2023-06-06 19:58:54 +00:00
|
|
|
#include <Storages/StorageAzureBlob.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
|
|
|
|
#if USE_AZURE_BLOB_STORAGE
|
|
|
|
#include <Formats/FormatFactory.h>
|
|
|
|
#include <Interpreters/evaluateConstantExpression.h>
|
|
|
|
#include <Storages/checkAndGetLiteralArgument.h>
|
|
|
|
#include <Parsers/ASTFunction.h>
|
|
|
|
#include <Parsers/ASTInsertQuery.h>
|
|
|
|
|
|
|
|
#include <IO/SharedThreadPools.h>
|
|
|
|
|
|
|
|
#include <Parsers/ASTCreateQuery.h>
|
|
|
|
#include <Formats/ReadSchemaUtils.h>
|
2023-06-16 19:38:50 +00:00
|
|
|
#include <DataTypes/DataTypeLowCardinality.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
#include <DataTypes/DataTypeString.h>
|
2023-06-05 18:36:17 +00:00
|
|
|
#include <DataTypes/DataTypesNumber.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
|
2023-06-05 23:28:04 +00:00
|
|
|
#include <azure/storage/common/storage_credential.hpp>
|
2023-06-02 14:51:09 +00:00
|
|
|
#include <Processors/Transforms/AddingDefaultsTransform.h>
|
2023-07-04 16:50:31 +00:00
|
|
|
#include <Processors/Transforms/ExtractColumnsTransform.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
#include <Processors/Formats/IOutputFormat.h>
|
2023-08-22 11:59:59 +00:00
|
|
|
#include <Processors/Sources/ConstChunkGenerator.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
#include <Storages/StorageFactory.h>
|
|
|
|
#include <Storages/StorageSnapshot.h>
|
|
|
|
#include <Storages/PartitionedSink.h>
|
|
|
|
#include <Storages/VirtualColumnUtils.h>
|
|
|
|
#include <Storages/StorageURL.h>
|
|
|
|
#include <Storages/NamedCollectionsHelpers.h>
|
2023-06-05 22:40:05 +00:00
|
|
|
#include <Common/parseGlobs.h>
|
|
|
|
#include <Disks/ObjectStorages/ObjectStorageIterator.h>
|
2023-06-05 23:28:04 +00:00
|
|
|
#include <Disks/IO/AsynchronousBoundedReadBuffer.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
|
2023-06-05 18:36:17 +00:00
|
|
|
#include <QueryPipeline/QueryPipelineBuilder.h>
|
|
|
|
#include <QueryPipeline/Pipe.h>
|
2023-06-02 14:51:09 +00:00
|
|
|
|
2023-06-06 14:16:49 +00:00
|
|
|
#include <Disks/IO/ReadBufferFromAzureBlobStorage.h>
|
|
|
|
#include <Disks/IO/WriteBufferFromAzureBlobStorage.h>
|
|
|
|
|
2023-09-14 16:12:29 +00:00
|
|
|
#ifdef __clang__
|
|
|
|
# pragma clang diagnostic push
|
|
|
|
# pragma clang diagnostic ignored "-Wzero-as-null-pointer-constant"
|
|
|
|
#endif
|
|
|
|
#include <re2/re2.h>
|
|
|
|
#ifdef __clang__
|
|
|
|
# pragma clang diagnostic pop
|
|
|
|
#endif
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
using namespace Azure::Storage::Blobs;
|
|
|
|
|
2023-06-06 06:06:24 +00:00
|
|
|
namespace CurrentMetrics
|
|
|
|
{
|
|
|
|
extern const Metric ObjectStorageAzureThreads;
|
|
|
|
extern const Metric ObjectStorageAzureThreadsActive;
|
|
|
|
}
|
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
namespace ProfileEvents
|
|
|
|
{
|
|
|
|
extern const Event EngineFileLikeReadFiles;
|
|
|
|
}
|
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
namespace DB
|
|
|
|
{
|
|
|
|
|
|
|
|
namespace ErrorCodes
|
|
|
|
{
|
|
|
|
extern const int NUMBER_OF_ARGUMENTS_DOESNT_MATCH;
|
|
|
|
extern const int BAD_ARGUMENTS;
|
|
|
|
extern const int DATABASE_ACCESS_DENIED;
|
2023-06-05 22:40:05 +00:00
|
|
|
extern const int CANNOT_COMPILE_REGEXP;
|
2023-06-06 14:57:51 +00:00
|
|
|
extern const int CANNOT_EXTRACT_TABLE_STRUCTURE;
|
2023-06-06 19:06:45 +00:00
|
|
|
extern const int LOGICAL_ERROR;
|
|
|
|
extern const int NOT_IMPLEMENTED;
|
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
2023-06-05 12:03:19 +00:00
|
|
|
namespace
|
|
|
|
{
|
|
|
|
|
2023-06-06 16:48:20 +00:00
|
|
|
const std::unordered_set<std::string_view> required_configuration_keys = {
|
2023-06-05 12:03:19 +00:00
|
|
|
"blob_path",
|
|
|
|
"container",
|
|
|
|
};
|
|
|
|
|
2023-06-06 16:48:20 +00:00
|
|
|
const std::unordered_set<std::string_view> optional_configuration_keys = {
|
2023-06-05 12:03:19 +00:00
|
|
|
"format",
|
|
|
|
"compression",
|
2023-06-06 17:31:50 +00:00
|
|
|
"structure",
|
2023-06-05 12:03:19 +00:00
|
|
|
"compression_method",
|
|
|
|
"account_name",
|
|
|
|
"account_key",
|
|
|
|
"connection_string",
|
|
|
|
"storage_account_url",
|
|
|
|
};
|
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
bool isConnectionString(const std::string & candidate)
|
|
|
|
{
|
2023-06-18 17:54:31 +00:00
|
|
|
return !candidate.starts_with("http");
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 16:48:20 +00:00
|
|
|
}
|
2023-06-05 12:03:19 +00:00
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
void StorageAzureBlob::processNamedCollectionResult(StorageAzureBlob::Configuration & configuration, const NamedCollection & collection)
|
2023-06-05 12:03:19 +00:00
|
|
|
{
|
|
|
|
validateNamedCollection(collection, required_configuration_keys, optional_configuration_keys);
|
|
|
|
|
|
|
|
if (collection.has("connection_string"))
|
|
|
|
{
|
|
|
|
configuration.connection_url = collection.get<String>("connection_string");
|
|
|
|
configuration.is_connection_string = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (collection.has("storage_account_url"))
|
|
|
|
{
|
|
|
|
configuration.connection_url = collection.get<String>("storage_account_url");
|
|
|
|
configuration.is_connection_string = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
configuration.container = collection.get<String>("container");
|
|
|
|
configuration.blob_path = collection.get<String>("blob_path");
|
|
|
|
|
|
|
|
if (collection.has("account_name"))
|
|
|
|
configuration.account_name = collection.get<String>("account_name");
|
|
|
|
|
|
|
|
if (collection.has("account_key"))
|
|
|
|
configuration.account_key = collection.get<String>("account_key");
|
|
|
|
|
2023-06-06 16:48:20 +00:00
|
|
|
configuration.structure = collection.getOrDefault<String>("structure", "auto");
|
2023-06-05 12:03:19 +00:00
|
|
|
configuration.format = collection.getOrDefault<String>("format", configuration.format);
|
|
|
|
configuration.compression_method = collection.getOrDefault<String>("compression_method", collection.getOrDefault<String>("compression", "auto"));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-06-08 14:11:27 +00:00
|
|
|
StorageAzureBlob::Configuration StorageAzureBlob::getConfiguration(ASTs & engine_args, ContextPtr local_context)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlob::Configuration configuration;
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
/// Supported signatures:
|
|
|
|
///
|
2023-06-06 19:58:54 +00:00
|
|
|
/// AzureBlobStorage(connection_string|storage_account_url, container_name, blobpath, [account_name, account_key, format, compression])
|
2023-06-05 12:03:19 +00:00
|
|
|
///
|
|
|
|
|
|
|
|
if (auto named_collection = tryGetNamedCollectionWithOverrides(engine_args, local_context))
|
|
|
|
{
|
|
|
|
processNamedCollectionResult(configuration, *named_collection);
|
|
|
|
|
|
|
|
configuration.blobs_paths = {configuration.blob_path};
|
|
|
|
|
2023-06-08 14:11:27 +00:00
|
|
|
if (configuration.format == "auto")
|
2023-06-05 12:03:19 +00:00
|
|
|
configuration.format = FormatFactory::instance().getFormatFromFileName(configuration.blob_path, true);
|
|
|
|
|
|
|
|
return configuration;
|
|
|
|
}
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
if (engine_args.size() < 3 || engine_args.size() > 7)
|
|
|
|
throw Exception(ErrorCodes::NUMBER_OF_ARGUMENTS_DOESNT_MATCH,
|
2023-06-06 19:58:54 +00:00
|
|
|
"Storage AzureBlobStorage requires 3 to 7 arguments: "
|
|
|
|
"AzureBlobStorage(connection_string|storage_account_url, container_name, blobpath, [account_name, account_key, format, compression])");
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
for (auto & engine_arg : engine_args)
|
|
|
|
engine_arg = evaluateConstantExpressionOrIdentifierAsLiteral(engine_arg, local_context);
|
|
|
|
|
|
|
|
std::unordered_map<std::string_view, size_t> engine_args_to_idx;
|
|
|
|
|
|
|
|
configuration.connection_url = checkAndGetLiteralArgument<String>(engine_args[0], "connection_string/storage_account_url");
|
|
|
|
configuration.is_connection_string = isConnectionString(configuration.connection_url);
|
|
|
|
|
|
|
|
configuration.container = checkAndGetLiteralArgument<String>(engine_args[1], "container");
|
|
|
|
configuration.blob_path = checkAndGetLiteralArgument<String>(engine_args[2], "blobpath");
|
|
|
|
|
|
|
|
auto is_format_arg = [] (const std::string & s) -> bool
|
|
|
|
{
|
|
|
|
return s == "auto" || FormatFactory::instance().getAllFormats().contains(s);
|
|
|
|
};
|
|
|
|
|
|
|
|
if (engine_args.size() == 4)
|
|
|
|
{
|
2023-06-05 18:36:17 +00:00
|
|
|
//'c1 UInt64, c2 UInt64
|
2023-06-02 14:51:09 +00:00
|
|
|
auto fourth_arg = checkAndGetLiteralArgument<String>(engine_args[3], "format/account_name");
|
|
|
|
if (is_format_arg(fourth_arg))
|
|
|
|
{
|
|
|
|
