2017-08-06 20:26:23 +00:00
|
|
|
#include <Interpreters/InterpreterSystemQuery.h>
|
2018-04-19 13:56:14 +00:00
|
|
|
#include <Common/DNSResolver.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Common/ActionLock.h>
|
|
|
|
#include <Common/typeid_cast.h>
|
2018-06-05 19:46:49 +00:00
|
|
|
#include <Common/getNumberOfPhysicalCPUCores.h>
|
2020-11-30 14:30:55 +00:00
|
|
|
#include <Common/SymbolIndex.h>
|
2019-01-11 19:12:36 +00:00
|
|
|
#include <Common/ThreadPool.h>
|
2019-10-25 19:07:47 +00:00
|
|
|
#include <Common/escapeForFileName.h>
|
2021-01-07 19:19:33 +00:00
|
|
|
#include <Common/ShellCommand.h>
|
2022-08-26 17:23:46 +00:00
|
|
|
#include <Interpreters/Cache/FileCacheFactory.h>
|
|
|
|
#include <Interpreters/Cache/FileCache.h>
|
2017-08-07 17:01:04 +00:00
|
|
|
#include <Interpreters/Context.h>
|
2020-02-10 13:10:17 +00:00
|
|
|
#include <Interpreters/DatabaseCatalog.h>
|
2019-09-26 10:41:33 +00:00
|
|
|
#include <Interpreters/ExternalDictionariesLoader.h>
|
2022-09-24 21:24:39 +00:00
|
|
|
#include <Functions/UserDefined/ExternalUserDefinedExecutableFunctionsLoader.h>
|
2017-08-24 18:19:06 +00:00
|
|
|
#include <Interpreters/EmbeddedDictionaries.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Interpreters/ActionLocksManager.h>
|
|
|
|
#include <Interpreters/InterpreterDropQuery.h>
|
|
|
|
#include <Interpreters/InterpreterCreateQuery.h>
|
2020-03-30 23:36:23 +00:00
|
|
|
#include <Interpreters/InterpreterRenameQuery.h>
|
2018-06-13 19:01:07 +00:00
|
|
|
#include <Interpreters/QueryLog.h>
|
2020-11-03 13:47:26 +00:00
|
|
|
#include <Interpreters/executeDDLQueryOnCluster.h>
|
2018-06-13 19:01:07 +00:00
|
|
|
#include <Interpreters/PartLog.h>
|
|
|
|
#include <Interpreters/QueryThreadLog.h>
|
2021-06-18 13:44:08 +00:00
|
|
|
#include <Interpreters/QueryViewsLog.h>
|
2021-03-05 14:57:16 +00:00
|
|
|
#include <Interpreters/SessionLog.h>
|
2019-02-03 21:30:45 +00:00
|
|
|
#include <Interpreters/TraceLog.h>
|
2019-07-31 14:03:23 +00:00
|
|
|
#include <Interpreters/TextLog.h>
|
2019-08-13 14:31:46 +00:00
|
|
|
#include <Interpreters/MetricLog.h>
|
2020-06-10 19:17:30 +00:00
|
|
|
#include <Interpreters/AsynchronousMetricLog.h>
|
2020-10-22 16:47:20 +00:00
|
|
|
#include <Interpreters/OpenTelemetrySpanLog.h>
|
2021-07-09 14:05:35 +00:00
|
|
|
#include <Interpreters/ZooKeeperLog.h>
|
2022-04-30 05:00:40 +00:00
|
|
|
#include <Interpreters/FilesystemCacheLog.h>
|
2022-01-14 14:03:00 +00:00
|
|
|
#include <Interpreters/TransactionsInfoLog.h>
|
2022-02-05 16:33:42 +00:00
|
|
|
#include <Interpreters/ProcessorsProfileLog.h>
|
2022-10-03 18:52:14 +00:00
|
|
|
#include <Interpreters/AsynchronousInsertLog.h>
|
2021-06-13 12:38:57 +00:00
|
|
|
#include <Interpreters/JIT/CompiledExpressionCache.h>
|
2022-05-25 20:20:13 +00:00
|
|
|
#include <Interpreters/TransactionLog.h>
|
2022-09-11 15:50:36 +00:00
|
|
|
#include <BridgeHelper/CatBoostLibraryBridgeHelper.h>
|
2022-09-16 11:19:39 +00:00
|
|
|
#include <Access/AccessControl.h>
|
2020-03-07 17:37:38 +00:00
|
|
|
#include <Access/ContextAccess.h>
|
2021-10-31 08:51:20 +00:00
|
|
|
#include <Access/Common/AllowedClientHosts.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Databases/IDatabase.h>
|
2022-05-01 13:40:18 +00:00
|
|
|
#include <Databases/DatabaseReplicated.h>
|
2021-04-20 19:23:54 +00:00
|
|
|
#include <Disks/DiskRestartProxy.h>
|
2019-04-08 05:13:16 +00:00
|
|
|
#include <Storages/StorageDistributed.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Storages/StorageReplicatedMergeTree.h>
|
2022-06-08 12:09:59 +00:00
|
|
|
#include <Storages/Freeze.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Storages/StorageFactory.h>
|
2022-08-05 16:20:15 +00:00
|
|
|
#include <Storages/StorageFile.h>
|
|
|
|
#include <Storages/StorageS3.h>
|
|
|
|
#include <Storages/StorageURL.h>
|
|
|
|
#include <Storages/HDFS/StorageHDFS.h>
|
2017-08-06 20:26:23 +00:00
|
|
|
#include <Parsers/ASTSystemQuery.h>
|
2018-05-21 13:49:54 +00:00
|
|
|
#include <Parsers/ASTDropQuery.h>
|
|
|
|
#include <Parsers/ASTCreateQuery.h>
|
2021-09-20 14:23:10 +00:00
|
|
|
#include <Common/ThreadFuzzer.h>
|
2017-08-06 20:26:23 +00:00
|
|
|
#include <csignal>
|
2019-01-09 15:44:20 +00:00
|
|
|
#include <algorithm>
|
2017-08-06 20:26:23 +00:00
|
|
|
|
2022-09-28 13:29:29 +00:00
|
|
|
#include "config.h"
|
2020-04-16 12:31:57 +00:00
|
|
|
|
2017-08-04 15:54:00 +00:00
|
|
|
namespace DB
|
|
|
|
{
|
2017-08-06 20:26:23 +00:00
|
|
|
namespace ErrorCodes
|
|
|
|
{
|
2020-02-25 18:02:41 +00:00
|
|
|
extern const int LOGICAL_ERROR;
|
2017-08-06 20:26:23 +00:00
|
|
|
extern const int BAD_ARGUMENTS;
|
|
|
|
extern const int CANNOT_KILL;
|
2017-08-07 17:01:04 +00:00
|
|
|
extern const int NOT_IMPLEMENTED;
|
2019-09-19 11:04:57 +00:00
|
|
|
extern const int TIMEOUT_EXCEEDED;
|
2020-06-23 12:01:51 +00:00
|
|
|
extern const int TABLE_WAS_NOT_DROPPED;
|
2017-08-06 20:26:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-05-21 13:49:54 +00:00
|
|
|
namespace ActionLocks
|
|
|
|
{
|
|
|
|
extern StorageActionBlockType PartsMerge;
|
|
|
|
extern StorageActionBlockType PartsFetch;
|
|
|
|
extern StorageActionBlockType PartsSend;
|
|
|
|
extern StorageActionBlockType ReplicationQueue;
|
2019-04-22 15:11:16 +00:00
|
|
|
extern StorageActionBlockType DistributedSend;
|
2019-08-01 15:36:12 +00:00
|
|
|
extern StorageActionBlockType PartsTTLMerge;
|
2019-09-03 14:50:49 +00:00
|
|
|
extern StorageActionBlockType PartsMove;
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-08-31 12:55:19 +00:00
|
|
|
namespace
|
|
|
|
{
|
2017-08-04 15:54:00 +00:00
|
|
|
|
2017-08-24 18:19:06 +00:00
|
|
|
ExecutionStatus getOverallExecutionStatusOfCommands()
|
|
|
|
{
|
|
|
|
return ExecutionStatus(0);
|
|
|
|
}
|
|
|
|
|
2019-01-22 19:56:53 +00:00
|
|
|
/// Consequently tries to execute all commands and generates final exception message for failed commands
|
2017-08-24 18:19:06 +00:00
|
|
|
template <typename Callable, typename ... Callables>
|
|
|
|
ExecutionStatus getOverallExecutionStatusOfCommands(Callable && command, Callables && ... commands)
