteriaBuilder; import javax.persistence.criteria.CriteriaDelete; import javax.persistence.criteria.Root; import org.apache.ambari.server.AmbariException; import org.apache.ambari.server.api.services.AmbariMetaInfo; import org.apache.ambari.server.configuration.Configuration; import org.apache.ambari.server.controller.AmbariManagementController; import org.apache.ambari.server.orm.DBAccessor.DBColumnInfo; import org.apache.ambari.server.orm.dao.AlertDefinitionDAO; import org.apache.ambari.server.orm.dao.ArtifactDAO; import org.apache.ambari.server.orm.dao.DaoUtils; import org.apache.ambari.server.orm.dao.ServiceComponentDesiredStateDAO; import org.apache.ambari.server.orm.dao.StackDAO; import org.apache.ambari.server.orm.entities.AlertDefinitionEntity; import org.apache.ambari.server.orm.entities.ArtifactEntity; import org.apache.ambari.server.orm.entities.HostComponentDesiredStateEntity; import org.apache.ambari.server.orm.entities.HostComponentStateEntity; import org.apache.ambari.server.orm.entities.ServiceComponentDesiredStateEntity; import org.apache.ambari.server.orm.entities.StackEntity; import org.apache.ambari.server.state.Cluster; import org.apache.ambari.server.state.Clusters; import org.apache.ambari.server.state.Config; import org.apache.ambari.server.state.Service; import org.apache.ambari.server.state.StackId; import org.apache.ambari.server.state.kerberos.KerberosDescriptor; import org.apache.ambari.server.state.kerberos.KerberosDescriptorFactory; import org.apache.ambari.server.state.kerberos.KerberosIdentityDescriptor; import org.apache.ambari.server.state.kerberos.KerberosServiceDescriptor; import org.apache.ambari.server.state.kerberos.KerberosServiceDescriptorFactory; import org.apache.ambari.server.state.stack.OsFamily; import org.apache.ambari.server.utils.VersionUtils; import org.apache.commons.lang.StringUtils; import org.eclipse.persistence.internal.databaseaccess.FieldTypeDefinition; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import com.google.gson.Gson; import com.google.gson.JsonElement; import com.google.gson.JsonObject; import com.google.gson.JsonParser; import com.google.inject.Inject; import com.google.inject.Injector; /** * Upgrade catalog for version 2.1.0. */ public class UpgradeCatalog210 extends AbstractUpgradeCatalog { private static final String CLUSTERS_TABLE = "clusters"; private static final String CLUSTER_HOST_MAPPING_TABLE = "ClusterHostMapping"; private static final String HOSTS_TABLE = "hosts"; private static final String HOST_COMPONENT_DESIRED_STATE_TABLE = "hostcomponentdesiredstate"; private static final String HOST_COMPONENT_STATE_TABLE = "hostcomponentstate"; private static final String HOST_STATE_TABLE = "hoststate"; private static final String HOST_VERSION_TABLE = "host_version"; private static final String HOST_ROLE_COMMAND_TABLE = "host_role_command"; private static final String HOST_CONFIG_MAPPING_TABLE = "hostconfigmapping"; private static final String CONFIG_GROUP_HOST_MAPPING_TABLE = "configgrouphostmapping"; private static final String CONFIG_GROUP_TABLE = "configgroup"; private static final String KERBEROS_PRINCIPAL_HOST_TABLE = "kerberos_principal_host"; private static final String KERBEROS_PRINCIPAL_TABLE = "kerberos_principal"; private static final String REQUEST_OPERATION_LEVEL_TABLE = "requestoperationlevel"; private static final String SERVICE_COMPONENT_DESIRED_STATE_TABLE = "servicecomponentdesiredstate"; private static final String SERVICE_CONFIG_TABLE = "serviceconfig"; private static final String SERVICE_CONFIG_HOSTS_TABLE = "serviceconfighosts"; private static final String WIDGET_TABLE = "widget"; private static final String WIDGET_LAYOUT_TABLE = "widget_layout"; private static final String WIDGET_LAYOUT_USER_WIDGET_TABLE = "widget_layout_user_widget"; private static final String VIEW_TABLE = "viewmain"; private static final String VIEW_INSTANCE_TABLE = "viewinstance"; private static final String VIEW_PARAMETER_TABLE = "viewparameter"; private static final String STACK_TABLE = "stack"; private static final String REPO_VERSION_TABLE = "repo_version"; private static final String ALERT_HISTORY_TABLE = "alert_history"; private static final String HOST_ID_COL = "host_id"; private static final String HOST_NAME_COL = "host_name"; private static final String PUBLIC_HOST_NAME_COL = "public_host_name"; private static final String TOPOLOGY_REQUEST_TABLE = "topology_request"; private static final String TOPOLOGY_HOST_GROUP_TABLE = "topology_hostgroup"; private static final String TOPOLOGY_HOST_INFO_TABLE = "topology_host_info"; private static final String TOPOLOGY_LOGICAL_REQUEST_TABLE = "topology_logical_request"; private static final String TOPOLOGY_HOST_REQUEST_TABLE = "topology_host_request"; private static final String TOPOLOGY_HOST_TASK_TABLE = "topology_host_task"; private static final String TOPOLOGY_LOGICAL_TASK_TABLE = "topology_logical_task"; private static final String HDFS_SITE_CONFIG = "hdfs-site"; private static final String RANGER_SITE_CONFIG = "ranger-site"; // constants for stack table changes private static final String STACK_ID_COLUMN_NAME = "stack_id"; private static final String DESIRED_STACK_ID_COLUMN_NAME = "desired_stack_id"; private static final String CURRENT_STACK_ID_COLUMN_NAME = "current_stack_id"; private static final String DESIRED_STACK_VERSION_COLUMN_NAME = "desired_stack_version"; private static final String CURRENT_STACK_VERSION_COLUMN_NAME = "current_stack_version"; private static final DBColumnInfo DESIRED_STACK_ID_COLUMN = new DBColumnInfo(DESIRED_STACK_ID_COLUMN_NAME, Long.class, null, null, true); private static final DBColumnInfo CURRENT_STACK_ID_COLUMN = new DBColumnInfo(CURRENT_STACK_ID_COLUMN_NAME, Long.class, null, null, true); private static final DBColumnInfo STACK_ID_COLUMN = new DBColumnInfo(STACK_ID_COLUMN_NAME, Long.class, null, null, true); @Inject DaoUtils daoUtils; @Inject private OsFamily osFamily; /** * {@inheritDoc} */ @Override public String getSourceVersion() { return "2.0.0"; } /** * {@inheritDoc} */ @Override public String getTargetVersion() { return "2.1.0"; } /** * Logger. */ private static final Logger LOG = LoggerFactory.getLogger (UpgradeCatalog210.class); // ----- Constructors ------------------------------------------------------ /** * Don't forget to register new UpgradeCatalogs in {@link org.apache.ambari.server.upgrade.SchemaUpgradeHelper.UpgradeHelperModule#configure()} * @param injector Guice injector to track dependencies and uses bindings to inject them. */ @Inject public UpgradeCatalog210(Injector injector) { super(injector); this.injector = injector; daoUtils = injector.getInstance(DaoUtils.class); osFamily = injector.getInstance(OsFamily.class); } // ----- AbstractUpgradeCatalog -------------------------------------------- /** * {@inheritDoc} */ @Override protected void executeDDLUpdates() throws AmbariException, SQLException { executeAlertDDLUpdates(); executeHostsDDLUpdates(); executeWidgetDDLUpdates(); executeStackDDLUpdates(); executeTopologyDDLUpdates(); executeViewDDLUpdates(); } private void executeTopologyDDLUpdates() throws AmbariException, SQLException { List<DBColumnInfo> columns = new ArrayList<>(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("action", String.class, 255, null, false)); columns.add(new DBColumnInfo("cluster_name", String.class, 100, null, false)); columns.add(new DBColumnInfo("bp_name", String.class, 100, null, false)); columns.add(new DBColumnInfo("cluster_properties", char[].class, null, null, true)); columns.add(new DBColumnInfo("cluster_attributes", char[].class, null, null, true)); columns.add(new DBColumnInfo("description", String.class, 1024, null, true)); dbAccessor.createTable(TOPOLOGY_REQUEST_TABLE, columns, "id"); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("name", String.class, 255, null, false)); columns.add(new DBColumnInfo("group_properties", char[].class, null, null, true)); columns.add(new DBColumnInfo("group_attributes", char[].class, null, null, true)); columns.add(new DBColumnInfo("request_id", Long.class, null, null, false)); dbAccessor.createTable(TOPOLOGY_HOST_GROUP_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_HOST_GROUP_TABLE, "FK_hostgroup_req_id", "request_id", TOPOLOGY_REQUEST_TABLE, "id", false, false); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("group_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("fqdn", String.class, 255, null, true)); columns.add(new DBColumnInfo("host_count", Integer.class, null, null, true)); columns.add(new DBColumnInfo("predicate", String.class, 2048, null, true)); dbAccessor.createTable(TOPOLOGY_HOST_INFO_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_HOST_INFO_TABLE, "FK_hostinfo_group_id", "group_id", TOPOLOGY_HOST_GROUP_TABLE, "id", false, false); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("request_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("description", String.class, 1024, null, true)); dbAccessor.createTable(TOPOLOGY_LOGICAL_REQUEST_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_LOGICAL_REQUEST_TABLE, "FK_logicalreq_req_id", "request_id", TOPOLOGY_REQUEST_TABLE, "id", false, false); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("logical_request_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("group_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("stage_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("host_name", String.class, 