configuration.format = fourth_arg;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Unknown format or account name specified without account key");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (engine_args.size() == 5)
|
|
|
|
{
|
|
|
|
auto fourth_arg = checkAndGetLiteralArgument<String>(engine_args[3], "format/account_name");
|
|
|
|
if (is_format_arg(fourth_arg))
|
|
|
|
{
|
|
|
|
configuration.format = fourth_arg;
|
|
|
|
configuration.compression_method = checkAndGetLiteralArgument<String>(engine_args[4], "compression");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
configuration.account_name = fourth_arg;
|
|
|
|
configuration.account_key = checkAndGetLiteralArgument<String>(engine_args[4], "account_key");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (engine_args.size() == 6)
|
|
|
|
{
|
|
|
|
auto fourth_arg = checkAndGetLiteralArgument<String>(engine_args[3], "format/account_name");
|
|
|
|
if (fourth_arg == "auto" || FormatFactory::instance().getAllFormats().contains(fourth_arg))
|
|
|
|
{
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Format and compression must be last arguments");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
configuration.account_name = fourth_arg;
|
2023-06-04 16:59:22 +00:00
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
configuration.account_key = checkAndGetLiteralArgument<String>(engine_args[4], "account_key");
|
|
|
|
auto sixth_arg = checkAndGetLiteralArgument<String>(engine_args[5], "format/account_name");
|
|
|
|
if (!is_format_arg(sixth_arg))
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Unknown format {}", sixth_arg);
|
|
|
|
configuration.format = sixth_arg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (engine_args.size() == 7)
|
|
|
|
{
|
|
|
|
auto fourth_arg = checkAndGetLiteralArgument<String>(engine_args[3], "format/account_name");
|
|
|
|
if (fourth_arg == "auto" || FormatFactory::instance().getAllFormats().contains(fourth_arg))
|
|
|
|
{
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Format and compression must be last arguments");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
configuration.account_name = fourth_arg;
|
|
|
|
configuration.account_key = checkAndGetLiteralArgument<String>(engine_args[4], "account_key");
|
|
|
|
auto sixth_arg = checkAndGetLiteralArgument<String>(engine_args[5], "format/account_name");
|
|
|
|
if (!is_format_arg(sixth_arg))
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Unknown format {}", sixth_arg);
|
|
|
|
configuration.format = sixth_arg;
|
|
|
|
configuration.compression_method = checkAndGetLiteralArgument<String>(engine_args[6], "compression");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
configuration.blobs_paths = {configuration.blob_path};
|
|
|
|
|
2023-06-08 14:11:27 +00:00
|
|
|
if (configuration.format == "auto")
|
2023-06-06 09:47:29 +00:00
|
|
|
configuration.format = FormatFactory::instance().getFormatFromFileName(configuration.blob_path, true);
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
return configuration;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
AzureObjectStorage::SettingsPtr StorageAzureBlob::createSettings(ContextPtr local_context)
|
2023-06-06 16:48:20 +00:00
|
|
|
{
|
|
|
|
const auto & context_settings = local_context->getSettingsRef();
|
|
|
|
auto settings_ptr = std::make_unique<AzureObjectStorageSettings>();
|
|
|
|
settings_ptr->max_single_part_upload_size = context_settings.azure_max_single_part_upload_size;
|
|
|
|
settings_ptr->max_single_read_retries = context_settings.azure_max_single_read_retries;
|
|
|
|
settings_ptr->list_object_keys_size = static_cast<int32_t>(context_settings.azure_list_object_keys_size);
|
|
|
|
|
|
|
|
return settings_ptr;
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
void registerStorageAzureBlob(StorageFactory & factory)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
2023-06-06 17:44:41 +00:00
|
|
|
factory.registerStorage("AzureBlobStorage", [](const StorageFactory::Arguments & args)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
auto & engine_args = args.engine_args;
|
|
|
|
if (engine_args.empty())
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "External data source must have arguments");
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
auto configuration = StorageAzureBlob::getConfiguration(engine_args, args.getLocalContext());
|
2023-07-06 08:56:07 +00:00
|
|
|
auto client = StorageAzureBlob::createClient(configuration, /* is_read_only */ false);
|
2023-06-02 14:51:09 +00:00
|
|
|
// Use format settings from global server context + settings from
|
|
|
|
// the SETTINGS clause of the create query. Settings from current
|
|
|
|
// session and user are ignored.
|
|
|
|
std::optional<FormatSettings> format_settings;
|
|
|
|
if (args.storage_def->settings)
|
|
|
|
{
|
|
|
|
FormatFactorySettings user_format_settings;
|
|
|
|
|
|
|
|
// Apply changed settings from global context, but ignore the
|
|
|
|
// unknown ones, because we only have the format settings here.
|
|
|
|
const auto & changes = args.getContext()->getSettingsRef().changes();
|
|
|
|
for (const auto & change : changes)
|
|
|
|
{
|
|
|
|
if (user_format_settings.has(change.name))
|
|
|
|
user_format_settings.set(change.name, change.value);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Apply changes from SETTINGS clause, with validation.
|
|
|
|
user_format_settings.applyChanges(args.storage_def->settings->changes);
|
|
|
|
format_settings = getFormatSettings(args.getContext(), user_format_settings);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
format_settings = getFormatSettings(args.getContext());
|
|
|
|
}
|
|
|
|
|
|
|
|
ASTPtr partition_by;
|
|
|
|
if (args.storage_def->partition_by)
|
|
|
|
partition_by = args.storage_def->partition_by->clone();
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
auto settings = StorageAzureBlob::createSettings(args.getContext());
|
2023-06-05 12:46:52 +00:00
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
return std::make_shared<StorageAzureBlob>(
|
2023-06-02 14:51:09 +00:00
|
|
|
std::move(configuration),
|
2023-06-06 19:58:54 +00:00
|
|
|
std::make_unique<AzureObjectStorage>("AzureBlobStorage", std::move(client), std::move(settings)),
|
2023-06-02 14:51:09 +00:00
|
|
|
args.getContext(),
|
|
|
|
args.table_id,
|
|
|
|
args.columns,
|
|
|
|
args.constraints,
|
|
|
|
args.comment,
|
|
|
|
format_settings,
|
2023-06-09 13:17:08 +00:00
|
|
|
/* distributed_processing */ false,
|
2023-06-02 14:51:09 +00:00
|
|
|
partition_by);
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.supports_settings = true,
|
|
|
|
.supports_sort_order = true, // for partition by
|
|
|
|
.supports_schema_inference = true,
|
|
|
|
.source_access_type = AccessType::AZURE,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2023-07-06 08:56:07 +00:00
|
|
|
static bool containerExists(std::unique_ptr<BlobServiceClient> &blob_service_client, std::string container_name)
|
|
|
|
{
|
|
|
|
Azure::Storage::Blobs::ListBlobContainersOptions options;
|
|
|
|
options.Prefix = container_name;
|
|
|
|
options.PageSizeHint = 1;
|
|
|
|
|
|
|
|
auto containers_list_response = blob_service_client->ListBlobContainers(options);
|
|
|
|
auto containers_list = containers_list_response.BlobContainers;
|
|
|
|
|
|
|
|
for (const auto & container : containers_list)
|
|
|
|
{
|
|
|
|
if (container_name == container.Name)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
AzureClientPtr StorageAzureBlob::createClient(StorageAzureBlob::Configuration configuration, bool is_read_only)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
AzureClientPtr result;
|
|
|
|
|
|
|
|
if (configuration.is_connection_string)
|
|
|
|
{
|
2023-06-26 14:35:16 +00:00
|
|
|
std::unique_ptr<BlobServiceClient> blob_service_client = std::make_unique<BlobServiceClient>(BlobServiceClient::CreateFromConnectionString(configuration.connection_url));
|
2023-06-02 14:51:09 +00:00
|
|
|
result = std::make_unique<BlobContainerClient>(BlobContainerClient::CreateFromConnectionString(configuration.connection_url, configuration.container));
|
2023-07-06 08:56:07 +00:00
|
|
|
bool container_exists = containerExists(blob_service_client,configuration.container);
|
2023-06-26 14:35:16 +00:00
|
|
|
|
|
|
|
if (!container_exists)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
2023-07-06 08:56:07 +00:00
|
|
|
if (is_read_only)
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::DATABASE_ACCESS_DENIED,
|
|
|
|
"AzureBlobStorage container does not exist '{}'",
|
2023-07-06 09:17:04 +00:00
|
|
|
configuration.container);
|
2023-07-06 08:56:07 +00:00
|
|
|
|
2023-06-04 16:59:22 +00:00
|
|
|
try
|
|
|
|
{
|
2023-07-18 16:20:03 +00:00
|
|
|
result->CreateIfNotExists();
|
|
|
|
} catch (const Azure::Storage::StorageException & e)
|
2023-06-04 16:59:22 +00:00
|
|
|
{
|
2023-07-18 16:20:03 +00:00
|
|
|
if (!(e.StatusCode == Azure::Core::Http::HttpStatusCode::Conflict
|
|
|
|
&& e.ReasonPhrase == "The specified container already exists."))