|
|
|
|
{
|
|
|
|
ExecutionStatus status_head(0);
|
|
|
|
try
|
|
|
|
{
|
|
|
|
command();
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
status_head = ExecutionStatus::fromCurrentException();
|
|
|
|
}
|
|
|
|
|
|
|
|
ExecutionStatus status_tail = getOverallExecutionStatusOfCommands(std::forward<Callables>(commands)...);
|
|
|
|
|
|
|
|
auto res_status = status_head.code != 0 ? status_head.code : status_tail.code;
|
|
|
|
auto res_message = status_head.message + (status_tail.message.empty() ? "" : ("\n" + status_tail.message));
|
|
|
|
|
|
|
|
return ExecutionStatus(res_status, res_message);
|
|
|
|
}
|
|
|
|
|
2018-06-13 19:01:07 +00:00
|
|
|
/// Consequently tries to execute all commands and throws exception with info about failed commands
|
|
|
|
template <typename ... Callables>
|
|
|
|
void executeCommandsAndThrowIfError(Callables && ... commands)
|
|
|
|
{
|
|
|
|
auto status = getOverallExecutionStatusOfCommands(std::forward<Callables>(commands)...);
|
|
|
|
if (status.code != 0)
|
|
|
|
throw Exception(status.message, status.code);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-01-24 16:20:36 +00:00
|
|
|
AccessType getRequiredAccessType(StorageActionBlockType action_type)
|
|
|
|
{
|
|
|
|
if (action_type == ActionLocks::PartsMerge)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_MERGES;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::PartsFetch)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_FETCHES;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::PartsSend)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_REPLICATED_SENDS;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::ReplicationQueue)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_REPLICATION_QUEUES;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::DistributedSend)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_DISTRIBUTED_SENDS;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::PartsTTLMerge)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_TTL_MERGES;
|
2020-01-24 16:20:36 +00:00
|
|
|
else if (action_type == ActionLocks::PartsMove)
|
2020-04-03 11:54:50 +00:00
|
|
|
return AccessType::SYSTEM_MOVES;
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
|
|
|
throw Exception("Unknown action type: " + std::to_string(action_type), ErrorCodes::LOGICAL_ERROR);
|
|
|
|
}
|
|
|
|
|
2021-06-20 08:24:43 +00:00
|
|
|
constexpr std::string_view table_is_not_replicated = "Table {} is not replicated";
|
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
}
|
2020-01-24 16:20:36 +00:00
|
|
|
|
2018-05-21 13:49:54 +00:00
|
|
|
/// Implements SYSTEM [START|STOP] <something action from ActionLocks>
|
2020-03-04 20:29:52 +00:00
|
|
|
void InterpreterSystemQuery::startStopAction(StorageActionBlockType action_type, bool start)
|
2018-05-21 13:49:54 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
auto manager = getContext()->getActionLocksManager();
|
2018-05-21 13:49:54 +00:00
|
|
|
manager->cleanExpired();
|
|
|
|
|
2022-01-25 09:47:29 +00:00
|
|
|
auto access = getContext()->getAccess();
|
|
|
|
auto required_access_type = getRequiredAccessType(action_type);
|
|
|
|
|
2020-10-20 15:10:24 +00:00
|
|
|
if (volume_ptr && action_type == ActionLocks::PartsMerge)
|
|
|
|
{
|
2022-01-25 09:47:29 +00:00
|
|
|
access->checkAccess(required_access_type);
|
2020-10-20 15:10:24 +00:00
|
|
|
volume_ptr->setAvoidMergesUserOverride(!start);
|
|
|
|
}
|
|
|
|
else if (table_id)
|
2018-05-21 13:49:54 +00:00
|
|
|
{
|
2022-01-25 09:47:29 +00:00
|
|
|
access->checkAccess(required_access_type, table_id.database_name, table_id.table_name);
|
2021-04-10 23:33:54 +00:00
|
|
|
auto table = DatabaseCatalog::instance().tryGetTable(table_id, getContext());
|
2020-10-15 19:23:46 +00:00
|
|
|
if (table)
|
2020-10-15 16:10:22 +00:00
|
|
|
{
|
2020-10-15 19:23:46 +00:00
|
|
|
if (start)
|
|
|
|
{
|
|
|
|
manager->remove(table, action_type);
|
|
|
|
table->onActionLockRemove(action_type);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
manager->add(table, action_type);
|
2020-10-15 16:10:22 +00:00
|
|
|
}
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-02-10 13:10:17 +00:00
|
|
|
for (auto & elem : DatabaseCatalog::instance().getDatabases())
|
2020-01-24 16:20:36 +00:00
|
|
|
{
|
2022-09-09 16:27:19 +00:00
|
|
|
startStopActionInDatabase(action_type, start, elem.first, elem.second, getContext(), log);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void InterpreterSystemQuery::startStopActionInDatabase(StorageActionBlockType action_type, bool start,
|
|
|
|
const String & database_name, const DatabasePtr & database,
|
|
|
|
const ContextPtr & local_context, Poco::Logger * log)
|
|
|
|
{
|
|
|
|
auto manager = local_context->getActionLocksManager();
|
|
|
|
auto access = local_context->getAccess();
|
|
|
|
auto required_access_type = getRequiredAccessType(action_type);
|
|
|
|
|
|
|
|
for (auto iterator = database->getTablesIterator(local_context); iterator->isValid(); iterator->next())
|
|
|
|
{
|
|
|
|
StoragePtr table = iterator->table();
|
|
|
|
if (!table)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!access->isGranted(required_access_type, database_name, iterator->name()))
|
|
|
|
{
|
|
|
|
LOG_INFO(log, "Access {} denied, skipping {}.{}", toString(required_access_type), database_name, iterator->name());
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (start)
|
|
|
|
{
|
|
|
|
manager->remove(table, action_type);
|
|
|
|
table->onActionLockRemove(action_type);
|
2020-01-24 16:20:36 +00:00
|
|
|
}
|
2022-09-09 16:27:19 +00:00
|
|
|
else
|
|
|
|
manager->add(table, action_type);
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
}
|
2020-01-24 16:20:36 +00:00
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
|
2021-05-31 14:49:02 +00:00
|
|
|
InterpreterSystemQuery::InterpreterSystemQuery(const ASTPtr & query_ptr_, ContextMutablePtr context_)
|
|
|
|
: WithMutableContext(context_), query_ptr(query_ptr_->clone()), log(&Poco::Logger::get("InterpreterSystemQuery"))
|