255, null, true)); dbAccessor.createTable(TOPOLOGY_HOST_REQUEST_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_HOST_REQUEST_TABLE, "FK_hostreq_logicalreq_id", "logical_request_id", TOPOLOGY_LOGICAL_REQUEST_TABLE, "id", false, false); dbAccessor.addFKConstraint(TOPOLOGY_HOST_REQUEST_TABLE, "FK_hostreq_group_id", "group_id", TOPOLOGY_HOST_GROUP_TABLE, "id", false, false); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("host_request_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("type", String.class, 255, null, false)); dbAccessor.createTable(TOPOLOGY_HOST_TASK_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_HOST_TASK_TABLE, "FK_hosttask_req_id", "host_request_id", TOPOLOGY_HOST_REQUEST_TABLE, "id", false, false); columns.clear(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("host_task_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("physical_task_id", Long.class, null, null, true)); columns.add(new DBColumnInfo("component", String.class, 255, null, false)); dbAccessor.createTable(TOPOLOGY_LOGICAL_TASK_TABLE, columns, "id"); dbAccessor.addFKConstraint(TOPOLOGY_LOGICAL_TASK_TABLE, "FK_ltask_hosttask_id", "host_task_id", TOPOLOGY_HOST_TASK_TABLE, "id", false, false); dbAccessor.addFKConstraint(TOPOLOGY_LOGICAL_TASK_TABLE, "FK_ltask_hrc_id", "physical_task_id", "host_role_command", "task_id", false, false); // Sequence updates addSequences(Arrays.asList( "topology_host_info_id_seq", "topology_host_request_id_seq", "topology_host_task_id_seq", "topology_logical_request_id_seq", "topology_logical_task_id_seq", "topology_request_id_seq", "topology_host_group_id_seq" ), 0L, false); } private void executeAlertDDLUpdates() throws AmbariException, SQLException { //Fix latest_text column type to match for all DBMS Configuration.DatabaseType databaseType = configuration.getDatabaseType(); // MySQL columns are already TEXT, but we need to be sure in that, since LONGTEXT will really slowdown database when querying the alerts too often if (Configuration.DatabaseType.MYSQL == databaseType) { dbAccessor.alterColumn("alert_current", new DBColumnInfo("latest_text", new FieldTypeDefinition("TEXT"), null)); dbAccessor.alterColumn("alert_history", new DBColumnInfo("alert_text", new FieldTypeDefinition("TEXT"), null)); } else { dbAccessor.changeColumnType("alert_current", "latest_text", String.class, char[].class); dbAccessor.changeColumnType("alert_history", "alert_text", String.class, char[].class); } } private void executeViewDDLUpdates() throws AmbariException, SQLException { // cluster association dbAccessor.addColumn(VIEW_INSTANCE_TABLE, new DBColumnInfo("cluster_handle", String.class, 255, null, true)); // determine whether to alter the names of the dynamic entities / attributes to // avoid db reserved word conflicts. should be false for existing instances // for backward compatibility. dbAccessor.addColumn(VIEW_INSTANCE_TABLE, new DBColumnInfo("alter_names", Integer.class, 0, 0, false)); // cluster configuration dbAccessor.addColumn(VIEW_PARAMETER_TABLE, new DBColumnInfo("cluster_config", String.class, 255, null, true)); // view build number dbAccessor.addColumn(VIEW_TABLE, new DBColumnInfo("build", String.class, 128, null, true)); } /** * Execute all of the hosts DDL updates. * * @throws org.apache.ambari.server.AmbariException * @throws java.sql.SQLException */ private void executeHostsDDLUpdates() throws AmbariException, SQLException { Configuration.DatabaseType databaseType = configuration.getDatabaseType(); String randomHostName = null; if (dbAccessor.tableHasData(HOST_ROLE_COMMAND_TABLE)) { randomHostName = getRandomHostName(); if (StringUtils.isBlank(randomHostName)) { throw new AmbariException("UpgradeCatalog210 could not retrieve a random host_name from the hosts table while running executeHostsDDLUpdates."); } } dbAccessor.addColumn(HOSTS_TABLE, new DBColumnInfo(HOST_ID_COL, Long.class, null, null, true)); // Sequence value for the hosts table primary key. First record will be 1, so ambari_sequence value must be 0. Long hostId = 0L; Statement statement = null; ResultSet rs = null; try { statement = dbAccessor.getConnection().createStatement(); if (statement != null) { rs = statement.executeQuery("SELECT host_name, host_id FROM hosts ORDER BY host_id ASC, host_name ASC"); if (rs != null) { hostId = populateHostsId(rs); } } } finally { if (rs != null) { rs.close(); } if (statement != null) { statement.close(); } } // Insert host id number into ambari_sequences addSequence("host_id_seq", hostId, false); // Make the hosts id non-null after all the values are populated if (databaseType == Configuration.DatabaseType.DERBY) { // This is a workaround for UpgradeTest.java unit test dbAccessor.executeQuery("ALTER TABLE " + HOSTS_TABLE + " ALTER column " + HOST_ID_COL + " NOT NULL"); } else { dbAccessor.alterColumn(HOSTS_TABLE, new DBColumnInfo(HOST_ID_COL, Long.class, null, null, false)); } // Drop the 8 FK constraints in the host-related tables. They will be recreated later after the PK is changed. // The only host-related table not being included is alert_history. if (databaseType == Configuration.DatabaseType.DERBY) { dbAccessor.dropFKConstraint(HOST_COMPONENT_STATE_TABLE, "hostcomponentstate_host_name"); dbAccessor.dropFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hstcmponentdesiredstatehstname"); dbAccessor.dropFKConstraint(HOST_ROLE_COMMAND_TABLE, "FK_host_role_command_host_name"); dbAccessor.dropFKConstraint(HOST_STATE_TABLE, "FK_hoststate_host_name"); dbAccessor.dropFKConstraint(HOST_VERSION_TABLE, "FK_host_version_host_name"); dbAccessor.dropFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_cghm_hname"); // FK_krb_pr_host_hostname used to have a CASCADE DELETE, which is not needed. dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_hostname"); // FK_krb_pr_host_principalname used to have a CASCADE DELETE, which is not needed, so it will be recreated without it. dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_principalname"); // This FK name is actually different on Derby. dbAccessor.dropFKConstraint(HOST_CONFIG_MAPPING_TABLE, "FK_hostconfigmapping_host_name"); } else { dbAccessor.dropFKConstraint(HOST_COMPONENT_STATE_TABLE, "hostcomponentstate_host_name"); dbAccessor.dropFKConstraint(HOST_COMPONENT_STATE_TABLE, "fk_hostcomponentstate_host_name"); dbAccessor.dropFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hstcmponentdesiredstatehstname"); dbAccessor.dropFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "fk_hostcomponentdesiredstate_host_name"); dbAccessor.dropFKConstraint(HOST_ROLE_COMMAND_TABLE, "FK_host_role_command_host_name"); dbAccessor.dropFKConstraint(HOST_STATE_TABLE, "FK_hoststate_host_name"); dbAccessor.dropFKConstraint(HOST_VERSION_TABLE, "FK_host_version_host_name"); dbAccessor.dropFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_cghm_hname"); dbAccessor.dropFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "fk_configgrouphostmapping_host_name"); // FK_krb_pr_host_hostname used to have a CASCADE DELETE, which is not needed. dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_hostname"); dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "fk_kerberos_principal_host_host_name"); // FK_krb_pr_host_principalname used to have a CASCADE DELETE, which is not needed, so it will be recreated without it. dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_principalname"); dbAccessor.dropFKConstraint(HOST_CONFIG_MAPPING_TABLE, "FK_hostconfmapping_host_name"); } // In Ambari 2.0.0, there were discrepancies with the FK in the ClusterHostMapping table in the Postgres databases. // They were either swapped, or pointing to the wrong table. Ignore failures for both of these. try { dbAccessor.dropFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "ClusterHostMapping_host_name", true); dbAccessor.dropFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "fk_clusterhostmapping_host_name", true); } catch (Exception e) { LOG.warn("Performed best attempt at deleting FK ClusterHostMapping_host_name. " + "It is possible it did not exist or the deletion failed. " + e.getMessage()); } try { dbAccessor.dropFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "ClusterHostMapping_cluster_id", true); } catch (Exception e) { LOG.warn("Performed best attempt at deleting FK ClusterHostMapping_cluster_id. " + "It is possible it did not exist or the deletion failed. " + e.getMessage()); } // Re-add the FK to the cluster_id; will add the host_id at the end. dbAccessor.addFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "FK_clhostmapping_cluster_id", "cluster_id", CLUSTERS_TABLE, "cluster_id", false); // Drop the PK, and recreate it on the host_id instead if (databaseType == Configuration.DatabaseType.DERBY) { String constraintName = getDerbyTableConstraintName("p", HOSTS_TABLE); if (null != constraintName) { // Derby doesn't support CASCADE DELETE. dbAccessor.executeQuery("ALTER TABLE " + HOSTS_TABLE + " DROP CONSTRAINT " + constraintName); } } else { dbAccessor.dropPKConstraint(HOSTS_TABLE, "hosts_pkey", "host_name", true); } dbAccessor.addPKConstraint(HOSTS_TABLE, "PK_hosts_id", "host_id"); dbAccessor.addUniqueConstraint(HOSTS_TABLE, "UQ_hosts_host_name", "host_name"); // Add host_id to the host-related tables, and populate the host_id, one table at a time. String[] tablesToAddHostID = new String[] { CONFIG_GROUP_HOST_MAPPING_TABLE, CLUSTER_HOST_MAPPING_TABLE, HOST_CONFIG_MAPPING_TABLE, HOST_COMPONENT_STATE_TABLE, HOST_COMPONENT_DESIRED_STATE_TABLE, HOST_ROLE_COMMAND_TABLE, HOST_STATE_TABLE, HOST_VERSION_TABLE, KERBEROS_PRINCIPAL_HOST_TABLE, REQUEST_OPERATION_LEVEL_TABLE, SERVICE_CONFIG_HOSTS_TABLE }; for (String tableName : tablesToAddHostID) { dbAccessor.addColumn(tableName, new DBColumnInfo(HOST_ID_COL, Long.class, null, null, true)); // The column name is different for one table String hostNameColumnName = tableName.equals(SERVICE_CONFIG_HOSTS_TABLE) ? "hostname" : "host_name"; if (dbAccessor.tableHasData(tableName) && dbAccessor.tableHasColumn(tableName, hostNameColumnName)) { dbAccessor.executeQuery("UPDATE " + tableName + " t SET host_id = (SELECT host_id FROM hosts h WHERE h.host_name = t." + hostNameColumnName + ") WHERE t.host_id IS NULL AND t." + hostNameColumnName + " IS NOT NULL"); // For legacy reasons, the hostrolecommand table will contain "none" for some records where the host_name was not important. // These records were populated during Finalize in Rolling Upgrade, so they must be updated to use a valid host_name. if (tableName.equals(HOST_ROLE_COMMAND_TABLE) && StringUtils.isNotBlank(randomHostName)) { dbAccessor.executeQuery("UPDATE " + tableName + " t SET host_id = (SELECT host_id FROM hosts h WHERE h.host_name = '" + randomHostName + "') WHERE t.host_id IS NULL AND t.host_name = 'none'"); } } // The one exception for setting NOT NULL is the requestoperationlevel table if (!tableName.equals(REQUEST_OPERATION_LEVEL_TABLE)) { dbAccessor.setColumnNullable(tableName, HOST_ID_COL, false); } } // For any tables where the host_name was part of the PK, need to drop the PK, and recreate it with the host_id String[] tablesWithHostNameInPK = new String[] { CONFIG_GROUP_HOST_MAPPING_TABLE, CLUSTER_HOST_MAPPING_TABLE, HOST_CONFIG_MAPPING_TABLE, HOST_COMPONENT_STATE_TABLE, HOST_COMPONENT_DESIRED_STATE_TABLE, HOST_STATE_TABLE, KERBEROS_PRINCIPAL_HOST_TABLE, SERVICE_CONFIG_HOSTS_TABLE }; // We can't drop PK, if a one of PK columns is a part of foreign key. We should drop FK and re-create him after dropping PK dbAccessor.dropFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_cghm_cgid"); dbAccessor.dropFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "FK_clhostmapping_cluster_id"); dbAccessor.dropFKConstraint(HOST_CONFIG_MAPPING_TABLE, "FK_hostconfmapping_cluster_id"); dbAccessor.dropFKConstraint(HOST_COMPONENT_STATE_TABLE, "hstcomponentstatecomponentname"); dbAccessor.dropFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hstcmpnntdesiredstatecmpnntnme"); dbAccessor.dropFKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "FK_scvhosts_scv"); //These FK's hasn't been deleted previously due to MySQL case sensitivity if (databaseType == Configuration.DatabaseType.MYSQL) { dbAccessor.dropFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_configgrouphostmapping_config_group_id"); dbAccessor.dropFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "FK_ClusterHostMapping_cluster_id"); dbAccessor.dropFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_kerberos_principal_host_principal_name"); dbAccessor.dropFKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "FK_serviceconfighosts_service_config_id"); } if (databaseType == Configuration.DatabaseType.DERBY) { for (String tableName : tablesWithHostNameInPK) { String constraintName = getDerbyTableConstraintName("p", tableName); if (null != constraintName) { dbAccessor.executeQuery("ALTER TABLE " + tableName + " DROP CONSTRAINT " + constraintName); } } } else { // drop constrain only if existed constraint contains required column dbAccessor.dropPKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "configgrouphostmapping_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(CLUSTER_HOST_MAPPING_TABLE, "clusterhostmapping_pkey",HOST_NAME_COL, true); dbAccessor.dropPKConstraint(HOST_CONFIG_MAPPING_TABLE, "hostconfigmapping_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(HOST_COMPONENT_STATE_TABLE, "hostcomponentstate_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hostcomponentdesiredstate_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(HOST_STATE_TABLE, "hoststate_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "kerberos_principal_host_pkey", HOST_NAME_COL, true); dbAccessor.dropPKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "serviceconfighosts_pkey", "hostname", true); } // Finish by deleting the unnecessary host_name columns. dbAccessor.dropColumn(CONFIG_GROUP_HOST_MAPPING_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(CLUSTER_HOST_MAPPING_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_CONFIG_MAPPING_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_COMPONENT_STATE_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_COMPONENT_DESIRED_STATE_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_ROLE_COMMAND_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_STATE_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(HOST_VERSION_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(KERBEROS_PRINCIPAL_HOST_TABLE, HOST_NAME_COL); dbAccessor.dropColumn(REQUEST_OPERATION_LEVEL_TABLE, HOST_NAME_COL); // Notice that the column name doesn't have an underscore here. dbAccessor.dropColumn(SERVICE_CONFIG_HOSTS_TABLE, "hostname"); dbAccessor.addPKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "configgrouphostmapping_pkey", "config_group_id", "host_id"); dbAccessor.addPKConstraint(CLUSTER_HOST_MAPPING_TABLE, "clusterhostmapping_pkey", "cluster_id", "host_id"); dbAccessor.addPKConstraint(HOST_CONFIG_MAPPING_TABLE, "hostconfigmapping_pkey", "create_timestamp", "host_id", "cluster_id", "type_name"); dbAccessor.addPKConstraint(HOST_COMPONENT_STATE_TABLE, "hostcomponentstate_pkey", "cluster_id", "component_name", "host_id", "service_name"); dbAccessor.addPKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hostcomponentdesiredstate_pkey", "cluster_id", "component_name", "host_id", "service_name"); dbAccessor.addPKConstraint(HOST_STATE_TABLE, "hoststate_pkey", "host_id"); dbAccessor.addPKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "kerberos_principal_host_pkey", "principal_name", "host_id"); dbAccessor.addPKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "serviceconfighosts_pkey", "service_config_id", "host_id"); // re-create FK constraints dbAccessor.addFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_cghm_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "FK_clusterhostmapping_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_CONFIG_MAPPING_TABLE, "FK_hostconfmapping_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_COMPONENT_STATE_TABLE, "FK_hostcomponentstate_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "FK_hcdesiredstate_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_ROLE_COMMAND_TABLE, "FK_host_role_command_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_STATE_TABLE, "FK_hoststate_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(HOST_VERSION_TABLE, "FK_host_version_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(KERBEROS_PRINCIPAL_HOST_TABLE, "FK_krb_pr_host_principalname", "principal_name", KERBEROS_PRINCIPAL_TABLE, "principal_name", false); dbAccessor.addFKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "FK_scvhosts_host_id", "host_id", HOSTS_TABLE, "host_id", false); dbAccessor.addFKConstraint(CONFIG_GROUP_HOST_MAPPING_TABLE, "FK_cghm_cgid", "config_group_id", CONFIG_GROUP_TABLE, "group_id", false); dbAccessor.addFKConstraint(CLUSTER_HOST_MAPPING_TABLE, "FK_clhostmapping_cluster_id", "cluster_id", CLUSTERS_TABLE, "cluster_id", false); dbAccessor.addFKConstraint(HOST_CONFIG_MAPPING_TABLE, "FK_hostconfmapping_cluster_id", "cluster_id", CLUSTERS_TABLE, "cluster_id", false); dbAccessor.addFKConstraint(HOST_COMPONENT_STATE_TABLE, "hstcomponentstatecomponentname", new String[]{"component_name", "cluster_id", "service_name"}, SERVICE_COMPONENT_DESIRED_STATE_TABLE, new String[]{"component_name", "cluster_id", "service_name"}, false); dbAccessor.addFKConstraint(HOST_COMPONENT_DESIRED_STATE_TABLE, "hstcmpnntdesiredstatecmpnntnme", new String[]{"component_name", "cluster_id", "service_name"}, SERVICE_COMPONENT_DESIRED_STATE_TABLE, new String[]{"component_name", "cluster_id", "service_name"}, false); dbAccessor.addFKConstraint(SERVICE_CONFIG_HOSTS_TABLE, "FK_scvhosts_scv", "service_config_id", SERVICE_CONFIG_TABLE, "service_config_id", false); // Update host names to be case insensitive String UPDATE_TEMPLATE = "UPDATE {0} SET {1} = lower({1})"; // First remove duplicate hosts removeDuplicateHosts(); // Lowercase host name in hosts String updateHostName = MessageFormat.format(UPDATE_TEMPLATE, HOSTS_TABLE, HOST_NAME_COL); dbAccessor.executeQuery(updateHostName); // Lowercase public host name in hosts String