|
2023-06-04 16:59:22 +00:00
|
|
|
{
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-06-18 17:54:31 +00:00
|
|
|
std::shared_ptr<Azure::Storage::StorageSharedKeyCredential> storage_shared_key_credential;
|
2023-06-02 14:51:09 +00:00
|
|
|
if (configuration.account_name.has_value() && configuration.account_key.has_value())
|
|
|
|
{
|
2023-06-18 17:54:31 +00:00
|
|
|
storage_shared_key_credential
|
|
|
|
= std::make_shared<Azure::Storage::StorageSharedKeyCredential>(*configuration.account_name, *configuration.account_key);
|
2023-06-26 11:30:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<BlobServiceClient> blob_service_client;
|
|
|
|
if (storage_shared_key_credential)
|
|
|
|
{
|
2023-06-18 17:54:31 +00:00
|
|
|
blob_service_client = std::make_unique<BlobServiceClient>(configuration.connection_url, storage_shared_key_credential);
|
2023-06-04 16:59:22 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-06-18 17:54:31 +00:00
|
|
|
blob_service_client = std::make_unique<BlobServiceClient>(configuration.connection_url);
|
|
|
|
}
|
|
|
|
|
2023-07-06 08:56:07 +00:00
|
|
|
bool container_exists = containerExists(blob_service_client,configuration.container);
|
2023-06-26 11:30:22 +00:00
|
|
|
|
2023-07-18 16:20:03 +00:00
|
|
|
std::string final_url;
|
|
|
|
size_t pos = configuration.connection_url.find('?');
|
|
|
|
if (pos != std::string::npos)
|
2023-06-18 17:54:31 +00:00
|
|
|
{
|
2023-07-18 16:20:03 +00:00
|
|
|
auto url_without_sas = configuration.connection_url.substr(0, pos);
|
|
|
|
final_url = url_without_sas + (url_without_sas.back() == '/' ? "" : "/") + configuration.container
|
|
|
|
+ configuration.connection_url.substr(pos);
|
|
|
|
}
|
2023-06-04 16:59:22 +00:00
|
|
|
else
|
2023-07-18 16:20:03 +00:00
|
|
|
final_url
|
|
|
|
= configuration.connection_url + (configuration.connection_url.back() == '/' ? "" : "/") + configuration.container;
|
2023-06-26 11:30:22 +00:00
|
|
|
|
2023-07-18 16:20:03 +00:00
|
|
|
if (container_exists)
|
2023-06-04 16:59:22 +00:00
|
|
|
{
|
2023-06-26 11:30:22 +00:00
|
|
|
if (storage_shared_key_credential)
|
|
|
|
result = std::make_unique<BlobContainerClient>(final_url, storage_shared_key_credential);
|
|
|
|
else
|
|
|
|
result = std::make_unique<BlobContainerClient>(final_url);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-07-06 08:56:07 +00:00
|
|
|
if (is_read_only)
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::DATABASE_ACCESS_DENIED,
|
|
|
|
"AzureBlobStorage container does not exist '{}'",
|
2023-07-06 09:17:04 +00:00
|
|
|
configuration.container);
|
2023-06-04 16:59:22 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
result = std::make_unique<BlobContainerClient>(blob_service_client->CreateBlobContainer(configuration.container).Value);
|
2023-07-18 16:20:03 +00:00
|
|
|
} catch (const Azure::Storage::StorageException & e)
|
2023-06-04 16:59:22 +00:00
|
|
|
{
|
2023-07-18 16:20:03 +00:00
|
|
|
if (e.StatusCode == Azure::Core::Http::HttpStatusCode::Conflict
|
|
|
|
&& e.ReasonPhrase == "The specified container already exists.")
|
2023-06-04 16:59:22 +00:00
|
|
|
{
|
2023-07-18 16:20:03 +00:00
|
|
|
if (storage_shared_key_credential)
|
|
|
|
result = std::make_unique<BlobContainerClient>(final_url, storage_shared_key_credential);
|
|
|
|
else
|
|
|
|
result = std::make_unique<BlobContainerClient>(final_url);
|
2023-06-04 16:59:22 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
Poco::URI StorageAzureBlob::Configuration::getConnectionURL() const
|
2023-06-05 12:03:19 +00:00
|
|
|
{
|
|
|
|
if (!is_connection_string)
|
|
|
|
return Poco::URI(connection_url);
|
|
|
|
|
|
|
|
auto parsed_connection_string = Azure::Storage::_internal::ParseConnectionString(connection_url);
|
|
|
|
return Poco::URI(parsed_connection_string.BlobServiceUrl.GetAbsoluteUrl());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlob::StorageAzureBlob(
|
2023-06-02 14:51:09 +00:00
|
|
|
const Configuration & configuration_,
|
|
|
|
std::unique_ptr<AzureObjectStorage> && object_storage_,
|
2023-06-05 12:03:19 +00:00
|
|
|
ContextPtr context,
|
2023-06-02 14:51:09 +00:00
|
|
|
const StorageID & table_id_,
|
|
|
|
const ColumnsDescription & columns_,
|
|
|
|
const ConstraintsDescription & constraints_,
|
|
|
|
const String & comment,
|
|
|
|
std::optional<FormatSettings> format_settings_,
|
2023-06-09 13:17:08 +00:00
|
|
|
bool distributed_processing_,
|
2023-06-02 14:51:09 +00:00
|
|
|
ASTPtr partition_by_)
|
|
|
|
: IStorage(table_id_)
|
|
|
|
, name("AzureBlobStorage")
|
|
|
|
, configuration(configuration_)
|
|
|
|
, object_storage(std::move(object_storage_))
|
2023-06-09 13:17:08 +00:00
|
|
|
, distributed_processing(distributed_processing_)
|
2023-06-02 14:51:09 +00:00
|
|
|
, format_settings(format_settings_)
|
|
|
|
, partition_by(partition_by_)
|
|
|
|
{
|
|
|
|
FormatFactory::instance().checkFormatName(configuration.format);
|
2023-06-05 12:03:19 +00:00
|
|
|
context->getGlobalContext()->getRemoteHostFilter().checkURL(configuration.getConnectionURL());
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
StorageInMemoryMetadata storage_metadata;
|
|
|
|
if (columns_.empty())
|
|
|
|
{
|
2023-06-09 13:17:08 +00:00
|
|
|
auto columns = getTableStructureFromData(object_storage.get(), configuration, format_settings, context, distributed_processing);
|
2023-06-06 14:57:51 +00:00
|
|
|
storage_metadata.setColumns(columns);
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
else
|
2023-09-19 18:14:42 +00:00
|
|
|
{
|
|
|
|
/// We don't allow special columns in File storage.
|
|
|
|
if (!columns_.hasOnlyOrdinary())
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "Table engine AzureBlobStorage doesn't support special columns like MATERIALIZED, ALIAS or EPHEMERAL");
|
2023-06-02 14:51:09 +00:00
|
|
|
storage_metadata.setColumns(columns_);
|
2023-09-19 18:14:42 +00:00
|
|
|
}
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
storage_metadata.setConstraints(constraints_);
|
|
|
|
storage_metadata.setComment(comment);
|
|
|
|
setInMemoryMetadata(storage_metadata);
|
|
|
|
|
2023-06-05 18:36:17 +00:00
|
|
|
StoredObjects objects;
|
|
|
|
for (const auto & key : configuration.blobs_paths)
|
|
|
|
objects.emplace_back(key);
|
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
virtual_columns = VirtualColumnUtils::getPathAndFileVirtualsForStorage(storage_metadata.getSampleBlock().getNamesAndTypesList());
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
void StorageAzureBlob::truncate(const ASTPtr &, const StorageMetadataPtr &, ContextPtr, TableExclusiveLockHolder &)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
if (configuration.withGlobs())
|
|
|
|
{
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::DATABASE_ACCESS_DENIED,
|
2023-07-06 08:56:07 +00:00
|
|
|
"AzureBlobStorage key '{}' contains globs, so the table is in readonly mode",
|
2023-06-02 14:51:09 +00:00
|
|
|
configuration.blob_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
StoredObjects objects;
|
|
|
|
for (const auto & key : configuration.blobs_paths)
|
|
|
|
objects.emplace_back(key);
|
|
|
|
|
2023-06-06 11:01:21 +00:00
|
|
|
object_storage->removeObjectsIfExist(objects);
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
namespace
|
|
|
|
{
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
class StorageAzureBlobSink : public SinkToStorage
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
public:
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlobSink(
|
2023-06-02 14:51:09 +00:00
|
|
|
const String & format,
|
|
|
|
const Block & sample_block_,
|
|
|
|
ContextPtr context,
|
|
|
|
std::optional<FormatSettings> format_settings_,
|
|
|
|
const CompressionMethod compression_method,
|
|
|
|
AzureObjectStorage * object_storage,
|
|
|
|
const String & blob_path)
|
|
|
|
: SinkToStorage(sample_block_)
|
|
|
|
, sample_block(sample_block_)
|
|
|
|
, format_settings(format_settings_)
|
|
|
|
{
|
|
|
|
StoredObject object(blob_path);
|
|
|
|
write_buf = wrapWriteBufferWithCompressionMethod(object_storage->writeObject(object, WriteMode::Rewrite), compression_method, 3);
|
|
|
|
writer = FormatFactory::instance().getOutputFormatParallelIfPossible(format, *write_buf, sample_block, context, format_settings);
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
String getName() const override { return "StorageAzureBlobSink"; }
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
void consume(Chunk chunk) override
|
|
|
|
{
|
|
|
|
std::lock_guard lock(cancel_mutex);
|
|
|
|
if (cancelled)
|
|
|
|
return;
|
|
|
|
writer->write(getHeader().cloneWithColumns(chunk.detachColumns()));
|
|
|
|
}
|
|
|
|
|
|
|
|
void onCancel() override
|
|
|
|
{
|
|
|
|
std::lock_guard lock(cancel_mutex);
|
|
|
|
finalize();
|
|
|
|
cancelled = true;
|
|
|
|
}
|
|
|
|
|
2023-06-22 12:33:25 +00:00
|
|
|
void onException(std::exception_ptr exception) override
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
std::lock_guard lock(cancel_mutex);
|
2023-06-22 12:33:25 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
std::rethrow_exception(exception);
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
/// An exception context is needed to proper delete write buffers without finalization
|
|
|
|
release();
|
|
|
|
}
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void onFinish() override
|
|
|
|
{
|
|
|
|
std::lock_guard lock(cancel_mutex);
|
|
|
|
finalize();
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void finalize()
|
|
|
|
{
|
|
|
|
if (!writer)
|
|
|
|
return;
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
writer->finalize();
|
|
|
|
writer->flush();
|
|
|
|
write_buf->finalize();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
/// Stop ParallelFormattingOutputFormat correctly.