2019-11-11 01:11:32 +00:00
|
|
|
{
|
|
|
|
}
|
2017-08-31 12:55:19 +00:00
|
|
|
|
2017-08-06 20:26:23 +00:00
|
|
|
|
2017-08-04 15:54:00 +00:00
|
|
|
BlockIO InterpreterSystemQuery::execute()
|
|
|
|
{
|
2019-03-15 16:14:13 +00:00
|
|
|
auto & query = query_ptr->as<ASTSystemQuery &>();
|
2017-08-06 20:26:23 +00:00
|
|
|
|
2019-12-19 07:54:43 +00:00
|
|
|
if (!query.cluster.empty())
|
2022-04-22 12:15:29 +00:00
|
|
|
{
|
|
|
|
DDLQueryOnClusterParams params;
|
|
|
|
params.access_to_check = getRequiredAccessForDDLOnCluster();
|
|
|
|
return executeDDLQueryOnCluster(query_ptr, getContext(), params);
|
|
|
|
}
|
2019-12-19 07:54:43 +00:00
|
|
|
|
2017-08-06 20:26:23 +00:00
|
|
|
using Type = ASTSystemQuery::Type;
|
|
|
|
|
2018-03-26 14:12:07 +00:00
|
|
|
/// Use global context with fresh system profile settings
|
2021-04-10 23:33:54 +00:00
|
|
|
auto system_context = Context::createCopy(getContext()->getGlobalContext());
|
|
|
|
system_context->setSetting("profile", getContext()->getSystemProfileName());
|
2018-03-26 14:12:07 +00:00
|
|
|
|
2018-05-21 13:49:54 +00:00
|
|
|
/// Make canonical query for simpler processing
|
2021-06-20 08:24:43 +00:00
|
|
|
if (query.type == Type::RELOAD_DICTIONARY)
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (query.database)
|
2021-10-12 18:11:00 +00:00
|
|
|
query.setTable(query.getDatabase() + "." + query.getTable());
|
2021-06-20 08:24:43 +00:00
|
|
|
}
|
2021-11-11 13:28:18 +00:00
|
|
|
else if (query.table)
|
2021-06-20 08:24:43 +00:00
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
table_id = getContext()->resolveStorageID(StorageID(query.getDatabase(), query.getTable()), Context::ResolveOrdinary);
|
2021-06-20 08:24:43 +00:00
|
|
|
}
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2019-12-15 13:48:11 +00:00
|
|
|
|
2022-06-08 12:09:59 +00:00
|
|
|
BlockIO result;
|
|
|
|
|
2020-10-20 15:10:24 +00:00
|
|
|
volume_ptr = {};
|
|
|
|
if (!query.storage_policy.empty() && !query.volume.empty())
|
2021-04-10 23:33:54 +00:00
|
|
|
volume_ptr = getContext()->getStoragePolicy(query.storage_policy)->getVolumeByName(query.volume);
|
2020-10-20 15:10:24 +00:00
|
|
|
|
2017-08-06 20:26:23 +00:00
|
|
|
switch (query.type)
|
|
|
|
{
|
|
|
|
case Type::SHUTDOWN:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_SHUTDOWN);
|
2017-08-06 20:26:23 +00:00
|
|
|
if (kill(0, SIGTERM))
|
2017-08-31 12:55:19 +00:00
|
|
|
throwFromErrno("System call kill(0, SIGTERM) failed", ErrorCodes::CANNOT_KILL);
|
2017-08-06 20:26:23 +00:00
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2017-08-06 20:26:23 +00:00
|
|
|
case Type::KILL:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_SHUTDOWN);
|
2021-01-07 18:36:38 +00:00
|
|
|
/// Exit with the same code as it is usually set by shell when process is terminated by SIGKILL.
|
|
|
|
/// It's better than doing 'raise' or 'kill', because they have no effect for 'init' process (with pid = 0, usually in Docker).
|
|
|
|
LOG_INFO(log, "Exit immediately as the SYSTEM KILL command has been issued.");
|
|
|
|
_exit(128 + SIGKILL);
|
|
|
|
// break; /// unreachable
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
|
|
|
case Type::SUSPEND:
|
|
|
|
{
|
2021-12-30 18:37:21 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_SHUTDOWN);
|
2021-01-07 19:19:33 +00:00
|
|
|
auto command = fmt::format("kill -STOP {0} && sleep {1} && kill -CONT {0}", getpid(), query.seconds);
|
|
|
|
LOG_DEBUG(log, "Will run {}", command);
|
|
|
|
auto res = ShellCommand::execute(command);
|
|
|
|
res->in.close();
|
|
|
|
WriteBufferFromOwnString out;
|
|
|
|
copyData(res->out, out);
|
|
|
|
copyData(res->err, out);
|
|
|
|
if (!out.str().empty())
|
|
|
|
LOG_DEBUG(log, "The command returned output: {}", command, out.str());
|
2021-01-07 19:22:41 +00:00
|
|
|
res->wait();
|
2017-08-06 20:26:23 +00:00
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2017-08-06 20:26:23 +00:00
|
|
|
case Type::DROP_DNS_CACHE:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_DNS_CACHE);
|
2018-04-19 13:56:14 +00:00
|
|
|
DNSResolver::instance().dropCache();
|
2018-01-15 14:13:19 +00:00
|
|
|
/// Reinitialize clusters to update their resolved_addresses
|
2021-04-10 23:33:54 +00:00
|
|
|
system_context->reloadClusterConfig();
|
2017-08-06 20:26:23 +00:00
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2017-08-06 20:26:23 +00:00
|
|
|
case Type::DROP_MARK_CACHE:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_MARK_CACHE);
|
|
|
|
system_context->dropMarkCache();
|
2017-08-06 20:26:23 +00:00
|
|
|
break;
|
|
|
|
case Type::DROP_UNCOMPRESSED_CACHE:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_UNCOMPRESSED_CACHE);
|
|
|
|
system_context->dropUncompressedCache();
|
2017-08-06 20:26:23 +00:00
|
|
|
break;
|
2021-08-21 17:27:22 +00:00
|
|
|
case Type::DROP_INDEX_MARK_CACHE:
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_MARK_CACHE);
|
|
|
|
system_context->dropIndexMarkCache();
|
|
|
|
break;
|
|
|
|
case Type::DROP_INDEX_UNCOMPRESSED_CACHE:
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_UNCOMPRESSED_CACHE);
|
|
|
|
system_context->dropIndexUncompressedCache();
|
|
|
|
break;
|
2021-03-28 01:10:30 +00:00
|
|
|
case Type::DROP_MMAP_CACHE:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_MMAP_CACHE);
|
|
|
|
system_context->dropMMappedFileCache();
|
2021-03-28 01:10:30 +00:00
|
|
|
break;
|
2018-08-30 16:31:20 +00:00
|
|
|
#if USE_EMBEDDED_COMPILER
|
2018-09-05 11:37:41 +00:00
|
|
|
case Type::DROP_COMPILED_EXPRESSION_CACHE:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_COMPILED_EXPRESSION_CACHE);
|
2021-03-04 17:38:12 +00:00
|
|
|
if (auto * cache = CompiledExpressionCacheFactory::instance().tryGetCache())
|
|
|
|
cache->reset();
|
2018-08-30 16:31:20 +00:00
|
|
|
break;
|
|
|
|
#endif
|
2022-03-30 11:47:44 +00:00
|
|
|
case Type::DROP_FILESYSTEM_CACHE:
|
2022-03-21 11:30:25 +00:00
|
|
|
{
|
2022-06-22 16:00:15 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_FILESYSTEM_CACHE);
|
2022-03-30 11:47:44 +00:00
|
|
|
if (query.filesystem_cache_path.empty())