updatePublicHostName = MessageFormat.format(UPDATE_TEMPLATE, HOSTS_TABLE, PUBLIC_HOST_NAME_COL); dbAccessor.executeQuery(updatePublicHostName); // Lowercase host name in alert_history String updateAlertHostName = MessageFormat.format(UPDATE_TEMPLATE, ALERT_HISTORY_TABLE, HOST_NAME_COL); dbAccessor.executeQuery(updateAlertHostName); } private void executeWidgetDDLUpdates() throws AmbariException, SQLException { List<DBColumnInfo> columns = new ArrayList<>(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("widget_name", String.class, 255, null, false)); columns.add(new DBColumnInfo("widget_type", String.class, 255, null, false)); columns.add(new DBColumnInfo("metrics", char[].class, null, null, true)); columns.add(new DBColumnInfo("time_created", Long.class, null, null, false)); columns.add(new DBColumnInfo("author", String.class, 255, null, true)); columns.add(new DBColumnInfo("description", String.class, 255, null, true)); columns.add(new DBColumnInfo("default_section_name", String.class, 255, null, true)); columns.add(new DBColumnInfo("scope", String.class, 255, null, true)); columns.add(new DBColumnInfo("widget_values", char[].class, null, null, true)); columns.add(new DBColumnInfo("properties", char[].class, null, null, true)); columns.add(new DBColumnInfo("cluster_id", Long.class, null, null, false)); dbAccessor.createTable(WIDGET_TABLE, columns, "id"); columns = new ArrayList<>(); columns.add(new DBColumnInfo("id", Long.class, null, null, false)); columns.add(new DBColumnInfo("layout_name", String.class, 255, null, false)); columns.add(new DBColumnInfo("section_name", String.class, 255, null, false)); columns.add(new DBColumnInfo("cluster_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("scope", String.class, 255, null, false)); columns.add(new DBColumnInfo("user_name", String.class, 255, null, false)); columns.add(new DBColumnInfo("display_name", String.class, 255, null, true)); dbAccessor.createTable(WIDGET_LAYOUT_TABLE, columns, "id"); columns = new ArrayList<>(); columns.add(new DBColumnInfo("widget_layout_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("widget_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("widget_order", Short.class, null, null, true)); dbAccessor.createTable(WIDGET_LAYOUT_USER_WIDGET_TABLE, columns, "widget_layout_id", "widget_id"); dbAccessor.addFKConstraint(WIDGET_LAYOUT_USER_WIDGET_TABLE, "FK_widget_layout_id", "widget_layout_id", "widget_layout", "id", false, false); dbAccessor.addFKConstraint(WIDGET_LAYOUT_USER_WIDGET_TABLE, "FK_widget_id", "widget_id", "widget", "id", false, false); //Alter users to store active widget layouts dbAccessor.addColumn("users", new DBColumnInfo("active_widget_layouts", String.class, 1024, null, true)); // Sequence updates addSequences(Arrays.asList("widget_id_seq", "widget_layout_id_seq"), 0L, false); } /** * Adds the stack table, FKs, and constraints. */ private void executeStackDDLUpdates() throws AmbariException, SQLException { // stack table creation ArrayList<DBColumnInfo> columns = new ArrayList<>(); columns.add(new DBColumnInfo("stack_id", Long.class, null, null, false)); columns.add(new DBColumnInfo("stack_name", String.class, 255, null, false)); columns.add(new DBColumnInfo("stack_version", String.class, 255, null, false)); dbAccessor.createTable(STACK_TABLE, columns, "stack_id"); dbAccessor.addUniqueConstraint(STACK_TABLE, "unq_stack", "stack_name", "stack_version"); addSequence("stack_id_seq", 0L, false); // create the new stack ID columns NULLABLE for now since we need to insert // data into them later on (we'll change them to NOT NULL after that) dbAccessor.addColumn(CLUSTERS_TABLE, DESIRED_STACK_ID_COLUMN); dbAccessor.addColumn("hostcomponentdesiredstate", DESIRED_STACK_ID_COLUMN); dbAccessor.addColumn(SERVICE_COMPONENT_DESIRED_STATE_TABLE, DESIRED_STACK_ID_COLUMN); dbAccessor.addColumn("servicedesiredstate", DESIRED_STACK_ID_COLUMN); dbAccessor.addFKConstraint(CLUSTERS_TABLE, "fk_clusters_desired_stack_id", DESIRED_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint("hostcomponentdesiredstate", "fk_hcds_desired_stack_id", DESIRED_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint(SERVICE_COMPONENT_DESIRED_STATE_TABLE, "fk_scds_desired_stack_id", DESIRED_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint("servicedesiredstate", "fk_sds_desired_stack_id", DESIRED_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addColumn("clusterstate", CURRENT_STACK_ID_COLUMN); dbAccessor.addColumn("hostcomponentstate", CURRENT_STACK_ID_COLUMN); dbAccessor.addFKConstraint("clusterstate", "fk_cs_current_stack_id", CURRENT_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint("hostcomponentstate", "fk_hcs_current_stack_id", CURRENT_STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addColumn("clusterconfig", STACK_ID_COLUMN); dbAccessor.addColumn("serviceconfig", STACK_ID_COLUMN); dbAccessor.addColumn("blueprint", STACK_ID_COLUMN); dbAccessor.addColumn(REPO_VERSION_TABLE, STACK_ID_COLUMN); dbAccessor.addFKConstraint("clusterconfig", "fk_clusterconfig_stack_id", STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint("serviceconfig", "fk_serviceconfig_stack_id", STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint("blueprint", "fk_blueprint_stack_id", STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); dbAccessor.addFKConstraint(REPO_VERSION_TABLE, "fk_repoversion_stack_id", STACK_ID_COLUMN_NAME, STACK_TABLE, STACK_ID_COLUMN_NAME, true); // drop the unique constraint for the old column and add the new one dbAccessor.dropUniqueConstraint(REPO_VERSION_TABLE, "uq_repo_version_stack_version"); dbAccessor.addUniqueConstraint("repo_version", "uq_repo_version_stack_id", "stack_id", "version"); } /** * Adds the stack table and constraints. */ protected void executeStackPreDMLUpdates() throws AmbariException, SQLException { Gson gson = new Gson(); injector.getInstance(AmbariMetaInfo.class); StackDAO stackDAO = injector.getInstance(StackDAO.class); List<StackEntity> stacks = stackDAO.findAll(); Map<Long,String> entityToJsonMap = new HashMap<>(); // build a mapping of stack entity to old-school JSON for( StackEntity stack : stacks ){ StackId stackId = new StackId(stack.getStackName(), stack.getStackVersion()); String stackJson = gson.toJson(stackId); entityToJsonMap.put(stack.getStackId(), stackJson); } // use a bulk update on all tables to populate the new FK columns String UPDATE_TEMPLATE = "UPDATE {0} SET {1} = {2} WHERE {3} = ''{4}''"; String UPDATE_BLUEPRINT_TEMPLATE = "UPDATE blueprint SET stack_id = {0} WHERE stack_name = ''{1}'' AND stack_version = ''{2}''"; Set<Long> stackEntityIds = entityToJsonMap.keySet(); for (Long stackEntityId : stackEntityIds) { StackEntity stackEntity = stackDAO.findById(stackEntityId); String outdatedJson = entityToJsonMap.get(stackEntityId); String outdatedRepoStack = MessageFormat.format("{0}-{1}",stackEntity.getStackName(),stackEntity.getStackVersion()); String clustersSQL = MessageFormat.format(UPDATE_TEMPLATE, "clusters", DESIRED_STACK_ID_COLUMN_NAME, stackEntityId, DESIRED_STACK_VERSION_COLUMN_NAME, outdatedJson); String hostComponentDesiredStateSQL = MessageFormat.format( UPDATE_TEMPLATE, "hostcomponentdesiredstate", DESIRED_STACK_ID_COLUMN_NAME, stackEntityId, DESIRED_STACK_VERSION_COLUMN_NAME, outdatedJson); String serviceComponentDesiredStateSQL = MessageFormat.format( UPDATE_TEMPLATE, SERVICE_COMPONENT_DESIRED_STATE_TABLE, DESIRED_STACK_ID_COLUMN_NAME, stackEntityId, DESIRED_STACK_VERSION_COLUMN_NAME, outdatedJson); String serviceDesiredStateSQL = MessageFormat.format(UPDATE_TEMPLATE, "servicedesiredstate", DESIRED_STACK_ID_COLUMN_NAME, stackEntityId, DESIRED_STACK_VERSION_COLUMN_NAME, outdatedJson); String clusterStateSQL = MessageFormat.format(UPDATE_TEMPLATE, "clusterstate", CURRENT_STACK_ID_COLUMN_NAME, stackEntityId, CURRENT_STACK_VERSION_COLUMN_NAME, outdatedJson); String hostComponentStateSQL = MessageFormat.format(UPDATE_TEMPLATE, "hostcomponentstate", CURRENT_STACK_ID_COLUMN_NAME, stackEntityId, CURRENT_STACK_VERSION_COLUMN_NAME, outdatedJson); String blueprintSQL = MessageFormat.format(UPDATE_BLUEPRINT_TEMPLATE, stackEntityId, stackEntity.getStackName(), stackEntity.getStackVersion()); String repoVersionSQL = MessageFormat.format(UPDATE_TEMPLATE, REPO_VERSION_TABLE, STACK_ID_COLUMN_NAME, stackEntityId, "stack", outdatedRepoStack); dbAccessor.executeQuery(clustersSQL, "clusters", DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(hostComponentDesiredStateSQL, "hostcomponentdesiredstate", DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(serviceComponentDesiredStateSQL, SERVICE_COMPONENT_DESIRED_STATE_TABLE, DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(serviceDesiredStateSQL, "servicedesiredstate", DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(clusterStateSQL, "clusterstate", CURRENT_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(hostComponentStateSQL, "hostcomponentstate", CURRENT_STACK_VERSION_COLUMN_NAME); dbAccessor.executeQuery(blueprintSQL, "blueprint", "stack_name"); dbAccessor.executeQuery(repoVersionSQL, REPO_VERSION_TABLE, "stack"); } // for the tables with no prior stack, set these based on the cluster's // stack for each cluster defined