|
2023-06-22 12:33:25 +00:00
|
|
|
release();
|
2023-06-02 14:51:09 +00:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-22 12:33:25 +00:00
|
|
|
void release()
|
|
|
|
{
|
|
|
|
writer.reset();
|
|
|
|
write_buf->finalize();
|
|
|
|
}
|
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
Block sample_block;
|
|
|
|
std::optional<FormatSettings> format_settings;
|
|
|
|
std::unique_ptr<WriteBuffer> write_buf;
|
|
|
|
OutputFormatPtr writer;
|
|
|
|
bool cancelled = false;
|
|
|
|
std::mutex cancel_mutex;
|
|
|
|
};
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
class PartitionedStorageAzureBlobSink : public PartitionedSink
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
public:
|
2023-06-06 19:58:54 +00:00
|
|
|
PartitionedStorageAzureBlobSink(
|
2023-06-02 14:51:09 +00:00
|
|
|
const ASTPtr & partition_by,
|
|
|
|
const String & format_,
|
|
|
|
const Block & sample_block_,
|
|
|
|
ContextPtr context_,
|
|
|
|
std::optional<FormatSettings> format_settings_,
|
|
|
|
const CompressionMethod compression_method_,
|
|
|
|
AzureObjectStorage * object_storage_,
|
|
|
|
const String & blob_)
|
|
|
|
: PartitionedSink(partition_by, context_, sample_block_)
|
|
|
|
, format(format_)
|
|
|
|
, sample_block(sample_block_)
|
|
|
|
, context(context_)
|
|
|
|
, compression_method(compression_method_)
|
|
|
|
, object_storage(object_storage_)
|
|
|
|
, blob(blob_)
|
|
|
|
, format_settings(format_settings_)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
SinkPtr createSinkForPartition(const String & partition_id) override
|
|
|
|
{
|
|
|
|
auto partition_key = replaceWildcards(blob, partition_id);
|
|
|
|
validateKey(partition_key);
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
return std::make_shared<StorageAzureBlobSink>(
|
2023-06-02 14:51:09 +00:00
|
|
|
format,
|
|
|
|
sample_block,
|
|
|
|
context,
|
|
|
|
format_settings,
|
|
|
|
compression_method,
|
|
|
|
object_storage,
|
|
|
|
partition_key
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
const String format;
|
|
|
|
const Block sample_block;
|
|
|
|
const ContextPtr context;
|
|
|
|
const CompressionMethod compression_method;
|
|
|
|
AzureObjectStorage * object_storage;
|
|
|
|
const String blob;
|
|
|
|
const std::optional<FormatSettings> format_settings;
|
|
|
|
|
|
|
|
ExpressionActionsPtr partition_by_expr;
|
|
|
|
|
|
|
|
static void validateKey(const String & str)
|
|
|
|
{
|
|
|
|
validatePartitionKey(str, true);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
Pipe StorageAzureBlob::read(
|
2023-06-05 23:28:04 +00:00
|
|
|
const Names & column_names,
|
2023-07-04 16:50:31 +00:00
|
|
|
const StorageSnapshotPtr & storage_snapshot,
|
2023-06-05 23:28:04 +00:00
|
|
|
SelectQueryInfo & query_info,
|
|
|
|
ContextPtr local_context,
|
2023-06-05 18:36:17 +00:00
|
|
|
QueryProcessingStage::Enum /*processed_stage*/,
|
|
|
|
size_t max_block_size,
|
2023-06-05 23:28:04 +00:00
|
|
|
size_t num_streams)
|
2023-06-05 18:36:17 +00:00
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
if (partition_by && configuration.withWildcard())
|
2023-06-06 09:47:29 +00:00
|
|
|
throw Exception(ErrorCodes::NOT_IMPLEMENTED, "Reading from a partitioned Azure storage is not implemented yet");
|
2023-06-05 23:28:04 +00:00
|
|
|
|
2023-06-05 18:36:17 +00:00
|
|
|
Pipes pipes;
|
|
|
|
|
2023-06-09 13:17:08 +00:00
|
|
|
std::shared_ptr<StorageAzureBlobSource::IIterator> iterator_wrapper;
|
|
|
|
if (distributed_processing)
|
|
|
|
{
|
|
|
|
iterator_wrapper = std::make_shared<StorageAzureBlobSource::ReadIterator>(local_context,
|
|
|
|
local_context->getReadTaskCallback());
|
|
|
|
}
|
|
|
|
else if (configuration.withGlobs())
|
2023-06-05 23:28:04 +00:00
|
|
|
{
|
|
|
|
/// Iterate through disclosed globs and make a source for each file
|
2023-06-23 10:00:20 +00:00
|
|
|
iterator_wrapper = std::make_shared<StorageAzureBlobSource::GlobIterator>(
|
|
|
|
object_storage.get(), configuration.container, configuration.blob_path,
|
2023-08-17 16:54:43 +00:00
|
|
|
query_info.query, virtual_columns, local_context, nullptr, local_context->getFileProgressCallback());
|
2023-06-05 23:28:04 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
iterator_wrapper = std::make_shared<StorageAzureBlobSource::KeysIterator>(
|
2023-06-05 23:28:04 +00:00
|
|
|
object_storage.get(), configuration.container, configuration.blobs_paths,
|
2023-08-17 16:54:43 +00:00
|
|
|
query_info.query, virtual_columns, local_context, nullptr, local_context->getFileProgressCallback());
|
2023-06-05 23:28:04 +00:00
|
|
|
}
|
2023-06-05 18:36:17 +00:00
|
|
|
|
2023-09-11 14:55:37 +00:00
|
|
|
auto read_from_format_info = prepareReadingFromFormat(column_names, storage_snapshot, supportsSubsetOfColumns(local_context), getVirtuals());
|
2023-08-22 11:59:59 +00:00
|
|
|
bool need_only_count = (query_info.optimize_trivial_count || read_from_format_info.requested_columns.empty())
|
|
|
|
&& local_context->getSettingsRef().optimize_count_from_files;
|
|
|
|
|
2023-06-05 23:28:04 +00:00
|
|
|
for (size_t i = 0; i < num_streams; ++i)
|
|
|
|
{
|
2023-06-06 19:58:54 +00:00
|
|
|
pipes.emplace_back(std::make_shared<StorageAzureBlobSource>(
|
2023-07-04 16:50:31 +00:00
|
|
|
read_from_format_info,
|
2023-06-05 23:28:04 +00:00
|
|
|
configuration.format,
|
|
|
|
getName(),
|
|
|
|
local_context,
|
|
|
|
format_settings,
|
|
|
|
max_block_size,
|
|
|
|
configuration.compression_method,
|
|
|
|
object_storage.get(),
|
|
|
|
configuration.container,
|
2023-08-22 11:59:59 +00:00
|
|
|
configuration.connection_url,
|
|
|
|
iterator_wrapper,
|
2023-08-22 12:42:22 +00:00
|
|
|
need_only_count,
|
2023-08-02 17:47:42 +00:00
|
|
|
query_info));
|
2023-06-05 21:32:26 +00:00
|
|
|
}
|
2023-06-05 18:36:17 +00:00
|
|
|
|
|
|
|
return Pipe::unitePipes(std::move(pipes));
|
|
|
|
}
|
|
|
|
|
2023-06-08 15:06:15 +00:00
|
|
|
SinkToStoragePtr StorageAzureBlob::write(const ASTPtr & query, const StorageMetadataPtr & metadata_snapshot, ContextPtr local_context, bool /*async_insert*/)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
auto sample_block = metadata_snapshot->getSampleBlock();
|
|
|
|
auto chosen_compression_method = chooseCompressionMethod(configuration.blobs_paths.back(), configuration.compression_method);
|
|
|
|
auto insert_query = std::dynamic_pointer_cast<ASTInsertQuery>(query);
|
|
|
|
|
|
|
|
auto partition_by_ast = insert_query ? (insert_query->partition_by ? insert_query->partition_by : partition_by) : nullptr;
|
|
|
|
bool is_partitioned_implementation = partition_by_ast && configuration.withWildcard();
|
|
|
|
|
|
|
|
if (is_partitioned_implementation)
|
|
|
|
{
|
2023-06-06 19:58:54 +00:00
|
|
|
return std::make_shared<PartitionedStorageAzureBlobSink>(
|
2023-06-02 14:51:09 +00:00
|
|
|
partition_by_ast,
|
|
|
|
configuration.format,
|
|
|
|
sample_block,
|
|
|
|
local_context,
|
|
|
|
format_settings,
|
|
|
|
chosen_compression_method,
|
|
|
|
object_storage.get(),
|
|
|
|
configuration.blobs_paths.back());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (configuration.withGlobs())
|
|
|
|
throw Exception(ErrorCodes::DATABASE_ACCESS_DENIED,
|
2023-06-06 19:58:54 +00:00
|
|
|
"AzureBlobStorage key '{}' contains globs, so the table is in readonly mode", configuration.blob_path);
|
2023-06-02 14:51:09 +00:00
|
|
|
|
2023-06-05 12:46:52 +00:00
|
|
|
bool truncate_in_insert = local_context->getSettingsRef().azure_truncate_on_insert;
|
2023-06-02 14:51:09 +00:00
|
|
|
|
|
|
|
if (!truncate_in_insert && object_storage->exists(StoredObject(configuration.blob_path)))
|
|
|
|
{
|
2023-06-04 16:59:22 +00:00
|
|
|
|
2023-06-05 12:46:52 +00:00
|
|
|
if (local_context->getSettingsRef().azure_create_new_file_on_insert)
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
size_t index = configuration.blobs_paths.size();
|
|
|
|
const auto & first_key = configuration.blobs_paths[0];
|
|
|
|
auto pos = first_key.find_first_of('.');
|
|
|
|
String new_key;
|
2023-06-04 16:59:22 +00:00
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
do
|
|
|
|
{
|
|
|
|
new_key = first_key.substr(0, pos) + "." + std::to_string(index) + (pos == std::string::npos ? "" : first_key.substr(pos));
|
|
|
|
++index;
|
|
|
|
}
|
|
|
|
while (object_storage->exists(StoredObject(new_key)));
|
|
|
|
|
|
|
|
configuration.blobs_paths.push_back(new_key);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::BAD_ARGUMENTS,
|
|
|
|
"Object in bucket {} with key {} already exists. "
|
2023-06-05 12:46:52 +00:00
|
|
|
"If you want to overwrite it, enable setting azure_truncate_on_insert, if you "