|
2022-03-21 11:30:25 +00:00
|
|
|
{
|
|
|
|
auto caches = FileCacheFactory::instance().getAll();
|
2022-03-21 13:56:38 +00:00
|
|
|
for (const auto & [_, cache_data] : caches)
|
2022-08-10 13:55:09 +00:00
|
|
|
cache_data->cache->removeIfReleasable();
|
2022-03-21 11:30:25 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2022-03-30 11:47:44 +00:00
|
|
|
auto cache = FileCacheFactory::instance().get(query.filesystem_cache_path);
|
2022-08-10 13:55:09 +00:00
|
|
|
cache->removeIfReleasable();
|
2022-06-21 17:30:21 +00:00
|
|
|
}
|
2022-03-21 11:30:25 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-08-05 16:20:15 +00:00
|
|
|
case Type::DROP_SCHEMA_CACHE:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_SCHEMA_CACHE);
|
|
|
|
std::unordered_set<String> caches_to_drop;
|
|
|
|
if (query.schema_cache_storage.empty())
|
|
|
|
caches_to_drop = {"FILE", "S3", "HDFS", "URL"};
|
|
|
|
else
|
|
|
|
caches_to_drop = {query.schema_cache_storage};
|
|
|
|
|
|
|
|
if (caches_to_drop.contains("FILE"))
|
|
|
|
StorageFile::getSchemaCache(getContext()).clear();
|
2022-08-08 12:17:18 +00:00
|
|
|
#if USE_AWS_S3
|
2022-08-05 16:20:15 +00:00
|
|
|
if (caches_to_drop.contains("S3"))
|
|
|
|
StorageS3::getSchemaCache(getContext()).clear();
|
2022-08-08 12:17:18 +00:00
|
|
|
#endif
|
|
|
|
#if USE_HDFS
|
2022-08-05 16:20:15 +00:00
|
|
|
if (caches_to_drop.contains("HDFS"))
|
|
|
|
StorageHDFS::getSchemaCache(getContext()).clear();
|
2022-08-08 12:17:18 +00:00
|
|
|
#endif
|
2022-08-05 16:20:15 +00:00
|
|
|
if (caches_to_drop.contains("URL"))
|
|
|
|
StorageURL::getSchemaCache(getContext()).clear();
|
|
|
|
break;
|
|
|
|
}
|
2017-08-24 18:19:06 +00:00
|
|
|
case Type::RELOAD_DICTIONARY:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_DICTIONARY);
|
2021-03-19 12:47:27 +00:00
|
|
|
|
2021-04-10 23:33:54 +00:00
|
|
|
auto & external_dictionaries_loader = system_context->getExternalDictionariesLoader();
|
2021-10-12 18:11:00 +00:00
|
|
|
external_dictionaries_loader.reloadDictionary(query.getTable(), getContext());
|
2021-03-19 12:47:27 +00:00
|
|
|
|
2020-03-03 08:32:58 +00:00
|
|
|
ExternalDictionariesLoader::resetAll();
|
2017-08-24 18:19:06 +00:00
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2017-08-24 18:19:06 +00:00
|
|
|
case Type::RELOAD_DICTIONARIES:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_DICTIONARY);
|
2018-06-13 19:01:07 +00:00
|
|
|
executeCommandsAndThrowIfError(
|
2021-06-20 08:24:43 +00:00
|
|
|
[&] { system_context->getExternalDictionariesLoader().reloadAllTriedToLoad(); },
|
|
|
|
[&] { system_context->getEmbeddedDictionaries().reload(); }
|
2017-08-24 18:19:06 +00:00
|
|
|
);
|
2020-03-03 08:32:58 +00:00
|
|
|
ExternalDictionariesLoader::resetAll();
|
2017-08-24 18:19:06 +00:00
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2021-04-16 09:56:40 +00:00
|
|
|
case Type::RELOAD_MODEL:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_MODEL);
|
2022-09-11 15:50:36 +00:00
|
|
|
auto bridge_helper = std::make_unique<CatBoostLibraryBridgeHelper>(getContext(), query.target_model);
|
|
|
|
bridge_helper->removeModel();
|
2021-04-16 09:56:40 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case Type::RELOAD_MODELS:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_MODEL);
|
2022-09-11 15:50:36 +00:00
|
|
|
auto bridge_helper = std::make_unique<CatBoostLibraryBridgeHelper>(getContext());
|
|
|
|
bridge_helper->removeAllModels();
|
2021-04-16 09:56:40 +00:00
|
|
|
break;
|
|
|
|
}
|
2021-09-17 13:04:44 +00:00
|
|
|
case Type::RELOAD_FUNCTION:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_FUNCTION);
|
|
|
|
|
|
|
|
auto & external_user_defined_executable_functions_loader = system_context->getExternalUserDefinedExecutableFunctionsLoader();
|
|
|
|
external_user_defined_executable_functions_loader.reloadFunction(query.target_function);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case Type::RELOAD_FUNCTIONS:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_FUNCTION);
|
|
|
|
|
|
|
|
auto & external_user_defined_executable_functions_loader = system_context->getExternalUserDefinedExecutableFunctionsLoader();
|
|
|
|
external_user_defined_executable_functions_loader.reloadAllTriedToLoad();
|
|
|
|
break;
|
|
|
|
}
|
2018-03-26 14:12:07 +00:00
|
|
|
case Type::RELOAD_EMBEDDED_DICTIONARIES:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_EMBEDDED_DICTIONARIES);
|
|
|
|
system_context->getEmbeddedDictionaries().reload();
|
2018-03-26 14:12:07 +00:00
|
|
|
break;
|
2018-03-13 10:41:47 +00:00
|
|
|
case Type::RELOAD_CONFIG:
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_CONFIG);
|
|
|
|
system_context->reloadConfig();
|
2018-03-13 10:41:47 +00:00
|
|
|
break;
|
2022-09-16 11:19:39 +00:00
|
|
|
case Type::RELOAD_USERS:
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_USERS);
|
|
|
|
system_context->getAccessControl().reload(AccessControl::ReloadMode::ALL);
|
|
|
|
break;
|
2020-11-30 14:30:55 +00:00
|
|
|
case Type::RELOAD_SYMBOLS:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2022-06-10 08:22:31 +00:00
|
|
|
#if defined(__ELF__) && !defined(OS_FREEBSD)
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RELOAD_SYMBOLS);
|
2021-08-28 03:43:43 +00:00
|
|
|
SymbolIndex::reload();
|
2020-12-07 21:12:09 +00:00
|
|
|
break;
|
2020-12-07 17:40:49 +00:00
|
|
|
#else
|
|
|
|
throw Exception("SYSTEM RELOAD SYMBOLS is not supported on current platform", ErrorCodes::NOT_IMPLEMENTED);
|
|
|
|
#endif
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2017-08-07 17:01:04 +00:00
|
|
|
case Type::STOP_MERGES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsMerge, false);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2017-08-07 17:01:04 +00:00
|
|
|
case Type::START_MERGES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsMerge, true);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2019-08-01 15:36:12 +00:00
|
|
|
case Type::STOP_TTL_MERGES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsTTLMerge, false);
|
2019-08-01 15:36:12 +00:00
|
|
|