String INSERT_STACK_ID_TEMPLATE = "UPDATE {0} SET {1} = {2} WHERE cluster_id = {3}"; // we should do the changes only if they are required if (dbAccessor.tableHasColumn(CLUSTERS_TABLE,DESIRED_STACK_VERSION_COLUMN_NAME)) { Statement statement = null; ResultSet rs = null; try { statement = dbAccessor.getConnection().createStatement(); if (statement != null) { rs = statement.executeQuery("SELECT * FROM " + CLUSTERS_TABLE); if (rs != null) { while (rs.next()) { long clusterId = rs.getLong("cluster_id"); String stackJson = rs.getString(DESIRED_STACK_VERSION_COLUMN_NAME); StackId stackId = gson.fromJson(stackJson, StackId.class); StackEntity stackEntity = stackDAO.find(stackId.getStackName(), stackId.getStackVersion()); String clusterConfigSQL = MessageFormat.format( INSERT_STACK_ID_TEMPLATE, "clusterconfig", STACK_ID_COLUMN_NAME, stackEntity.getStackId(), clusterId); String serviceConfigSQL = MessageFormat.format( INSERT_STACK_ID_TEMPLATE, "serviceconfig", STACK_ID_COLUMN_NAME, stackEntity.getStackId(), clusterId); dbAccessor.executeQuery(clusterConfigSQL); dbAccessor.executeQuery(serviceConfigSQL); } } } String UPDATE_CURRENT_STACK_ID_IF_NULL_TEMPLATE = "UPDATE hostcomponentstate " + "SET current_stack_id={0} " + "WHERE current_stack_id IS NULL " + "AND cluster_id={1} "; rs = statement.executeQuery("SELECT cluster_id, current_stack_id FROM clusterstate"); if (rs != null) { while (rs.next()) { // if hostcomponentstate.current_stack_id is null, // set to cluster's current_stack_id long clusterId = rs.getLong("cluster_id"); long currentStackId = rs.getLong("current_stack_id"); String hostComponentStateSQL = MessageFormat.format( UPDATE_CURRENT_STACK_ID_IF_NULL_TEMPLATE, currentStackId, clusterId); dbAccessor.executeUpdate(hostComponentStateSQL, false); } } } finally { if (rs != null) { rs.close(); } if (statement != null) { statement.close(); } } } } /** * Copy cluster & service widgets from stack to DB. */ protected void initializeClusterAndServiceWidgets() throws AmbariException { AmbariManagementController controller = injector.getInstance(AmbariManagementController.class); Clusters clusters = controller.getClusters(); if (clusters == null) { return; } Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (Cluster cluster : clusterMap.values()) { controller.initializeWidgetsAndLayouts(cluster, null); Map<String, Service> serviceMap = cluster.getServices(); if (serviceMap != null && !serviceMap.isEmpty()) { for (Service service : serviceMap.values()) { controller.initializeWidgetsAndLayouts(cluster, service); } } } } } // ----- UpgradeCatalog ---------------------------------------------------- /** * Populate the id of the hosts table with an auto-increment int. * @param resultSet Rows from the hosts table, sorted first by host_id * @return Returns an integer with the id for the next host record to be inserted. * @throws SQLException */ Long populateHostsId(ResultSet resultSet) throws SQLException { Long hostId = 0L; if (resultSet != null) { try { while (resultSet.next()) { hostId++; final String hostName = resultSet.getString(1); if (StringUtils.isNotBlank(hostName)) { dbAccessor.executeQuery("UPDATE " + HOSTS_TABLE + " SET host_id = " + hostId + " WHERE " + HOST_NAME_COL + " = '" + hostName + "'"); } } } catch (Exception e) { LOG.error("Unable to populate the id of the hosts. " + e.getMessage()); } } return hostId; } private String getRandomHostName() throws SQLException { String randomHostName = null; Statement statement = null; ResultSet rs = null; try { statement = dbAccessor.getConnection().createStatement(); if (statement != null) { rs = statement.executeQuery("SELECT " + HOST_NAME_COL + " FROM " + HOSTS_TABLE + " ORDER BY " + HOST_NAME_COL + " ASC"); if (rs != null && rs.next()) { randomHostName = rs.getString(1); } } } catch (Exception e) { LOG.error("Failed to retrieve random host name. Exception: " + e.getMessage()); } finally { if (rs != null) { rs.close(); } if (statement != null) { statement.close(); } } return randomHostName; } /** * Remove duplicate hosts before making host name case-insensitive * @throws SQLException */ private void removeDuplicateHosts() throws SQLException { // Select hosts not in the cluster String hostsNotInClusterQuery = MessageFormat.format( "SELECT * FROM {0} WHERE {1} NOT IN (SELECT {1} FROM {2})", HOSTS_TABLE, HOST_ID_COL, CLUSTER_HOST_MAPPING_TABLE); ResultSet hostsNotInCluster = null; Statement statement = null; Statement duplicatedHostsStatement = null; try { statement = dbAccessor.getConnection().createStatement(); duplicatedHostsStatement = dbAccessor.getConnection().createStatement(); hostsNotInCluster = statement.executeQuery(hostsNotInClusterQuery); if(hostsNotInCluster != null) { while (hostsNotInCluster.next()) { long hostToDeleteId = hostsNotInCluster.getLong(HOST_ID_COL); String hostToDeleteName = hostsNotInCluster.getString(HOST_NAME_COL); String duplicateHostsQuery = "SELECT count(*) FROM hosts WHERE lower(host_name) = '" + hostToDeleteName + "' AND host_id != " + hostToDeleteId; long count = 0; ResultSet duplicateHosts = null; try { duplicateHosts = duplicatedHostsStatement.executeQuery(duplicateHostsQuery); if (duplicateHosts != null && duplicateHosts.next()) { count = duplicateHosts.getLong(1); } } finally { if (null != duplicateHosts) { duplicateHosts.close(); } } if (count > 0) { // Delete hosts and host_state table entries for this duplicate host entry dbAccessor.executeQuery( MessageFormat.format("DELETE from {0} WHERE {1} = {2,number,#}", HOST_STATE_TABLE, HOST_ID_COL, hostToDeleteId)); dbAccessor.executeQuery( MessageFormat.format("DELETE from {0} WHERE {1} = {2,number,#}", HOSTS_TABLE, HOST_ID_COL, hostToDeleteId)); } } } } finally { if (null != hostsNotInCluster) { hostsNotInCluster.close(); } if (statement != null) { statement.close(); } if (duplicatedHostsStatement != null) { duplicatedHostsStatement.close(); } } } /** * Get the constraint name created by Derby if one was not specified for the table. * @param type Constraint-type, either, "p" (Primary), "c" (Check), "f" (Foreign), "u" (Unique) * @param tableName Table Name * @return Return the constraint name, or null if not found. * @throws SQLException */ private String getDerbyTableConstraintName(String type, String tableName) throws SQLException { boolean found = false; String constraint = null; Statement statement = null; ResultSet rs = null; try { statement = dbAccessor.getConnection().createStatement(); if (statement != null) { rs = statement.executeQuery("SELECT c.constraintname, c.type, t.tablename FROM sys.sysconstraints c, sys.systables t WHERE c.tableid = t.tableid"); if (rs != null) { while(rs.next()) { constraint = rs.getString(1); String recordType = rs.getString(2); String recordTableName = rs.getString(3); if (recordType.equalsIgnoreCase(type) && recordTableName.equalsIgnoreCase(tableName)) { found = true; break; } } } } } finally { if (rs != null) { rs.close(); } if (statement != null) { statement.close(); } } return found ? constraint : null; } /** * {@inheritDoc} */ @Override protected void executePreDMLUpdates() throws AmbariException, SQLException { executeStackPreDMLUpdates(); cleanupStackUpdates(); } /** * {@inheritDoc} */ @Override protected void executeDMLUpdates() throws AmbariException, SQLException { addNewConfigurationsFromXml(); // Initialize all default widgets and widget layouts initializeClusterAndServiceWidgets(); addMissingConfigs(); updateAlertDefinitions(); removeStormRestApiServiceComponent(); updateKerberosDescriptorArtifacts(); } /** * {@inheritDoc} */ @Override protected void updateKerberosDescriptorArtifact(ArtifactDAO artifactDAO, ArtifactEntity artifactEntity) throws AmbariException { if (artifactEntity != null) { Map<String, Object> data = artifactEntity.getArtifactData(); if (data != null) { final KerberosDescriptor kerberosDescriptor = new KerberosDescriptorFactory().createInstance(data); if (kerberosDescriptor != null) { // Get the global "hdfs" identity (if it exists) KerberosIdentityDescriptor hdfsIdentity = kerberosDescriptor.getIdentity("hdfs"); if (hdfsIdentity != null) { // Move the "hdfs" global identity to under HDFS service by removing it from the // collection of global identities and _merging_ it into the identities for the HDFS // service - creating a sparse HDFS service structure if necessary. KerberosServiceDescriptor hdfsService = kerberosDescriptor.getService("HDFS"); if (hdfsService == null) { hdfsService = new KerberosServiceDescriptorFactory().createInstance("HDFS", (Map) null); hdfsService.putIdentity(hdfsIdentity); kerberosDescriptor.putService(hdfsService); } else { KerberosIdentityDescriptor hdfsReferenceIdentity = hdfsService.getIdentity("/hdfs"); if (hdfsReferenceIdentity != null) { // Merge the changes from the reference identity into the global identity... hdfsIdentity.update(hdfsReferenceIdentity); // Make sure the identity's name didn't change. hdfsIdentity.setName("hdfs"); hdfsService.removeIdentity("/hdfs"); } hdfsService.putIdentity(hdfsIdentity); } kerberosDescriptor.removeIdentity("hdfs"); } // Find all identities named "/hdfs" and update the name to "/HDFS/hdfs" updateKerberosDescriptorIdentityReferences(kerberosDescriptor, "/hdfs", "/HDFS/hdfs"); updateKerberosDescriptorIdentityReferences(kerberosDescriptor.getServices(), "/hdfs", "/HDFS/hdfs"); artifactEntity.setArtifactData(kerberosDescriptor.toMap()); artifactDAO.merge(artifactEntity); } } } } /** * Delete STORM_REST_API component if HDP is upgraded past 2.2 and the * Component still exists. */ protected void removeStormRestApiServiceComponent() { AmbariManagementController ambariManagementController = injector.getInstance(AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); for (final Cluster cluster : clusterMap.values()) { StackId stackId = cluster.getCurrentStackVersion(); if (stackId != null && stackId.getStackName().equals("HDP") && VersionUtils.compareVersions(stackId.getStackVersion(), "2.2") >= 0) { executeInTransaction(new Runnable() { @Override public void run() { ServiceComponentDesiredStateDAO dao = injector.getInstance(ServiceComponentDesiredStateDAO.class); ServiceComponentDesiredStateEntity entity = dao.findByName(cluster.getClusterId(), "STORM", "STORM_REST_API"); if (entity != null) { EntityManager em = getEntityManagerProvider().get(); CriteriaBuilder cb = em.getCriteriaBuilder(); try { LOG.info("Deleting STORM_REST_API service component."); CriteriaDelete<HostComponentStateEntity> hcsDelete = cb.createCriteriaDelete(HostComponentStateEntity.class); CriteriaDelete<HostComponentDesiredStateEntity> hcdDelete = cb.createCriteriaDelete(HostComponentDesiredStateEntity.class); CriteriaDelete<ServiceComponentDesiredStateEntity> scdDelete = cb.createCriteriaDelete(ServiceComponentDesiredStateEntity.class); Root<HostComponentStateEntity> hcsRoot = hcsDelete.from(HostComponentStateEntity.class); Root<HostComponentDesiredStateEntity> hcdRoot = hcdDelete.from(HostComponentDesiredStateEntity.class); Root<ServiceComponentDesiredStateEntity> scdRoot = scdDelete.from(ServiceComponentDesiredStateEntity.class); hcsDelete.where(cb.equal(hcsRoot.get("componentName"), "STORM_REST_API")); hcdDelete.where(cb.equal(hcdRoot.get("componentName"), "STORM_REST_API")); scdDelete.where(cb.equal(scdRoot.get("componentName"), "STORM_REST_API")); em.createQuery(hcsDelete).executeUpdate(); em.createQuery(hcdDelete).executeUpdate(); em.createQuery(scdDelete).executeUpdate(); } catch (Exception e) { LOG.warn("Error deleting STORM_REST_API service component. " + "This could result in issue with ambari server start. " + "Please make sure the STORM_REST_API component is deleted " + "from the database by running following commands:\n" + "delete from hostcomponentdesiredstate where component_name='STORM_REST_API';\n" + "delete from hostcomponentstate where component_name='STORM_REST_API';\n" + "delete from servicecomponentdesiredstate where component_name='STORM_REST_API';\n", e); } } } }); } } } } /** * Modifies the JSON of some of the alert definitions which have changed * between Ambari versions. */ protected void updateAlertDefinitions() { AmbariManagementController ambariManagementController = injector.getInstance(AmbariManagementController.class); AlertDefinitionDAO alertDefinitionDAO = injector.getInstance(AlertDefinitionDAO.class); Clusters clusters = ambariManagementController.getClusters(); List<String> metricAlerts = Arrays.asList("namenode_cpu", "namenode_hdfs_blocks_health", "namenode_hdfs_capacity_utilization", "namenode_rpc_latency", "namenode_directory_status", "datanode_health_summary", "datanode_storage"); List<String> mapredAlerts = Arrays.asList("mapreduce_history_server_cpu", "mapreduce_history_server_rpc_latency"); List<String> rmAlerts = Arrays.asList("yarn_resourcemanager_cpu", "yarn_resourcemanager_rpc_latency"); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { // HDFS metric alerts for (String alertName : metricAlerts) { AlertDefinitionEntity alertDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), alertName); if (alertDefinitionEntity != null) { String source = alertDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_keytab", "{{hdfs-site/dfs.web.authentication.kerberos.keytab}}"); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_principal", "{{hdfs-site/dfs.web.authentication.kerberos.principal}}"); updateAlertDefinitionEntitySource(alertName, rootJson.toString(), UUID.randomUUID().toString()); } } // MapR alerts update for kerberos for (String alertName : mapredAlerts) { AlertDefinitionEntity alertDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), alertName); if (alertDefinitionEntity != null) { String source = alertDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_keytab", "{{mapred-site/mapreduce.jobhistory.webapp.spnego-keytab-file}}"); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_principal", "{{mapred-site/mapreduce.jobhistory.webapp.spnego-principal}}"); updateAlertDefinitionEntitySource(alertName, rootJson.toString(), UUID.randomUUID().toString()); } } // YARN alerts for (String alertName : rmAlerts) { AlertDefinitionEntity alertDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), alertName); if (alertDefinitionEntity != null) { String source = alertDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_keytab", "{{yarn-site/yarn.resourcemanager.webapp.spnego-keytab-file}}"); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_principal", "{{yarn-site/yarn.resourcemanager.webapp.spnego-principal}}"); updateAlertDefinitionEntitySource(alertName, rootJson.toString(), UUID.randomUUID().toString()); } } // zookeeper failover conroller alert update for default port and uri // to 8019 and dfs.ha.zkfc.port AlertDefinitionEntity zkFailoverDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), "hdfs_zookeeper_failover_controller_process"); if (zkFailoverDefinitionEntity != null) { String source = zkFailoverDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); rootJson.remove("uri"); rootJson.remove("default_port"); rootJson.addProperty("uri", "{{hdfs-site/dfs.ha.zkfc.port}}"); rootJson.addProperty("default_port", new Integer(8019)); // save the changes updateAlertDefinitionEntitySource("hdfs_zookeeper_failover_controller_process", rootJson.toString(), UUID.randomUUID().toString()); } // update ranger admin alerts from type port(2.2) to web(2.3) AlertDefinitionEntity rangerAdminDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), "ranger_admin_process"); if (rangerAdminDefinitionEntity != null) { String source = rangerAdminDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); JsonObject uriJson = new JsonObject(); JsonObject reporting = rootJson.getAsJsonObject("reporting"); JsonObject ok = reporting.getAsJsonObject("ok"); JsonObject warning = reporting.getAsJsonObject("warning"); JsonObject critical = reporting.getAsJsonObject("critical"); rootJson.remove("type"); rootJson.remove("default_port"); rootJson.addProperty("type", "WEB"); uriJson.addProperty("http", "{{admin-properties/policymgr_external_url}}"); uriJson.addProperty("https", "{{admin-properties/policymgr_external_url}}"); uriJson.addProperty("https_property", "{{ranger-site/http.enabled}}"); uriJson.addProperty("https_property_value", "false"); uriJson.addProperty("connection_timeout", 5.0f); rootJson.remove("uri"); rootJson.add("uri", uriJson); ok.remove("text"); ok.addProperty("text", "HTTP {0} response in {2:.3f}s"); warning.remove("text"); warning.remove("value"); warning.addProperty("text", "HTTP {0} response from {1} in {2:.3f}s ({3})"); critical.remove("text"); critical.remove("value"); critical.addProperty("text", "Connection failed to {1} ({3})"); // save the changes updateAlertDefinitionEntitySource("ranger_admin_process", rootJson.toString(), UUID.randomUUID().toString()); } // update oozie web ui alert AlertDefinitionEntity oozieWebUIAlertDefinitionEntity = alertDefinitionDAO.findByName( cluster.getClusterId(), "oozie_server_webui"); if (oozieWebUIAlertDefinitionEntity != null) { String source = oozieWebUIAlertDefinitionEntity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); rootJson.get("uri").getAsJsonObject().remove("http"); rootJson.get("uri").getAsJsonObject().remove("kerberos_keytab"); rootJson.get("uri").getAsJsonObject().remove("kerberos_principal"); rootJson.get("uri").getAsJsonObject().addProperty("http", "{{oozie-site/oozie.base.url}}/?user.name={{oozie-env/oozie_user}}"); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_keytab", "{{cluster-env/smokeuser_keytab}}"); rootJson.get("uri").getAsJsonObject().addProperty("kerberos_principal", "{{cluster-env/smokeuser_principal_name}}"); // save the changes updateAlertDefinitionEntitySource("oozie_server_webui", rootJson.toString(), UUID.randomUUID().toString()); } // update HDFS metric alerts that had changes to their text List<String> hdfsMetricAlertsFloatDivision = Arrays.asList( "namenode_hdfs_capacity_utilization", "datanode_storage"); for (String metricAlertName : hdfsMetricAlertsFloatDivision) { AlertDefinitionEntity entity = alertDefinitionDAO.findByName(cluster.getClusterId(), metricAlertName); if (null == entity) { continue; } String source = entity.getSource(); JsonObject rootJson = new JsonParser().parse(source).getAsJsonObject(); JsonObject reporting = rootJson.getAsJsonObject("reporting"); JsonObject ok = reporting.getAsJsonObject("ok"); JsonObject warning = reporting.getAsJsonObject("warning"); JsonObject critical = reporting.getAsJsonObject("critical"); JsonElement okText = ok.remove("text"); ok.addProperty("text", okText.getAsString().replace("{2:d}", "{2:.0f}")); JsonElement warningText = warning.remove("text"); warning.addProperty("text", warningText.getAsString().replace("{2:d}", "{2:.0f}")); JsonElement criticalText = critical.remove("text"); critical.addProperty("text", criticalText.getAsString().replace("{2:d}", "{2:.0f}")); // save the changes updateAlertDefinitionEntitySource(metricAlertName, rootJson.toString(), UUID.randomUUID().toString()); } } } } } private void updateAlertDefinitionEntitySource(final String alertName, final String source, final String newHash) { executeInTransaction(new Runnable() { @Override public void run() { EntityManager em = getEntityManagerProvider().get(); Query nativeQuery = em.createNativeQuery("UPDATE alert_definition SET alert_source=?1, hash=?2 WHERE " + "definition_name=?3"); nativeQuery.setParameter(1, source); nativeQuery.setParameter(2, newHash); nativeQuery.setParameter(3, alertName); nativeQuery.executeUpdate(); } }); } protected void addMissingConfigs() throws AmbariException { updateHiveConfigs(); updateHdfsConfigs(); updateStormConfigs(); updateRangerHiveConfigs(); updateRangerHBaseConfigs(); updateRangerSiteConfigs(); updateHBaseConfigs(); } protected void updateRangerSiteConfigs() throws AmbariException{ AmbariManagementController ambariManagementController = injector.getInstance(AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); Map<String, String> rangerPropertyMap = new HashMap<String, String>() {{ put("HTTPS_CLIENT_AUTH", "https.attrib.clientAuth"); put("HTTPS_KEYSTORE_FILE", "https.attrib.keystoreFile"); put("HTTPS_KEYSTORE_PASS", "https.attrib.keystorePass"); put("HTTPS_KEY_ALIAS", "https.attrib.keyAlias"); put("HTTPS_SERVICE_PORT", "https.service.port"); put("HTTP_ENABLED", "http.enabled"); put("HTTP_SERVICE_PORT", "http.service.port"); }}; if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { Config rangerSite = cluster.getDesiredConfigByType(RANGER_SITE_CONFIG); Map<String, String> rangerSiteProperties; Map<String, String> convertedRangerSiteProperties = new HashMap<>(); Set<String> oldPropertiesList = new HashSet<>(); if (rangerSite != null) { rangerSiteProperties = rangerSite.getProperties(); for (Map.Entry<String, String> mapEntry: rangerPropertyMap.entrySet()) { String oldKey = mapEntry.getKey(); String newKey = mapEntry.getValue(); if (rangerSiteProperties.containsKey(oldKey)) { convertedRangerSiteProperties.put(newKey, rangerSiteProperties.get(oldKey)); oldPropertiesList.add(oldKey); } } } updateConfigurationPropertiesForCluster(cluster, RANGER_SITE_CONFIG, convertedRangerSiteProperties, true, false); removeConfigurationPropertiesFromCluster(cluster, RANGER_SITE_CONFIG, oldPropertiesList); } } } } protected void updateRangerHiveConfigs() throws AmbariException{ AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { Config RangerHiveConfig = cluster.getDesiredConfigByType("ranger-hive-plugin-properties"); if (RangerHiveConfig != null && RangerHiveConfig.getProperties().containsKey("ranger-hive-plugin-enabled") && cluster.getDesiredConfigByType("hive-env") != null) { Map<String, String> newHiveEnvProperties = new HashMap<>(); Map<String, String> newHiveServerProperties = new HashMap<>(); Set<String> removeRangerHiveProperties = new HashSet<>(); removeRangerHiveProperties.add("ranger-hive-plugin-enabled"); if (RangerHiveConfig.getProperties().get("ranger-hive-plugin-enabled") != null && RangerHiveConfig.getProperties().get("ranger-hive-plugin-enabled").equalsIgnoreCase("yes")) { newHiveEnvProperties.put("hive_security_authorization", "Ranger"); newHiveServerProperties.put("hive.security.authorization.enabled", "true"); } boolean updateProperty = cluster.getDesiredConfigByType("hive-env").getProperties().containsKey("hive_security_authorization"); updateConfigurationPropertiesForCluster(cluster, "hive-env", newHiveEnvProperties, updateProperty, true); updateConfigurationPropertiesForCluster(cluster, "hiveserver2-site", newHiveServerProperties, updateProperty, true); removeConfigurationPropertiesFromCluster(cluster, "ranger-hive-plugin-properties", removeRangerHiveProperties); } } } } } protected void updateRangerHBaseConfigs() throws AmbariException{ AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { Config RangerHBaseConfig = cluster.getDesiredConfigByType("ranger-hbase-plugin-properties"); if (RangerHBaseConfig != null && RangerHBaseConfig.getProperties().containsKey("ranger-hbase-plugin-enabled") && cluster.getDesiredConfigByType("hbase-site") != null) { Map<String, String> newHBaseSiteProperties = new HashMap<>(); if (RangerHBaseConfig.getProperties().get("ranger-hbase-plugin-enabled") != null && RangerHBaseConfig.getProperties().get("ranger-hbase-plugin-enabled").equalsIgnoreCase("yes")) { newHBaseSiteProperties.put("hbase.security.authorization", "true"); } boolean updateProperty = cluster.getDesiredConfigByType("hbase-site").getProperties().containsKey("hbase.security.authorization"); updateConfigurationPropertiesForCluster(cluster, "hbase-site", newHBaseSiteProperties, updateProperty, true); } } } } } protected void updateHdfsConfigs() throws AmbariException { AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); Map<String, String> prop = new HashMap<>(); String content = null; if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { /*** * Append -Dorg.mortbay.jetty.Request.maxFormContentSize=-1 to HADOOP_NAMENODE_OPTS from hadoop-env.sh */ content = null; if (cluster.getDesiredConfigByType("hadoop-env") != null) { content = cluster.getDesiredConfigByType( "hadoop-env").getProperties().get("content"); } if (content != null) { content += "\nexport HADOOP_NAMENODE_OPTS=\"${HADOOP_NAMENODE_OPTS} -Dorg.mortbay.jetty.Request.maxFormContentSize=-1\""; prop.put("content", content); updateConfigurationPropertiesForCluster(cluster, "hadoop-env", prop, true, false); } /*** * Update dfs.namenode.rpc-address set hostname instead of localhost */ if (cluster.getDesiredConfigByType(HDFS_SITE_CONFIG) != null && !cluster.getHosts("HDFS","NAMENODE").isEmpty()) { URI nameNodeRpc = null; String hostName = cluster.getHosts("HDFS","NAMENODE").iterator().next(); // Try to generate dfs.namenode.rpc-address if (cluster.getDesiredConfigByType("core-site").getProperties() != null && cluster.getDesiredConfigByType("core-site").getProperties().get("fs.defaultFS") != null) { try { if (isNNHAEnabled(cluster)) { // NN HA enabled // Remove dfs.namenode.rpc-address property Set<String> removePropertiesSet = new HashSet<>(); removePropertiesSet.add("dfs.namenode.rpc-address"); removeConfigurationPropertiesFromCluster(cluster, HDFS_SITE_CONFIG, removePropertiesSet); } else { // NN HA disabled nameNodeRpc = new URI(cluster.getDesiredConfigByType("core-site").getProperties().get("fs.defaultFS")); Map<String, String> hdfsProp = new HashMap<>(); hdfsProp.put("dfs.namenode.rpc-address", hostName + ":" + nameNodeRpc.getPort()); updateConfigurationPropertiesForCluster(cluster, HDFS_SITE_CONFIG, hdfsProp, false, false); } } catch (URISyntaxException e) { e.printStackTrace(); } } } } } } } protected void updateHiveConfigs() throws AmbariException { AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { String content = null; String hive_server2_auth = ""; if (cluster.getDesiredConfigByType("hive-site") != null && cluster.getDesiredConfigByType("hive-site").getProperties().containsKey("hive.server2.authentication")) { hive_server2_auth = cluster.getDesiredConfigByType("hive-site").getProperties().get("hive.server2.authentication"); } if(cluster.getDesiredConfigByType("hive-env") != null) { Map<String, String> hiveEnvProps = new HashMap<>(); Set<String> hiveServerSiteRemoveProps = new HashSet<>(); // Update logic for setting HIVE_AUX_JARS_PATH in hive-env.sh content = cluster.getDesiredConfigByType("hive-env").getProperties().get("content"); if(content != null) { content = updateHiveEnvContent(content); hiveEnvProps.put("content", content); } //hive metastore and client_heapsize are added for HDP2, we should check if it exists and not add it for HDP1 if (!cluster.getDesiredConfigByType("hive-env").getProperties().containsKey("hive.client.heapsize")) { hiveEnvProps.put("hive.client.heapsize", "512"); } if (!cluster.getDesiredConfigByType("hive-env").getProperties().containsKey("hive.metastore.heapsize")) { hiveEnvProps.put("hive.metastore.heapsize", "1024"); } boolean isHiveSecurityAuthPresent = cluster.getDesiredConfigByType("hive-env").getProperties().containsKey("hive_security_authorization"); String hiveSecurityAuth=""; if ("kerberos".equalsIgnoreCase(hive_server2_auth) && cluster.getServices().containsKey("KERBEROS")){ hiveSecurityAuth = "SQLStdAuth"; isHiveSecurityAuthPresent = true; hiveEnvProps.put("hive_security_authorization", hiveSecurityAuth); } else { if (isHiveSecurityAuthPresent) { hiveSecurityAuth = cluster.getDesiredConfigByType("hive-env").getProperties().get("hive_security_authorization"); } } if (isHiveSecurityAuthPresent && "none".equalsIgnoreCase(hiveSecurityAuth) && !isConfigEnabled(cluster, AbstractUpgradeCatalog.CONFIGURATION_TYPE_RANGER_HIVE_PLUGIN_PROPERTIES, AbstractUpgradeCatalog.PROPERTY_RANGER_HIVE_PLUGIN_ENABLED)) { hiveServerSiteRemoveProps.add("hive.security.authorization.manager"); hiveServerSiteRemoveProps.add("hive.security.authenticator.manager"); } updateConfigurationPropertiesForCluster(cluster, "hive-env", hiveEnvProps, true, true); removeConfigurationPropertiesFromCluster(cluster, "hiveserver2-site", hiveServerSiteRemoveProps); } if(cluster.getDesiredConfigByType("hive-site") != null) { Set<String> hiveSiteRemoveProps = new HashSet<>(); Map<String, String> hiveSiteAddProps = new HashMap<>(); if (!"pam".equalsIgnoreCase(hive_server2_auth)) { hiveSiteRemoveProps.add("hive.server2.authentication.pam.services"); } else { hiveSiteAddProps.put("hive.server2.authentication.pam.services", ""); } if (!"custom".equalsIgnoreCase(hive_server2_auth)) { hiveSiteRemoveProps.add("hive.server2.custom.authentication.class"); } else { hiveSiteAddProps.put("hive.server2.custom.authentication.class", ""); } if (!"ldap".equalsIgnoreCase(hive_server2_auth)) { hiveSiteRemoveProps.add("hive.server2.authentication.ldap.url"); } else { hiveSiteAddProps.put("hive.server2.authentication.ldap.url", ""); } if (!"kerberos".equalsIgnoreCase(hive_server2_auth) && !cluster.getServices().containsKey("KERBEROS")) { hiveSiteRemoveProps.add("hive.server2.authentication.kerberos.keytab"); hiveSiteRemoveProps.add("hive.server2.authentication.kerberos.principal"); } else { hiveSiteAddProps.put("hive.server2.authentication.kerberos.keytab", ""); hiveSiteAddProps.put("hive.server2.authentication.kerberos.principal", ""); } updateConfigurationPropertiesForCluster(cluster, "hive-site", hiveSiteAddProps, hiveSiteRemoveProps, false, true); } } } } } protected void updateHBaseConfigs() throws AmbariException { AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { if (cluster.getDesiredConfigByType("hbase-site") != null && cluster.getDesiredConfigByType("hbase-env") != null) { Map<String, String> hbaseEnvProps = new HashMap<>(); Map<String, String> hbaseSiteProps = new HashMap<>(); Set<String> hbaseEnvRemoveProps = new HashSet<>(); Set<String> hbaseSiteRemoveProps = new HashSet<>(); if (cluster.getDesiredConfigByType("hbase-site").getProperties().containsKey("hbase.region.server.rpc.scheduler.factory.class") && "org.apache.phoenix.hbase.index.ipc.PhoenixIndexRpcSchedulerFactory".equals(cluster.getDesiredConfigByType("hbase-site").getProperties().get( "hbase.region.server.rpc.scheduler.factory.class"))) { hbaseEnvProps.put("phoenix_sql_enabled", "true"); } if (cluster.getDesiredConfigByType("hbase-env").getProperties().containsKey("phoenix_sql_enabled") && "true".equalsIgnoreCase(cluster.getDesiredConfigByType("hbase-env").getProperties().get("phoenix_sql_enabled"))) { hbaseSiteProps.put("hbase.regionserver.wal.codec", "org.apache.hadoop.hbase.regionserver.wal.IndexedWALEditCodec"); hbaseSiteProps.put("phoenix.functions.allowUserDefinedFunctions", "true"); } else { hbaseSiteProps.put("hbase.regionserver.wal.codec", "org.apache.hadoop.hbase.regionserver.wal.WALCellCodec"); hbaseSiteRemoveProps.add("hbase.rpc.controllerfactory.class"); hbaseSiteRemoveProps.add("phoenix.functions.allowUserDefinedFunctions"); } if (cluster.getDesiredConfigByType("hbase-site").getProperties().containsKey("hbase.security.authorization")) { if("true".equalsIgnoreCase(cluster.getDesiredConfigByType("hbase-site").getProperties().get("hbase.security.authorization"))) { hbaseSiteProps.put("hbase.coprocessor.master.classes", "org.apache.hadoop.hbase.security.access.AccessController"); hbaseSiteProps.put("hbase.coprocessor.regionserver.classes", "org.apache.hadoop.hbase.security.access.AccessController"); } else { hbaseSiteProps.put("hbase.coprocessor.master.classes", ""); hbaseSiteRemoveProps.add("hbase.coprocessor.regionserver.classes"); } } else { hbaseSiteRemoveProps.add("hbase.coprocessor.regionserver.classes"); } updateConfigurationPropertiesForCluster(cluster, "hbase-site", hbaseSiteProps, true, false); updateConfigurationPropertiesForCluster(cluster, "hbase-env", hbaseEnvProps, true, false); updateConfigurationPropertiesForCluster(cluster, "hbase-site", new HashMap<String, String>(), hbaseSiteRemoveProps, false, true); updateConfigurationPropertiesForCluster(cluster, "hbase-env", new HashMap<String, String>(), hbaseEnvRemoveProps, false, true); } } } } } protected String updateHiveEnvContent(String hiveEnvContent) { if(hiveEnvContent == null) { return null; } String oldAuxJarRegex = "if\\s*\\[\\s*\"\\$\\{HIVE_AUX_JARS_PATH\\}\"\\s*!=\\s*\"\"\\s*];\\s*then\\s*\\n" + "\\s*export\\s+HIVE_AUX_JARS_PATH\\s*=\\s*\\$\\{HIVE_AUX_JARS_PATH\\}\\s*\\n" + "\\s*elif\\s*\\[\\s*-d\\s*\"/usr/hdp/current/hive-webhcat/share/hcatalog\"\\s*\\];\\s*then\\s*\\n" + "\\s*export\\s+HIVE_AUX_JARS_PATH\\s*=\\s*/usr/hdp/current/hive-webhcat/share/hcatalog\\s*\n" + "\\s*fi"; String newAuxJarPath = "if [ \"${HIVE_AUX_JARS_PATH}\" != \"\" ]; then\n" + " if [ -f \"${HIVE_AUX_JARS_PATH}\" ]; then \n" + " export HIVE_AUX_JARS_PATH=${HIVE_AUX_JARS_PATH}\n" + " elif [ -d \"/usr/hdp/current/hive-webhcat/share/hcatalog\" ]; then\n" + " export HIVE_AUX_JARS_PATH=/usr/hdp/current/hive-webhcat/share/hcatalog/hive-hcatalog-core.jar\n" + " fi\n" + "elif [ -d \"/usr/hdp/current/hive-webhcat/share/hcatalog\" ]; then\n" + " export HIVE_AUX_JARS_PATH=/usr/hdp/current/hive-webhcat/share/hcatalog/hive-hcatalog-core.jar\n" + "fi"; return hiveEnvContent.replaceAll(oldAuxJarRegex, Matcher.quoteReplacement(newAuxJarPath)); } protected void updateStormConfigs() throws AmbariException { AmbariManagementController ambariManagementController = injector.getInstance( AmbariManagementController.class); Clusters clusters = ambariManagementController.getClusters(); if (clusters != null) { Map<String, Cluster> clusterMap = clusters.getClusters(); if (clusterMap != null && !clusterMap.isEmpty()) { for (final Cluster cluster : clusterMap.values()) { //if cluster is secured we should set additional properties if(cluster.getDesiredConfigByType("cluster-env") != null && cluster.getDesiredConfigByType("cluster-env").getProperties().get("security_enabled").equals("true") && cluster.getDesiredConfigByType("storm-site") != null ) { Map<String, String> newStormProps = new HashMap<>(); if (!cluster.getDesiredConfigByType("storm-site").getProperties().containsKey("java.security.auth.login.config")) { newStormProps.put("java.security.auth.login.config", "{{conf_dir}}/storm_jaas.conf"); } if (!cluster.getDesiredConfigByType("storm-site").getProperties().containsKey("nimbus.admins")) { newStormProps.put("nimbus.admins", "['{{storm_user}}']"); } if (!cluster.getDesiredConfigByType("storm-site").getProperties().containsKey("nimbus.supervisors.users")) { newStormProps.put("nimbus.supervisors.users", "['{{storm_user}}']"); } if (!cluster.getDesiredConfigByType("storm-site").getProperties().containsKey("storm.zookeeper.superACL")) { newStormProps.put("storm.zookeeper.superACL", "sasl:{{storm_bare_jaas_principal}}"); } if (!cluster.getDesiredConfigByType("storm-site").getProperties().containsKey("ui.filter.params")) { newStormProps.put("ui.filter.params", "{'type': 'kerberos', 'kerberos.principal': '{{storm_ui_jaas_principal}}', 'kerberos.keytab': '{{storm_ui_keytab_path}}', 'kerberos.name.rules': 'DEFAULT'}"); } updateConfigurationPropertiesForCluster(cluster, "storm-site", newStormProps, false, true); } } } } } /** * Adds non NULL constraints and drops outdated columns no longer needed after * the column data migration. */ private void cleanupStackUpdates() throws SQLException { DESIRED_STACK_ID_COLUMN.setNullable(false); CURRENT_STACK_ID_COLUMN.setNullable(false); STACK_ID_COLUMN.setNullable(false); // make all stack columns NOT NULL now that they are filled in dbAccessor.setColumnNullable(CLUSTERS_TABLE, DESIRED_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("hostcomponentdesiredstate", DESIRED_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable(SERVICE_COMPONENT_DESIRED_STATE_TABLE, DESIRED_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("servicedesiredstate", DESIRED_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("clusterstate", CURRENT_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("hostcomponentstate", CURRENT_STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("clusterconfig", STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("serviceconfig", STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable("blueprint", STACK_ID_COLUMN_NAME, false); dbAccessor.setColumnNullable(REPO_VERSION_TABLE, STACK_ID_COLUMN_NAME, false); // drop unused JSON columns dbAccessor.dropColumn(CLUSTERS_TABLE, DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn("hostcomponentdesiredstate", DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn(SERVICE_COMPONENT_DESIRED_STATE_TABLE, DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn("servicedesiredstate", DESIRED_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn("clusterstate", CURRENT_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn("hostcomponentstate", CURRENT_STACK_VERSION_COLUMN_NAME); dbAccessor.dropColumn("blueprint", "stack_name"); dbAccessor.dropColumn("blueprint", "stack_version"); dbAccessor.dropColumn(REPO_VERSION_TABLE, "stack"); } }