|
|
|
|
"want to create a new file on each insert, enable setting azure_create_new_file_on_insert",
|
2023-06-02 14:51:09 +00:00
|
|
|
configuration.container, configuration.blobs_paths.back());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
return std::make_shared<StorageAzureBlobSink>(
|
2023-06-02 14:51:09 +00:00
|
|
|
configuration.format,
|
|
|
|
sample_block,
|
|
|
|
local_context,
|
|
|
|
format_settings,
|
|
|
|
chosen_compression_method,
|
|
|
|
object_storage.get(),
|
|
|
|
configuration.blobs_paths.back());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
NamesAndTypesList StorageAzureBlob::getVirtuals() const
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
return virtual_columns;
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
bool StorageAzureBlob::supportsPartitionBy() const
|
2023-06-02 14:51:09 +00:00
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2023-09-11 14:55:37 +00:00
|
|
|
bool StorageAzureBlob::supportsSubsetOfColumns(const ContextPtr & context) const
|
2023-06-05 12:46:52 +00:00
|
|
|
{
|
2023-09-11 14:55:37 +00:00
|
|
|
return FormatFactory::instance().checkIfFormatSupportsSubsetOfColumns(configuration.format, context, format_settings);
|
2023-06-05 12:46:52 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
bool StorageAzureBlob::prefersLargeBlocks() const
|
2023-06-05 12:46:52 +00:00
|
|
|
{
|
|
|
|
return FormatFactory::instance().checkIfOutputFormatPrefersLargeBlocks(configuration.format);
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
bool StorageAzureBlob::parallelizeOutputAfterReading(ContextPtr context) const
|
2023-06-05 12:46:52 +00:00
|
|
|
{
|
|
|
|
return FormatFactory::instance().checkParallelizeOutputAfterReading(configuration.format, context);
|
|
|
|
}
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
StorageAzureBlobSource::GlobIterator::GlobIterator(
|
2023-06-05 22:40:05 +00:00
|
|
|
AzureObjectStorage * object_storage_,
|
|
|
|
const std::string & container_,
|
2023-06-23 10:00:20 +00:00
|
|
|
String blob_path_with_globs_,
|
2023-06-05 22:40:05 +00:00
|
|
|
ASTPtr query_,
|
2023-08-17 16:54:43 +00:00
|
|
|
const NamesAndTypesList & virtual_columns_,
|
2023-06-06 14:57:51 +00:00
|
|
|
ContextPtr context_,
|
2023-06-22 17:24:43 +00:00
|
|
|
RelativePathsWithMetadata * outer_blobs_,
|
|
|
|
std::function<void(FileProgress)> file_progress_callback_)
|
2023-06-09 13:17:08 +00:00
|
|
|
: IIterator(context_)
|
2023-06-05 22:40:05 +00:00
|
|
|
, object_storage(object_storage_)
|
|
|
|
, container(container_)
|
|
|
|
, blob_path_with_globs(blob_path_with_globs_)
|
|
|
|
, query(query_)
|
2023-08-17 16:54:43 +00:00
|
|
|
, virtual_columns(virtual_columns_)
|
2023-06-06 14:57:51 +00:00
|
|
|
, outer_blobs(outer_blobs_)
|
2023-06-22 17:24:43 +00:00
|
|
|
, file_progress_callback(file_progress_callback_)
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
const String key_prefix = blob_path_with_globs.substr(0, blob_path_with_globs.find_first_of("*?{"));
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
/// We don't have to list bucket, because there is no asterisks.
|
|
|
|
if (key_prefix.size() == blob_path_with_globs.size())
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
ObjectMetadata object_metadata = object_storage->getObjectMetadata(blob_path_with_globs);
|
|
|
|
blobs_with_metadata.emplace_back(blob_path_with_globs, object_metadata);
|
|
|
|
if (outer_blobs)
|
|
|
|
outer_blobs->emplace_back(blobs_with_metadata.back());
|
2023-10-16 10:38:55 +00:00
|
|
|
if (file_progress_callback)
|
|
|
|
file_progress_callback(FileProgress(0, object_metadata.size_bytes));
|
2023-06-28 09:09:19 +00:00
|
|
|
is_finished = true;
|
2023-06-23 10:00:20 +00:00
|
|
|
return;
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
object_storage_iterator = object_storage->iterate(key_prefix);
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
matcher = std::make_unique<re2::RE2>(makeRegexpPatternFromGlobs(blob_path_with_globs));
|
2023-06-06 12:55:17 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
if (!matcher->ok())
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::CANNOT_COMPILE_REGEXP, "Cannot compile regex from glob ({}): {}", blob_path_with_globs, matcher->error());
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
recursive = blob_path_with_globs == "/**" ? true : false;
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
RelativePathWithMetadata StorageAzureBlobSource::GlobIterator::next()
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-15 06:41:37 +00:00
|
|
|
std::lock_guard lock(next_mutex);
|
2023-06-23 10:00:20 +00:00
|
|
|
|
2023-06-28 09:09:19 +00:00
|
|
|
if (is_finished && index >= blobs_with_metadata.size())
|
|
|
|
{
|
2023-06-05 22:40:05 +00:00
|
|
|
return {};
|
2023-06-28 09:09:19 +00:00
|
|
|
}
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
bool need_new_batch = blobs_with_metadata.empty() || index >= blobs_with_metadata.size();
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
if (need_new_batch)
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
RelativePathsWithMetadata new_batch;
|
|
|
|
while (new_batch.empty())
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
auto result = object_storage_iterator->getCurrrentBatchAndScheduleNext();
|
|
|
|
if (result.has_value())
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
new_batch = result.value();
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
2023-06-23 10:00:20 +00:00
|
|
|
else
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
is_finished = true;
|
|
|
|
return {};
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
for (auto it = new_batch.begin(); it != new_batch.end();)
|
2023-06-05 22:40:05 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
if (!recursive && !re2::RE2::FullMatch(it->relative_path, *matcher))
|
|
|
|
it = new_batch.erase(it);
|
|
|
|
else
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 12:34:24 +00:00
|
|
|
index = 0;
|
2023-06-23 10:00:20 +00:00
|
|
|
if (!is_initialized)
|
|
|
|
{
|
2023-08-18 17:49:40 +00:00
|
|
|
filter_ast = VirtualColumnUtils::createPathAndFileFilterAst(query, virtual_columns, fs::path(container) / new_batch.front().relative_path, getContext());
|
2023-06-23 10:00:20 +00:00
|
|
|
is_initialized = true;
|
|
|
|
}
|
2023-06-05 22:40:05 +00:00
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
if (filter_ast)
|
|
|
|
{
|
2023-08-17 16:54:43 +00:00
|
|
|
std::vector<String> paths;
|
|
|
|
paths.reserve(new_batch.size());
|
|
|
|
for (auto & path_with_metadata : new_batch)
|
|
|
|
paths.push_back(fs::path(container) / path_with_metadata.relative_path);
|
2023-06-23 10:00:20 +00:00
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
VirtualColumnUtils::filterByPathOrFile(new_batch, paths, query, virtual_columns, getContext(), filter_ast);
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
if (outer_blobs)
|
|
|
|
outer_blobs->insert(outer_blobs->end(), new_batch.begin(), new_batch.end());
|
|
|
|
|
|
|
|
blobs_with_metadata = std::move(new_batch);
|
|
|
|
if (file_progress_callback)
|
|
|
|
{
|
|
|
|
for (const auto & [_, info] : blobs_with_metadata)
|
|
|
|
file_progress_callback(FileProgress(0, info.size_bytes));
|
2023-06-23 10:00:20 +00:00
|
|
|
}
|
2023-06-05 23:28:04 +00:00
|
|
|
}
|
2023-06-23 10:00:20 +00:00
|
|
|
|
2023-06-23 12:34:24 +00:00
|
|
|
size_t current_index = index++;
|
2023-06-23 10:00:20 +00:00
|
|
|
if (current_index >= blobs_with_metadata.size())
|
|
|
|
throw Exception(ErrorCodes::LOGICAL_ERROR, "Index out of bound for blob metadata");
|
|
|
|
return blobs_with_metadata[current_index];
|
2023-06-05 22:40:05 +00:00
|
|
|
}
|
|
|
|
|
2023-06-23 10:00:20 +00:00
|
|
|
StorageAzureBlobSource::KeysIterator::KeysIterator(
|
|
|
|
AzureObjectStorage * object_storage_,
|
|
|
|
const std::string & container_,
|
2023-06-29 11:59:09 +00:00
|
|
|
const Strings & keys_,
|
2023-06-23 10:00:20 +00:00
|
|
|
ASTPtr query_,
|
2023-08-17 16:54:43 +00:00
|
|
|
const NamesAndTypesList & virtual_columns_,
|
2023-06-23 10:00:20 +00:00
|
|
|
ContextPtr context_,
|
2023-06-28 18:53:08 +00:00
|
|
|
RelativePathsWithMetadata * outer_blobs,
|
|
|
|
std::function<void(FileProgress)> file_progress_callback)
|
2023-06-23 10:00:20 +00:00
|
|
|
: IIterator(context_)
|
|
|
|
, object_storage(object_storage_)
|
|
|
|
, container(container_)
|
|
|
|
, query(query_)
|
2023-08-17 16:54:43 +00:00
|
|
|
, virtual_columns(virtual_columns_)
|
2023-06-23 10:00:20 +00:00
|