break;
|
|
|
|
case Type::START_TTL_MERGES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsTTLMerge, true);
|
2019-08-01 15:36:12 +00:00
|
|
|
break;
|
2019-09-03 14:50:49 +00:00
|
|
|
case Type::STOP_MOVES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsMove, false);
|
2019-09-03 14:50:49 +00:00
|
|
|
break;
|
|
|
|
case Type::START_MOVES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsMove, true);
|
2019-09-03 14:50:49 +00:00
|
|
|
break;
|
2018-05-21 13:49:54 +00:00
|
|
|
case Type::STOP_FETCHES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsFetch, false);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
|
|
|
case Type::START_FETCHES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsFetch, true);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
|
|
|
case Type::STOP_REPLICATED_SENDS:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsSend, false);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2019-02-02 11:28:43 +00:00
|
|
|
case Type::START_REPLICATED_SENDS:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::PartsSend, true);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2017-08-07 17:01:04 +00:00
|
|
|
case Type::STOP_REPLICATION_QUEUES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::ReplicationQueue, false);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2017-08-07 17:01:04 +00:00
|
|
|
case Type::START_REPLICATION_QUEUES:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::ReplicationQueue, true);
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2019-04-22 15:11:16 +00:00
|
|
|
case Type::STOP_DISTRIBUTED_SENDS:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::DistributedSend, false);
|
2019-04-22 15:11:16 +00:00
|
|
|
break;
|
|
|
|
case Type::START_DISTRIBUTED_SENDS:
|
2020-03-04 20:29:52 +00:00
|
|
|
startStopAction(ActionLocks::DistributedSend, true);
|
2019-04-22 15:11:16 +00:00
|
|
|
break;
|
2020-05-17 12:44:22 +00:00
|
|
|
case Type::DROP_REPLICA:
|
|
|
|
dropReplica(query);
|
|
|
|
break;
|
2018-05-21 13:49:54 +00:00
|
|
|
case Type::SYNC_REPLICA:
|
|
|
|
syncReplica(query);
|
|
|
|
break;
|
2022-05-01 13:40:18 +00:00
|
|
|
case Type::SYNC_DATABASE_REPLICA:
|
|
|
|
syncReplicatedDatabase(query);
|
|
|
|
break;
|
2022-05-25 20:20:13 +00:00
|
|
|
case Type::SYNC_TRANSACTION_LOG:
|
|
|
|
syncTransactionLog();
|
|
|
|
break;
|
2019-05-10 04:19:02 +00:00
|
|
|
case Type::FLUSH_DISTRIBUTED:
|
|
|
|
flushDistributed(query);
|
2019-04-22 15:11:16 +00:00
|
|
|
break;
|
2018-05-21 13:49:54 +00:00
|
|
|
case Type::RESTART_REPLICAS:
|
|
|
|
restartReplicas(system_context);
|
|
|
|
break;
|
|
|
|
case Type::RESTART_REPLICA:
|
2022-01-25 09:47:29 +00:00
|
|
|
restartReplica(table_id, system_context);
|
2021-06-20 08:24:43 +00:00
|
|
|
break;
|
|
|
|
case Type::RESTORE_REPLICA:
|
|
|
|
restoreReplica();
|
2018-05-21 13:49:54 +00:00
|
|
|
break;
|
2021-04-20 19:23:54 +00:00
|
|
|
case Type::RESTART_DISK:
|
|
|
|
restartDisk(query.disk);
|
|
|
|
break;
|
2018-10-09 10:05:27 +00:00
|
|
|
case Type::FLUSH_LOGS:
|
2021-01-07 19:19:33 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_FLUSH_LOGS);
|
2018-06-13 19:01:07 +00:00
|
|
|
executeCommandsAndThrowIfError(
|
2021-06-20 08:24:43 +00:00
|
|
|
[&] { if (auto query_log = getContext()->getQueryLog()) query_log->flush(true); },
|
|
|
|
[&] { if (auto part_log = getContext()->getPartLog("")) part_log->flush(true); },
|
|
|
|
[&] { if (auto query_thread_log = getContext()->getQueryThreadLog()) query_thread_log->flush(true); },
|
|
|
|
[&] { if (auto trace_log = getContext()->getTraceLog()) trace_log->flush(true); },
|
|
|
|
[&] { if (auto text_log = getContext()->getTextLog()) text_log->flush(true); },
|
|
|
|
[&] { if (auto metric_log = getContext()->getMetricLog()) metric_log->flush(true); },
|
|
|
|
[&] { if (auto asynchronous_metric_log = getContext()->getAsynchronousMetricLog()) asynchronous_metric_log->flush(true); },
|
2021-06-18 16:25:19 +00:00
|
|
|
[&] { if (auto opentelemetry_span_log = getContext()->getOpenTelemetrySpanLog()) opentelemetry_span_log->flush(true); },
|
2021-07-28 08:38:47 +00:00
|
|
|
[&] { if (auto query_views_log = getContext()->getQueryViewsLog()) query_views_log->flush(true); },
|
2021-03-05 14:57:16 +00:00
|
|
|
[&] { if (auto zookeeper_log = getContext()->getZooKeeperLog()) zookeeper_log->flush(true); },
|
2022-01-14 14:03:00 +00:00
|
|
|
[&] { if (auto session_log = getContext()->getSessionLog()) session_log->flush(true); },
|
2022-04-07 13:14:06 +00:00
|
|
|
[&] { if (auto transactions_info_log = getContext()->getTransactionsInfoLog()) transactions_info_log->flush(true); },
|
2022-04-22 15:34:47 +00:00
|
|
|
[&] { if (auto processors_profile_log = getContext()->getProcessorsProfileLog()) processors_profile_log->flush(true); },
|
2022-10-03 18:52:14 +00:00
|
|
|
[&] { if (auto cache_log = getContext()->getFilesystemCacheLog()) cache_log->flush(true); },
|
|
|
|
[&] { if (auto asynchronous_insert_log = getContext()->getAsynchronousInsertLog()) asynchronous_insert_log->flush(true); }
|
2018-06-13 19:01:07 +00:00
|
|
|
);
|
|
|
|
break;
|
2021-01-07 19:19:33 +00:00
|
|
|
}
|
2018-05-21 13:49:54 +00:00
|
|
|
case Type::STOP_LISTEN_QUERIES:
|
|
|
|
case Type::START_LISTEN_QUERIES:
|
2021-09-06 14:24:03 +00:00
|
|
|
throw Exception(ErrorCodes::NOT_IMPLEMENTED, "{} is not supported yet", query.type);
|
2021-09-20 14:23:10 +00:00
|
|
|
case Type::STOP_THREAD_FUZZER:
|
2021-12-30 18:37:21 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_THREAD_FUZZER);
|
2021-09-20 14:23:10 +00:00
|
|
|
ThreadFuzzer::stop();
|
|
|
|
break;
|
|
|
|
case Type::START_THREAD_FUZZER:
|
2021-12-30 18:37:21 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_THREAD_FUZZER);
|
2021-09-20 14:23:10 +00:00
|
|
|
ThreadFuzzer::start();
|
|
|
|
break;
|
2022-06-08 12:09:59 +00:00
|
|
|
case Type::UNFREEZE:
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_UNFREEZE);
|
|
|
|
/// The result contains information about deleted parts as a table. It is for compatibility with ALTER TABLE UNFREEZE query.