|
|
{
|
|
|
|
Strings all_keys = keys_;
|
|
|
|
|
2023-08-18 17:49:40 +00:00
|
|
|
ASTPtr filter_ast;
|
|
|
|
if (!all_keys.empty())
|
|
|
|
filter_ast = VirtualColumnUtils::createPathAndFileFilterAst(query, virtual_columns, fs::path(container) / all_keys[0], getContext());
|
2023-06-23 10:00:20 +00:00
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
if (filter_ast)
|
|
|
|
{
|
|
|
|
Strings paths;
|
|
|
|
paths.reserve(all_keys.size());
|
|
|
|
for (const auto & key : all_keys)
|
|
|
|
paths.push_back(fs::path(container) / key);
|
2023-06-23 10:00:20 +00:00
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
VirtualColumnUtils::filterByPathOrFile(all_keys, paths, query, virtual_columns, getContext(), filter_ast);
|
2023-06-23 10:00:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for (auto && key : all_keys)
|
|
|
|
{
|
|
|
|
ObjectMetadata object_metadata = object_storage->getObjectMetadata(key);
|
2023-06-28 18:53:08 +00:00
|
|
|
if (file_progress_callback)
|
|
|
|
file_progress_callback(FileProgress(0, object_metadata.size_bytes));
|
2023-06-23 10:00:20 +00:00
|
|
|
keys.emplace_back(RelativePathWithMetadata{key, object_metadata});
|
|
|
|
}
|
|
|
|
|
|
|
|
if (outer_blobs)
|
|
|
|
*outer_blobs = keys;
|
|
|
|
}
|
|
|
|
|
|
|
|
RelativePathWithMetadata StorageAzureBlobSource::KeysIterator::next()
|
|
|
|
{
|
|
|
|
size_t current_index = index.fetch_add(1, std::memory_order_relaxed);
|
|
|
|
if (current_index >= keys.size())
|
|
|
|
return {};
|
|
|
|
|
|
|
|
return keys[current_index];
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
Chunk StorageAzureBlobSource::generate()
|
2023-06-05 18:36:17 +00:00
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
while (true)
|
2023-06-05 18:36:17 +00:00
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
if (isCancelled() || !reader)
|
|
|
|
{
|
|
|
|
if (reader)
|
|
|
|
reader->cancel();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-06-05 21:15:13 +00:00
|
|
|
Chunk chunk;
|
|
|
|
if (reader->pull(chunk))
|
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
UInt64 num_rows = chunk.getNumRows();
|
2023-08-22 11:59:59 +00:00
|
|
|
total_rows_in_file += num_rows;
|
|
|
|
size_t chunk_size = 0;
|
|
|
|
if (const auto * input_format = reader.getInputFormat())
|
|
|
|
chunk_size = input_format->getApproxBytesReadForChunk();
|
2023-06-23 13:43:40 +00:00
|
|
|
progress(num_rows, chunk_size ? chunk_size : chunk.bytes());
|
2023-08-24 15:05:45 +00:00
|
|
|
VirtualColumnUtils::addRequestedPathAndFileVirtualsToChunk(chunk, requested_virtual_columns, fs::path(container) / reader.getRelativePath());
|
2023-06-05 23:28:04 +00:00
|
|
|
return chunk;
|
2023-06-05 21:15:13 +00:00
|
|
|
}
|
2023-06-05 23:28:04 +00:00
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
if (reader.getInputFormat() && getContext()->getSettingsRef().use_cache_for_count_from_files)
|
|
|
|
addNumRowsToCache(reader.getRelativePath(), total_rows_in_file);
|
|
|
|
|
|
|
|
total_rows_in_file = 0;
|
2023-06-05 23:28:04 +00:00
|
|
|
|
|
|
|
assert(reader_future.valid());
|
|
|
|
reader = reader_future.get();
|
|
|
|
|
|
|
|
if (!reader)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/// Even if task is finished the thread may be not freed in pool.
|
|
|
|
/// So wait until it will be freed before scheduling a new task.
|
|
|
|
create_reader_pool.wait();
|
|
|
|
reader_future = createReaderAsync();
|
2023-06-05 18:36:17 +00:00
|
|
|
}
|
2023-06-05 23:28:04 +00:00
|
|
|
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
void StorageAzureBlobSource::addNumRowsToCache(const DB::String & path, size_t num_rows)
|
|
|
|
{
|
|
|
|
String source = fs::path(connection_url) / container / path;
|
|
|
|
auto cache_key = getKeyForSchemaCache(source, format, format_settings, getContext());
|
|
|
|
StorageAzureBlob::getSchemaCache(getContext()).addNumRows(cache_key, num_rows);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::optional<size_t> StorageAzureBlobSource::tryGetNumRowsFromCache(const DB::RelativePathWithMetadata & path_with_metadata)
|
|
|
|
{
|
|
|
|
String source = fs::path(connection_url) / container / path_with_metadata.relative_path;
|
|
|
|
auto cache_key = getKeyForSchemaCache(source, format, format_settings, getContext());
|
|
|
|
auto get_last_mod_time = [&]() -> std::optional<time_t>
|
|
|
|
{
|
|
|
|
auto last_mod = path_with_metadata.metadata.last_modified;
|
|
|
|
if (last_mod)
|
|
|
|
return last_mod->epochTime();
|
|
|
|
return std::nullopt;
|
|
|
|
};
|
|
|
|
|
|
|
|
return StorageAzureBlob::getSchemaCache(getContext()).tryGetNumRows(cache_key, get_last_mod_time);
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlobSource::StorageAzureBlobSource(
|
2023-07-04 16:50:31 +00:00
|
|
|
const ReadFromFormatInfo & info,
|
2023-06-06 06:06:24 +00:00
|
|
|
const String & format_,
|
|
|
|
String name_,
|
|
|
|
ContextPtr context_,
|
|
|
|
std::optional<FormatSettings> format_settings_,
|
|
|
|
UInt64 max_block_size_,
|
|
|
|
String compression_hint_,
|
|
|
|
AzureObjectStorage * object_storage_,
|
|
|
|
const String & container_,
|
2023-08-22 11:59:59 +00:00
|
|
|
const String & connection_url_,
|
|
|
|
std::shared_ptr<IIterator> file_iterator_,
|
2023-08-22 12:42:22 +00:00
|
|
|
bool need_only_count_,
|
2023-08-02 17:47:42 +00:00
|
|
|
const SelectQueryInfo & query_info_)
|
2023-07-26 11:30:35 +00:00
|
|
|
:ISource(info.source_header, false)
|
2023-06-06 06:06:24 +00:00
|
|
|
, WithContext(context_)
|
2023-07-04 16:50:31 +00:00
|
|
|
, requested_columns(info.requested_columns)
|
|
|
|
, requested_virtual_columns(info.requested_virtual_columns)
|
2023-06-06 06:06:24 +00:00
|
|
|
, format(format_)
|
|
|
|
, name(std::move(name_))
|
2023-07-04 16:50:31 +00:00
|
|
|
, sample_block(info.format_header)
|
2023-06-06 06:06:24 +00:00
|
|
|
, format_settings(format_settings_)
|
2023-07-04 16:50:31 +00:00
|
|
|
, columns_desc(info.columns_description)
|
2023-06-06 06:06:24 +00:00
|
|
|
, max_block_size(max_block_size_)
|
|
|
|
, compression_hint(compression_hint_)
|
|
|
|
, object_storage(std::move(object_storage_))
|
|
|
|
, container(container_)
|
2023-08-22 11:59:59 +00:00
|
|
|
, connection_url(connection_url_)
|
2023-06-06 06:06:24 +00:00
|
|
|
, file_iterator(file_iterator_)
|
2023-08-22 11:59:59 +00:00
|
|
|
, need_only_count(need_only_count_)
|
2023-08-02 17:47:42 +00:00
|
|
|
, query_info(query_info_)
|
2023-06-06 06:06:24 +00:00
|
|
|
, create_reader_pool(CurrentMetrics::ObjectStorageAzureThreads, CurrentMetrics::ObjectStorageAzureThreadsActive, 1)
|
2023-06-06 09:47:29 +00:00
|
|
|
, create_reader_scheduler(threadPoolCallbackRunner<ReaderHolder>(create_reader_pool, "AzureReader"))
|
2023-06-06 06:06:24 +00:00
|
|
|
{
|
|
|
|
reader = createReader();
|
|
|
|
if (reader)
|
|
|
|
reader_future = createReaderAsync();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlobSource::~StorageAzureBlobSource()
|
2023-06-05 23:28:04 +00:00
|
|
|
{
|
|
|
|
create_reader_pool.wait();
|
2023-06-05 18:36:17 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
String StorageAzureBlobSource::getName() const
|
2023-06-05 18:36:17 +00:00
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
return name;
|
2023-06-05 18:36:17 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
StorageAzureBlobSource::ReaderHolder StorageAzureBlobSource::createReader()
|
2023-06-05 23:28:04 +00:00
|
|
|
{
|
2023-08-22 11:59:59 +00:00
|
|
|
auto path_with_metadata = file_iterator->next();
|
|
|
|
if (path_with_metadata.relative_path.empty())
|
2023-06-05 23:28:04 +00:00
|
|
|
return {};
|
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
if (path_with_metadata.metadata.size_bytes == 0)
|
|
|
|
path_with_metadata.metadata = object_storage->getObjectMetadata(path_with_metadata.relative_path);
|
2023-06-05 18:36:17 +00:00
|
|
|
|
|
|
|
QueryPipelineBuilder builder;
|
2023-08-22 11:59:59 +00:00
|
|
|
std::shared_ptr<ISource> source;
|
|
|
|
std::unique_ptr<ReadBuffer> read_buf;
|
|
|
|
std::optional<size_t> num_rows_from_cache = need_only_count && getContext()->getSettingsRef().use_cache_for_count_from_files ? tryGetNumRowsFromCache(path_with_metadata) : std::nullopt;
|
|
|
|
if (num_rows_from_cache)
|
2023-06-05 21:15:13 +00:00
|
|
|
{
|
2023-08-22 12:55:00 +00:00
|
|
|
/// We should not return single chunk with all number of rows,
|
|
|
|
/// because there is a chance that this chunk will be materialized later
|
|
|
|
/// (it can cause memory problems even with default values in columns or when virtual columns are requested).
|
|
|
|
/// Instead, we use special ConstChunkGenerator that will generate chunks
|
|
|
|
/// with max_block_size rows until total number of rows is reached.
|
2023-08-22 11:59:59 +00:00
|
|
|
source = std::make_shared<ConstChunkGenerator>(sample_block, *num_rows_from_cache, max_block_size);
|
|
|
|
builder.init(Pipe(source));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-08-23 20:31:49 +00:00
|
|
|
std::optional<size_t> max_parsing_threads;
|
|
|
|
if (need_only_count)
|
|
|
|
max_parsing_threads = 1;
|
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
auto compression_method = chooseCompressionMethod(path_with_metadata.relative_path, compression_hint);
|
2023-08-23 20:31:49 +00:00
|
|
|
read_buf = createAzureReadBuffer(path_with_metadata.relative_path, path_with_metadata.metadata.size_bytes);
|
2023-08-22 11:59:59 +00:00
|
|
|
auto input_format = FormatFactory::instance().getInput(
|
|
|
|
format, *read_buf, sample_block, getContext(), max_block_size,
|
2023-08-23 20:31:49 +00:00
|
|
|
format_settings, max_parsing_threads, std::nullopt,
|
2023-08-22 11:59:59 +00:00
|
|
|
/* is_remote_fs */ true, compression_method);
|
2023-08-22 12:42:22 +00:00
|
|
|
input_format->setQueryInfo(query_info, getContext());
|
2023-08-23 20:51:14 +00:00
|
|
|
|
2023-08-23 20:31:49 +00:00
|
|
|
if (need_only_count)
|
|
|
|
input_format->needOnlyCount();
|
2023-08-22 11:59:59 +00:00
|
|
|
|
|
|
|
builder.init(Pipe(input_format));
|
|
|
|
|
|
|
|
if (columns_desc.hasDefaults())
|
|
|
|
{
|
|
|
|
builder.addSimpleTransform(
|
|
|
|
[&](const Block & header)
|
|
|
|
{ return std::make_shared<AddingDefaultsTransform>(header, columns_desc, *input_format, getContext()); });
|
|
|
|
}
|
|
|
|
|
|
|
|
source = input_format;
|
2023-06-05 21:15:13 +00:00
|
|
|
}
|
|
|
|
|
2023-07-04 16:50:31 +00:00
|
|
|
/// Add ExtractColumnsTransform to extract requested columns/subcolumns
|
|
|
|
/// from chunk read by IInputFormat.
|
|
|
|
builder.addSimpleTransform([&](const Block & header)
|
|
|
|
{
|
|
|
|
return std::make_shared<ExtractColumnsTransform>(header, requested_columns);
|
|
|
|
});
|
|
|
|
|
2023-06-05 23:28:04 +00:00
|
|
|
auto pipeline = std::make_unique<QueryPipeline>(QueryPipelineBuilder::getPipeline(std::move(builder)));
|
|
|
|
auto current_reader = std::make_unique<PullingPipelineExecutor>(*pipeline);
|
|
|
|
|
2023-08-17 16:54:43 +00:00
|
|
|
ProfileEvents::increment(ProfileEvents::EngineFileLikeReadFiles);
|
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
return ReaderHolder{path_with_metadata, std::move(read_buf), std::move(source), std::move(pipeline), std::move(current_reader)};
|
2023-06-05 18:36:17 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
std::future<StorageAzureBlobSource::ReaderHolder> StorageAzureBlobSource::createReaderAsync()
|
2023-06-05 23:28:04 +00:00
|
|
|
{
|
|
|
|
return create_reader_scheduler([this] { return createReader(); }, Priority{});
|
|
|
|
}
|
2023-06-05 18:36:17 +00:00
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
std::unique_ptr<ReadBuffer> StorageAzureBlobSource::createAzureReadBuffer(const String & key, size_t object_size)
|
2023-06-05 18:36:17 +00:00
|
|
|
{
|
2023-06-05 23:28:04 +00:00
|
|
|
auto read_settings = getContext()->getReadSettings().adjustBufferSize(object_size);
|
|
|
|
read_settings.enable_filesystem_cache = false;
|
2023-06-06 14:16:49 +00:00
|
|
|
auto download_buffer_size = getContext()->getSettings().max_download_buffer_size;
|
|
|
|
const bool object_too_small = object_size <= 2 * download_buffer_size;
|
|
|
|
|
|
|
|
// Create a read buffer that will prefetch the first ~1 MB of the file.
|
|
|
|
// When reading lots of tiny files, this prefetching almost doubles the throughput.
|
|
|
|
// For bigger files, parallel reading is more useful.
|
|
|
|
if (object_too_small && read_settings.remote_fs_method == RemoteFSReadMethod::threadpool)
|
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Downloading object of size {} from Azure with initial prefetch", object_size);
|
|
|
|
return createAsyncAzureReadBuffer(key, read_settings, object_size);
|
|
|
|
}
|
2023-06-05 23:28:04 +00:00
|
|
|
|
|
|
|
return object_storage->readObject(StoredObject(key), read_settings, {}, object_size);
|
2023-06-05 18:36:17 +00:00
|
|
|
}
|
|
|
|
|
2023-08-22 11:59:59 +00:00
|
|
|
namespace
|
|
|
|
{
|
|
|
|
class ReadBufferIterator : public IReadBufferIterator, WithContext
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
ReadBufferIterator(
|
|
|
|
const std::shared_ptr<StorageAzureBlobSource::IIterator> & file_iterator_,
|
|
|
|
AzureObjectStorage * object_storage_,
|
|
|
|
const StorageAzureBlob::Configuration & configuration_,
|
|
|
|
const std::optional<FormatSettings> & format_settings_,
|
|
|
|
const RelativePathsWithMetadata & read_keys_,
|
|
|
|
const ContextPtr & context_)
|
|
|
|
: WithContext(context_)
|
|
|
|
, file_iterator(file_iterator_)
|
|
|
|
, object_storage(object_storage_)
|
|
|
|
, configuration(configuration_)
|
|
|
|
, format_settings(format_settings_)
|
|
|
|
, read_keys(read_keys_)
|
|
|
|
, prev_read_keys_size(read_keys_.size())
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<ReadBuffer> next() override
|
|
|
|
{
|
|
|
|
auto [key, metadata] = file_iterator->next();
|
|
|
|
|
|
|
|
if (key.empty())
|
|
|
|
{
|
|
|
|
if (first)
|
|
|
|
throw Exception(
|
|
|
|
ErrorCodes::CANNOT_EXTRACT_TABLE_STRUCTURE,
|
|
|
|
"Cannot extract table structure from {} format file, because there are no files with provided path "
|
|
|
|
"in AzureBlobStorage. You must specify table structure manually", configuration.format);
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
current_path = key;
|
|
|
|
|
|
|
|
///AzureBlobStorage file iterator could get new keys after new iteration, check them in schema cache.