|
2022-08-23 10:53:06 +00:00
|
|
|
result = Unfreezer(getContext()).systemUnfreeze(query.backup_name);
|
2022-06-08 12:09:59 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-08-06 20:26:23 +00:00
|
|
|
default:
|
|
|
|
throw Exception("Unknown type of SYSTEM query", ErrorCodes::BAD_ARGUMENTS);
|
|
|
|
}
|
|
|
|
|
2022-06-08 12:09:59 +00:00
|
|
|
return result;
|
2017-08-04 15:54:00 +00:00
|
|
|
}
|
|
|
|
|
2021-06-20 08:24:43 +00:00
|
|
|
void InterpreterSystemQuery::restoreReplica()
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RESTORE_REPLICA, table_id);
|
|
|
|
|
|
|
|
const StoragePtr table_ptr = DatabaseCatalog::instance().getTable(table_id, getContext());
|
|
|
|
|
|
|
|
auto * const table_replicated_ptr = dynamic_cast<StorageReplicatedMergeTree *>(table_ptr.get());
|
|
|
|
|
|
|
|
if (table_replicated_ptr == nullptr)
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, table_is_not_replicated.data(), table_id.getNameForLogs());
|
|
|
|
|
2022-01-20 18:55:59 +00:00
|
|
|
table_replicated_ptr->restoreMetadataInZooKeeper();
|
2021-06-20 08:24:43 +00:00
|
|
|
}
|
2017-08-06 20:26:23 +00:00
|
|
|
|
2021-05-31 14:49:02 +00:00
|
|
|
StoragePtr InterpreterSystemQuery::tryRestartReplica(const StorageID & replica, ContextMutablePtr system_context, bool need_ddl_guard)
|
2018-05-21 13:49:54 +00:00
|
|
|
{
|
2021-06-20 08:24:43 +00:00
|
|
|
auto table_ddl_guard = need_ddl_guard
|
|
|
|
? DatabaseCatalog::instance().getDDLGuard(replica.getDatabaseName(), replica.getTableName())
|
|
|
|
: nullptr;
|
|
|
|
|
2021-04-10 23:33:54 +00:00
|
|
|
auto [database, table] = DatabaseCatalog::instance().tryGetDatabaseAndTable(replica, getContext());
|
2018-05-21 13:49:54 +00:00
|
|
|
ASTPtr create_ast;
|
|
|
|
|
|
|
|
/// Detach actions
|
2020-03-04 20:29:52 +00:00
|
|
|
if (!table || !dynamic_cast<const StorageReplicatedMergeTree *>(table.get()))
|
|
|
|
return nullptr;
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2021-05-13 07:03:00 +00:00
|
|
|
table->flushAndShutdown();
|
2020-03-04 20:29:52 +00:00
|
|
|
{
|
2018-05-21 13:49:54 +00:00
|
|
|
/// If table was already dropped by anyone, an exception will be thrown
|
2021-04-10 23:33:54 +00:00
|
|
|
auto table_lock = table->lockExclusively(getContext()->getCurrentQueryId(), getContext()->getSettingsRef().lock_acquire_timeout);
|
|
|
|
create_ast = database->getCreateTableQuery(replica.table_name, getContext());
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2021-11-18 10:45:12 +00:00
|
|
|
database->detachTable(system_context, replica.table_name);
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
2022-08-23 14:10:44 +00:00
|
|
|
UUID uuid = table->getStorageID().uuid;
|
2020-03-04 20:29:52 +00:00
|
|
|
table.reset();
|
2022-08-23 14:10:44 +00:00
|
|
|
database->waitDetachedTableNotInUse(uuid);
|
2018-05-21 13:49:54 +00:00
|
|
|
|
|
|
|
/// Attach actions
|
2020-03-04 20:29:52 +00:00
|
|
|
/// getCreateTableQuery must return canonical CREATE query representation, there are no need for AST postprocessing
|
|
|
|
auto & create = create_ast->as<ASTCreateQuery &>();
|
|
|
|
create.attach = true;
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2021-04-16 10:15:35 +00:00
|
|
|
auto columns = InterpreterCreateQuery::getColumnsDescription(*create.columns_list->columns, system_context, true);
|
2020-03-04 20:29:52 +00:00
|
|
|
auto constraints = InterpreterCreateQuery::getConstraintsDescription(create.columns_list->constraints);
|
2020-04-02 01:00:21 +00:00
|
|
|
auto data_path = database->getTableDataPath(create);
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
table = StorageFactory::instance().get(create,
|
2020-04-02 01:00:21 +00:00
|
|
|
data_path,
|
2020-03-04 20:29:52 +00:00
|
|
|
system_context,
|
2021-04-10 23:33:54 +00:00
|
|
|
system_context->getGlobalContext(),
|
2020-03-04 20:29:52 +00:00
|
|
|
columns,
|
|
|
|
constraints,
|
|
|
|
false);
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2021-11-10 13:13:27 +00:00
|
|
|
database->attachTable(system_context, replica.table_name, table, data_path);
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
table->startup();
|
|
|
|
return table;
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
|
2022-01-25 09:47:29 +00:00
|
|
|
void InterpreterSystemQuery::restartReplica(const StorageID & replica, ContextMutablePtr system_context)
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RESTART_REPLICA, replica);
|
|
|
|
if (!tryRestartReplica(replica, system_context))
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, table_is_not_replicated.data(), replica.getNameForLogs());
|
|
|
|
}
|
|
|
|
|
2021-05-31 14:49:02 +00:00
|
|
|
void InterpreterSystemQuery::restartReplicas(ContextMutablePtr system_context)
|
2018-05-21 13:49:54 +00:00
|
|
|
{
|
2020-03-04 20:29:52 +00:00
|
|
|
std::vector<StorageID> replica_names;
|
2020-03-30 23:36:23 +00:00
|
|
|
auto & catalog = DatabaseCatalog::instance();
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2022-01-25 09:47:29 +00:00
|
|
|
auto access = getContext()->getAccess();
|
|
|
|
bool access_is_granted_globally = access->isGranted(AccessType::SYSTEM_RESTART_REPLICA);
|
|
|
|
|
2020-03-30 23:36:23 +00:00
|
|
|
for (auto & elem : catalog.getDatabases())
|
2022-01-25 09:47:29 +00:00
|
|
|
{
|
2021-06-20 08:24:43 +00:00
|
|
|
for (auto it = elem.second->getTablesIterator(getContext()); it->isValid(); it->next())
|
2022-01-25 09:47:29 +00:00
|
|
|
{
|
2021-06-20 08:24:43 +00:00
|
|
|
if (dynamic_cast<const StorageReplicatedMergeTree *>(it->table().get()))
|
2022-01-25 09:47:29 +00:00
|
|
|
{
|
|
|
|
if (!access_is_granted_globally && !access->isGranted(AccessType::SYSTEM_RESTART_REPLICA, elem.first, it->name()))
|
|
|
|
{
|
|
|
|
LOG_INFO(log, "Access {} denied, skipping {}.{}", "SYSTEM RESTART REPLICA", elem.first, it->name());
|
|
|
|
continue;
|
|
|
|
}
|
2021-06-20 08:24:43 +00:00
|
|
|
replica_names.emplace_back(it->databaseName(), it->name());
|
2022-01-25 09:47:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-05-21 13:49:54 +00:00
|
|
|
|
|
|
|
if (replica_names.empty())
|
|
|
|
return;
|
|
|
|
|
2020-03-30 23:36:23 +00:00
|
|
|
TableGuards guards;
|
2021-06-20 08:24:43 +00:00
|
|
|
|
2020-03-30 23:36:23 +00:00
|
|
|
for (const auto & name : replica_names)
|
|
|
|
guards.emplace(UniqueTableName{name.database_name, name.table_name}, nullptr);
|
2021-06-20 08:24:43 +00:00
|
|
|
|
2020-03-30 23:36:23 +00:00
|
|
|
for (auto & guard : guards)
|
|
|
|
guard.second = catalog.getDDLGuard(guard.first.database_name, guard.first.table_name);
|
|
|
|
|
2022-04-18 08:18:31 +00:00
|
|
|
ThreadPool pool(std::min(static_cast<size_t>(getNumberOfPhysicalCPUCores()), replica_names.size()));