|
|
|
|
if (getContext()->getSettingsRef().schema_inference_use_cache_for_azure && read_keys.size() > prev_read_keys_size)
|
|
|
|
{
|
|
|
|
columns_from_cache = StorageAzureBlob::tryGetColumnsFromCache(read_keys.begin() + prev_read_keys_size, read_keys.end(), configuration, format_settings, getContext());
|
|
|
|
prev_read_keys_size = read_keys.size();
|
|
|
|
if (columns_from_cache)
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
first = false;
|
|
|
|
int zstd_window_log_max = static_cast<int>(getContext()->getSettingsRef().zstd_window_log_max);
|
|
|
|
return wrapReadBufferWithCompressionMethod(
|
|
|
|
object_storage->readObject(StoredObject(key), getContext()->getReadSettings(), {}, metadata.size_bytes),
|
|
|
|
chooseCompressionMethod(key, configuration.compression_method),
|
|
|
|
zstd_window_log_max);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::optional<ColumnsDescription> getCachedColumns() override { return columns_from_cache; }
|
|
|
|
|
|
|
|
void setNumRowsToLastFile(size_t num_rows) override
|
|
|
|
{
|
|
|
|
if (!getContext()->getSettingsRef().schema_inference_use_cache_for_s3)
|
|
|
|
return;
|
|
|
|
|
|
|
|
String source = fs::path(configuration.connection_url) / configuration.container / current_path;
|
|
|
|
auto key = getKeyForSchemaCache(source, configuration.format, format_settings, getContext());
|
|
|
|
StorageAzureBlob::getSchemaCache(getContext()).addNumRows(key, num_rows);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
std::shared_ptr<StorageAzureBlobSource::IIterator> file_iterator;
|
|
|
|
AzureObjectStorage * object_storage;
|
|
|
|
const StorageAzureBlob::Configuration & configuration;
|
|
|
|
const std::optional<FormatSettings> & format_settings;
|
|
|
|
const RelativePathsWithMetadata & read_keys;
|
|
|
|
std::optional<ColumnsDescription> columns_from_cache;
|
|
|
|
size_t prev_read_keys_size;
|
|
|
|
String current_path;
|
|
|
|
bool first = true;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
ColumnsDescription StorageAzureBlob::getTableStructureFromData(
|
2023-06-06 16:48:20 +00:00
|
|
|
AzureObjectStorage * object_storage,
|
|
|
|
const Configuration & configuration,
|
|
|
|
const std::optional<FormatSettings> & format_settings,
|
2023-06-09 13:17:08 +00:00
|
|
|
ContextPtr ctx,
|
|
|
|
bool distributed_processing)
|
2023-06-06 14:57:51 +00:00
|
|
|
{
|
|
|
|
RelativePathsWithMetadata read_keys;
|
2023-06-09 13:17:08 +00:00
|
|
|
std::shared_ptr<StorageAzureBlobSource::IIterator> file_iterator;
|
|
|
|
if (distributed_processing)
|
|
|
|
{
|
2023-08-03 09:31:15 +00:00
|
|
|
file_iterator = std::make_shared<StorageAzureBlobSource::ReadIterator>(ctx,
|
2023-06-09 13:17:08 +00:00
|
|
|
ctx->getReadTaskCallback());
|
|
|
|
}
|
2023-06-27 14:51:17 +00:00
|
|
|
else if (configuration.withGlobs())
|
2023-06-06 14:57:51 +00:00
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
file_iterator = std::make_shared<StorageAzureBlobSource::GlobIterator>(
|
2023-08-17 16:54:43 +00:00
|
|
|
object_storage, configuration.container, configuration.blob_path, nullptr, NamesAndTypesList{}, ctx, &read_keys);
|
2023-06-06 14:57:51 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-06-23 10:00:20 +00:00
|
|
|
file_iterator = std::make_shared<StorageAzureBlobSource::KeysIterator>(
|
2023-08-17 16:54:43 +00:00
|
|
|
object_storage, configuration.container, configuration.blobs_paths, nullptr, NamesAndTypesList{}, ctx, &read_keys);
|
2023-06-06 14:57:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::optional<ColumnsDescription> columns_from_cache;
|
|
|
|
if (ctx->getSettingsRef().schema_inference_use_cache_for_azure)
|
2023-06-06 16:48:20 +00:00
|
|
|
columns_from_cache = tryGetColumnsFromCache(read_keys.begin(), read_keys.end(), configuration, format_settings, ctx);
|
2023-06-06 14:57:51 +00:00
|
|
|
|
|
|
|
ColumnsDescription columns;
|
|
|
|
if (columns_from_cache)
|
2023-08-22 11:59:59 +00:00
|
|
|
{
|
2023-06-06 14:57:51 +00:00
|
|
|
columns = *columns_from_cache;
|
2023-08-22 11:59:59 +00:00
|
|
|
}
|
2023-06-06 14:57:51 +00:00
|
|
|
else
|
2023-08-22 11:59:59 +00:00
|
|
|
{
|
|
|
|
ReadBufferIterator read_buffer_iterator(file_iterator, object_storage, configuration, format_settings, read_keys, ctx);
|
2023-06-06 14:57:51 +00:00
|
|
|
columns = readSchemaFromFormat(configuration.format, format_settings, read_buffer_iterator, configuration.withGlobs(), ctx);
|
2023-08-22 11:59:59 +00:00
|
|
|
}
|
2023-06-06 14:57:51 +00:00
|
|
|
|
|
|
|
if (ctx->getSettingsRef().schema_inference_use_cache_for_azure)
|
2023-06-06 16:48:20 +00:00
|
|
|
addColumnsToCache(read_keys, columns, configuration, format_settings, configuration.format, ctx);
|
2023-06-06 14:57:51 +00:00
|
|
|
|
|
|
|
return columns;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
std::optional<ColumnsDescription> StorageAzureBlob::tryGetColumnsFromCache(
|
2023-06-06 14:57:51 +00:00
|
|
|
const RelativePathsWithMetadata::const_iterator & begin,
|
|
|
|
const RelativePathsWithMetadata::const_iterator & end,
|
2023-06-06 19:58:54 +00:00
|
|
|
const StorageAzureBlob::Configuration & configuration,
|
2023-06-06 16:48:20 +00:00
|
|
|
const std::optional<FormatSettings> & format_settings,
|
2023-06-06 14:57:51 +00:00
|
|
|
const ContextPtr & ctx)
|
|
|
|
{
|
|
|
|
auto & schema_cache = getSchemaCache(ctx);
|
|
|
|
for (auto it = begin; it < end; ++it)
|
|
|
|
{
|
2023-08-22 12:55:00 +00:00
|
|
|
auto get_last_mod_time = [&] -> std::optional<time_t>
|
2023-06-06 14:57:51 +00:00
|
|
|
{
|
2023-08-22 12:55:00 +00:00
|
|
|
if (it->metadata.last_modified)
|
|
|
|
return it->metadata.last_modified->epochTime();
|
|
|
|
return std::nullopt;
|
2023-06-06 14:57:51 +00:00
|
|
|
};
|
|
|
|
|
2023-08-22 12:55:00 +00:00
|
|
|
auto host_and_bucket = configuration.connection_url + '/' + configuration.container;
|
|
|
|
String source = host_and_bucket + '/' + it->relative_path;
|
2023-06-06 14:57:51 +00:00
|
|
|
auto cache_key = getKeyForSchemaCache(source, configuration.format, format_settings, ctx);
|
2023-08-22 11:59:59 +00:00
|
|
|
auto columns = schema_cache.tryGetColumns(cache_key, get_last_mod_time);
|
2023-06-06 14:57:51 +00:00
|
|
|
if (columns)
|
|
|
|
return columns;
|
|
|
|
}
|
|
|
|
|
|
|
|
return std::nullopt;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
void StorageAzureBlob::addColumnsToCache(
|
2023-06-06 14:57:51 +00:00
|
|
|
const RelativePathsWithMetadata & keys,
|
|
|
|
const ColumnsDescription & columns,
|
2023-06-06 19:58:54 +00:00
|
|
|
const StorageAzureBlob::Configuration & configuration,
|
2023-06-06 16:48:20 +00:00
|
|
|
const std::optional<FormatSettings> & format_settings,
|
2023-06-06 14:57:51 +00:00
|
|
|
const String & format_name,
|
|
|
|
const ContextPtr & ctx)
|
|
|
|
{
|
2023-08-22 12:55:00 +00:00
|
|
|
auto host_and_bucket = configuration.connection_url + '/' + configuration.container;
|
2023-06-06 14:57:51 +00:00
|
|
|
Strings sources;
|
|
|
|
sources.reserve(keys.size());
|
2023-08-22 12:55:00 +00:00
|
|
|
std::transform(keys.begin(), keys.end(), std::back_inserter(sources), [&](const auto & elem){ return host_and_bucket + '/' + elem.relative_path; });
|
2023-06-06 14:57:51 +00:00
|
|
|
auto cache_keys = getKeysForSchemaCache(sources, format_name, format_settings, ctx);
|
|
|
|
auto & schema_cache = getSchemaCache(ctx);
|
2023-08-22 11:59:59 +00:00
|
|
|
schema_cache.addManyColumns(cache_keys, columns);
|
2023-06-06 14:57:51 +00:00
|
|
|
}
|
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
SchemaCache & StorageAzureBlob::getSchemaCache(const ContextPtr & ctx)
|
2023-06-06 14:57:51 +00:00
|
|
|
{
|
|
|
|
static SchemaCache schema_cache(ctx->getConfigRef().getUInt("schema_inference_cache_max_elements_for_azure", DEFAULT_SCHEMA_CACHE_ELEMENTS));
|
|
|
|
return schema_cache;
|
|
|
|
}
|
|
|
|
|
2023-06-05 23:28:04 +00:00
|
|
|
|
2023-06-06 19:58:54 +00:00
|
|
|
std::unique_ptr<ReadBuffer> StorageAzureBlobSource::createAsyncAzureReadBuffer(
|
2023-06-06 14:16:49 +00:00
|
|
|
const String & key, const ReadSettings & read_settings, size_t object_size)
|
|
|
|
{
|
|
|
|
auto modified_settings{read_settings};
|
|
|
|
modified_settings.remote_read_min_bytes_for_seek = modified_settings.remote_fs_buffer_size;
|
2023-06-06 14:32:05 +00:00
|
|
|
auto async_reader = object_storage->readObjects(StoredObjects{StoredObject{key, object_size}}, modified_settings);
|
2023-06-06 14:16:49 +00:00
|
|
|
|
|
|
|
async_reader->setReadUntilEnd();
|
|
|
|
if (read_settings.remote_fs_prefetch)
|
|
|
|
async_reader->prefetch(DEFAULT_PREFETCH_PRIORITY);
|
|
|
|
|
|
|
|
return async_reader;
|
|
|
|
}
|
|
|
|
|
2023-06-02 14:51:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|