|
2021-06-20 08:24:43 +00:00
|
|
|
|
2021-01-10 09:44:56 +00:00
|
|
|
for (auto & replica : replica_names)
|
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Restarting replica on {}", replica.getNameForLogs());
|
|
|
|
pool.scheduleOrThrowOnError([&]() { tryRestartReplica(replica, system_context, false); });
|
|
|
|
}
|
2018-05-21 13:49:54 +00:00
|
|
|
pool.wait();
|
|
|
|
}
|
|
|
|
|
2020-05-17 12:44:22 +00:00
|
|
|
void InterpreterSystemQuery::dropReplica(ASTSystemQuery & query)
|
|
|
|
{
|
2020-06-23 12:01:51 +00:00
|
|
|
if (query.replica.empty())
|
|
|
|
throw Exception("Replica name is empty", ErrorCodes::BAD_ARGUMENTS);
|
2020-06-22 15:01:40 +00:00
|
|
|
|
2020-05-17 12:44:22 +00:00
|
|
|
if (!table_id.empty())
|
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_REPLICA, table_id);
|
|
|
|
StoragePtr table = DatabaseCatalog::instance().getTable(table_id, getContext());
|
2020-05-17 12:44:22 +00:00
|
|
|
|
2020-06-23 12:01:51 +00:00
|
|
|
if (!dropReplicaImpl(query, table))
|
2021-06-20 08:24:43 +00:00
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, table_is_not_replicated.data(), table_id.getNameForLogs());
|
2020-05-17 12:44:22 +00:00
|
|
|
}
|
2021-11-11 13:28:18 +00:00
|
|
|
else if (query.database)
|
2020-05-17 12:44:22 +00:00
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_REPLICA, query.getDatabase());
|
|
|
|
DatabasePtr database = DatabaseCatalog::instance().getDatabase(query.getDatabase());
|
2021-04-10 23:33:54 +00:00
|
|
|
for (auto iterator = database->getTablesIterator(getContext()); iterator->isValid(); iterator->next())
|
2020-06-23 12:01:51 +00:00
|
|
|
dropReplicaImpl(query, iterator->table());
|
|
|
|
LOG_TRACE(log, "Dropped replica {} from database {}", query.replica, backQuoteIfNeed(database->getDatabaseName()));
|
|
|
|
}
|
|
|
|
else if (query.is_drop_whole_replica)
|
|
|
|
{
|
|
|
|
auto databases = DatabaseCatalog::instance().getDatabases();
|
2022-01-25 09:47:29 +00:00
|
|
|
auto access = getContext()->getAccess();
|
|
|
|
bool access_is_granted_globally = access->isGranted(AccessType::SYSTEM_DROP_REPLICA);
|
2020-06-23 12:01:51 +00:00
|
|
|
|
|
|
|
for (auto & elem : databases)
|
2020-05-24 13:53:23 +00:00
|
|
|
{
|
2020-06-23 12:01:51 +00:00
|
|
|
DatabasePtr & database = elem.second;
|
2021-04-10 23:33:54 +00:00
|
|
|
for (auto iterator = database->getTablesIterator(getContext()); iterator->isValid(); iterator->next())
|
2022-01-25 09:47:29 +00:00
|
|
|
{
|
|
|
|
if (!access_is_granted_globally && !access->isGranted(AccessType::SYSTEM_DROP_REPLICA, elem.first, iterator->name()))
|
|
|
|
{
|
|
|
|
LOG_INFO(log, "Access {} denied, skipping {}.{}", "SYSTEM DROP REPLICA", elem.first, iterator->name());
|
|
|
|
continue;
|
|
|
|
}
|
2020-06-23 12:01:51 +00:00
|
|
|
dropReplicaImpl(query, iterator->table());
|
2022-01-25 09:47:29 +00:00
|
|
|
}
|
2020-06-23 12:01:51 +00:00
|
|
|
LOG_TRACE(log, "Dropped replica {} from database {}", query.replica, backQuoteIfNeed(database->getDatabaseName()));
|
2020-05-24 13:53:23 +00:00
|
|
|
}
|
2020-06-05 07:03:51 +00:00
|
|
|
}
|
|
|
|
else if (!query.replica_zk_path.empty())
|
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_DROP_REPLICA);
|
2021-05-09 11:59:49 +00:00
|
|
|
String remote_replica_path = fs::path(query.replica_zk_path) / "replicas" / query.replica;
|
2020-06-22 15:01:40 +00:00
|
|
|
|
2020-06-23 12:01:51 +00:00
|
|
|
/// This check is actually redundant, but it may prevent from some user mistakes
|
|
|
|
for (auto & elem : DatabaseCatalog::instance().getDatabases())
|
2020-06-22 15:01:40 +00:00
|
|
|
{
|
|
|
|
DatabasePtr & database = elem.second;
|
2021-04-10 23:33:54 +00:00
|
|
|
for (auto iterator = database->getTablesIterator(getContext()); iterator->isValid(); iterator->next())
|
2020-06-22 15:01:40 +00:00
|
|
|
{
|
|
|
|
if (auto * storage_replicated = dynamic_cast<StorageReplicatedMergeTree *>(iterator->table().get()))
|
|
|
|
{
|
2020-06-23 12:01:51 +00:00
|
|
|
StorageReplicatedMergeTree::Status status;
|
2020-06-22 15:01:40 +00:00
|
|
|
storage_replicated->getStatus(status);
|
2020-06-23 12:01:51 +00:00
|
|
|
if (status.zookeeper_path == query.replica_zk_path)
|
|
|
|
throw Exception("There is a local table " + storage_replicated->getStorageID().getNameForLogs() +
|
|
|
|
", which has the same table path in ZooKeeper. Please check the path in query. "
|
|
|
|
"If you want to drop replica of this table, use `DROP TABLE` "
|
|
|
|
"or `SYSTEM DROP REPLICA 'name' FROM db.table`", ErrorCodes::TABLE_WAS_NOT_DROPPED);
|
2020-06-22 15:01:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-10 23:33:54 +00:00
|
|
|
auto zookeeper = getContext()->getZooKeeper();
|
2020-06-23 12:01:51 +00:00
|
|
|
|
|
|
|
bool looks_like_table_path = zookeeper->exists(query.replica_zk_path + "/replicas") ||
|
|
|
|
zookeeper->exists(query.replica_zk_path + "/dropped");
|
|
|
|
if (!looks_like_table_path)
|
|
|
|
throw Exception("Specified path " + query.replica_zk_path + " does not look like a table path",
|
|
|
|
ErrorCodes::TABLE_WAS_NOT_DROPPED);
|
|
|
|
|
2020-06-22 15:01:40 +00:00
|
|
|
if (zookeeper->exists(remote_replica_path + "/is_active"))
|
|
|
|
throw Exception("Can't remove replica: " + query.replica + ", because it's active",
|
2020-06-23 12:01:51 +00:00
|
|
|
ErrorCodes::TABLE_WAS_NOT_DROPPED);
|
2020-06-22 15:01:40 +00:00
|
|
|
|
2020-06-23 12:01:51 +00:00
|
|
|
StorageReplicatedMergeTree::dropReplica(zookeeper, query.replica_zk_path, query.replica, log);
|
|
|
|
LOG_INFO(log, "Dropped replica {}", remote_replica_path);
|
2020-06-05 07:03:51 +00:00
|
|
|
}
|
2020-06-23 12:01:51 +00:00
|
|
|
else
|
|
|
|
throw Exception("Invalid query", ErrorCodes::LOGICAL_ERROR);
|
|
|
|
}
|
2020-05-24 13:53:23 +00:00
|
|
|
|
2020-06-23 12:01:51 +00:00
|
|
|
bool InterpreterSystemQuery::dropReplicaImpl(ASTSystemQuery & query, const StoragePtr & table)
|
|
|
|
{
|
|
|
|
auto * storage_replicated = dynamic_cast<StorageReplicatedMergeTree *>(table.get());
|
|
|
|
if (!storage_replicated)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
StorageReplicatedMergeTree::Status status;
|
2021-04-10 23:33:54 +00:00
|
|
|
auto zookeeper = getContext()->getZooKeeper();
|
2020-06-23 12:01:51 +00:00
|
|
|
storage_replicated->getStatus(status);
|
|
|
|
|
|
|
|
/// Do not allow to drop local replicas and active remote replicas
|
|
|
|
if (query.replica == status.replica_name)
|
|
|
|
throw Exception("We can't drop local replica, please use `DROP TABLE` "
|
|
|
|
"if you want to clean the data and drop this replica", ErrorCodes::TABLE_WAS_NOT_DROPPED);
|
|
|
|
|
|
|
|
/// NOTE it's not atomic: replica may become active after this check, but before dropReplica(...)
|
2022-09-05 01:50:24 +00:00
|
|
|
/// However, the main use case is to drop dead replica, which cannot become active.
|
2020-06-23 12:01:51 +00:00
|
|
|
/// This check prevents only from accidental drop of some other replica.
|
|
|
|
if (zookeeper->exists(status.zookeeper_path + "/replicas/" + query.replica + "/is_active"))
|
|
|
|
throw Exception("Can't drop replica: " + query.replica + ", because it's active",
|
|
|
|
ErrorCodes::TABLE_WAS_NOT_DROPPED);
|
|
|
|
|
|
|
|
storage_replicated->dropReplica(zookeeper, status.zookeeper_path, query.replica, log);
|
|
|
|
LOG_TRACE(log, "Dropped replica {} of {}", query.replica, table->getStorageID().getNameForLogs());
|
|
|
|
|
|
|
|
return true;
|
2020-05-17 12:44:22 +00:00
|
|
|
}
|
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
void InterpreterSystemQuery::syncReplica(ASTSystemQuery &)
|
2018-05-21 13:49:54 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_SYNC_REPLICA, table_id);
|
|
|
|
StoragePtr table = DatabaseCatalog::instance().getTable(table_id, getContext());
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2020-04-22 06:01:33 +00:00
|
|
|
if (auto * storage_replicated = dynamic_cast<StorageReplicatedMergeTree *>(table.get()))
|
2019-09-19 11:04:57 +00:00
|
|
|
{
|
2020-05-23 22:24:01 +00:00
|
|
|
LOG_TRACE(log, "Synchronizing entries in replica's queue with table's log and waiting for it to become empty");
|
2021-04-10 23:33:54 +00:00
|
|
|
if (!storage_replicated->waitForShrinkingQueueSize(0, getContext()->getSettingsRef().receive_timeout.totalMilliseconds()))
|
2019-09-19 21:20:58 +00:00
|
|
|
{
|
2020-05-23 22:24:01 +00:00
|
|
|
LOG_ERROR(log, "SYNC REPLICA {}: Timed out!", table_id.getNameForLogs());
|
2022-05-01 13:40:18 +00:00
|
|
|
throw Exception(ErrorCodes::TIMEOUT_EXCEEDED, "SYNC REPLICA {}: command timed out. " \
|
|
|
|
"See the 'receive_timeout' setting", table_id.getNameForLogs());
|
2019-09-19 21:20:58 +00:00
|
|
|
}
|
2020-05-23 22:24:01 +00:00
|
|
|
LOG_TRACE(log, "SYNC REPLICA {}: OK", table_id.getNameForLogs());
|
2019-09-19 11:04:57 +00:00
|
|
|
}
|
2019-04-08 05:13:16 +00:00
|
|
|
else
|
2021-06-20 08:24:43 +00:00
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, table_is_not_replicated.data(), table_id.getNameForLogs());
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
|
2022-05-01 13:40:18 +00:00
|
|
|
|
|
|
|
void InterpreterSystemQuery::syncReplicatedDatabase(ASTSystemQuery & query)
|
|
|
|
{
|
|
|
|
const auto database_name = query.getDatabase();
|
2022-07-20 20:54:43 +00:00
|
|
|
auto guard = DatabaseCatalog::instance().getDDLGuard(database_name, "");
|
2022-05-01 13:40:18 +00:00
|
|
|
auto database = DatabaseCatalog::instance().getDatabase(database_name);
|
|
|
|
|
|
|
|
if (auto * ptr = typeid_cast<DatabaseReplicated *>(database.get()))
|
|
|
|
{
|
|
|
|
LOG_TRACE(log, "Synchronizing entries in the database replica's (name: {}) queue with the log", database_name);
|
|
|
|
if (!ptr->waitForReplicaToProcessAllEntries(getContext()->getSettingsRef().receive_timeout.totalMilliseconds()))
|
|
|
|
{
|
2022-07-20 20:54:43 +00:00
|
|
|
throw Exception(ErrorCodes::TIMEOUT_EXCEEDED, "SYNC DATABASE REPLICA {}: database is readonly or command timed out. " \
|
2022-05-01 13:40:18 +00:00
|
|
|
"See the 'receive_timeout' setting", database_name);
|
|
|
|
}
|
|
|
|
LOG_TRACE(log, "SYNC DATABASE REPLICA {}: OK", database_name);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
throw Exception(ErrorCodes::BAD_ARGUMENTS, "SYSTEM SYNC DATABASE REPLICA query is intended to work only with Replicated engine");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-05-25 20:20:13 +00:00
|
|
|
void InterpreterSystemQuery::syncTransactionLog()
|
|
|
|
{
|
|
|
|
getContext()->checkTransactionsAreAllowed(/* explicit_tcl_query */ true);
|
|
|
|
TransactionLog::instance().sync();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-03-04 20:29:52 +00:00
|
|
|
void InterpreterSystemQuery::flushDistributed(ASTSystemQuery &)
|
2019-04-22 15:11:16 +00:00
|
|
|
{
|
2021-04-10 23:33:54 +00:00
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_FLUSH_DISTRIBUTED, table_id);
|
2019-04-22 15:11:16 +00:00
|
|
|
|
2021-04-10 23:33:54 +00:00
|
|
|
if (auto * storage_distributed = dynamic_cast<StorageDistributed *>(DatabaseCatalog::instance().getTable(table_id, getContext()).get()))
|
|
|
|
storage_distributed->flushClusterNodesAllData(getContext());
|
2019-04-22 15:11:16 +00:00
|
|
|
else
|
2020-03-04 20:29:52 +00:00
|
|
|
throw Exception("Table " + table_id.getNameForLogs() + " is not distributed", ErrorCodes::BAD_ARGUMENTS);
|
2018-05-21 13:49:54 +00:00
|
|
|
}
|
|
|
|
|
2021-04-20 19:23:54 +00:00
|
|
|
void InterpreterSystemQuery::restartDisk(String & name)
|
|
|
|
{
|
|
|
|
getContext()->checkAccess(AccessType::SYSTEM_RESTART_DISK);
|
|
|
|
|
|
|
|
auto disk = getContext()->getDisk(name);
|
|
|
|
|
|
|
|
if (DiskRestartProxy * restart_proxy = dynamic_cast<DiskRestartProxy*>(disk.get()))
|
2022-05-13 15:00:47 +00:00
|
|
|
restart_proxy->restart(getContext());
|
2021-04-20 19:23:54 +00:00
|
|
|
else
|
|
|
|
throw Exception("Disk " + name + " doesn't have possibility to restart", ErrorCodes::BAD_ARGUMENTS);
|
|
|
|
}
|
|
|
|
|
2018-05-21 13:49:54 +00:00
|
|
|
|
2020-01-24 16:20:36 +00:00
|
|
|
AccessRightsElements InterpreterSystemQuery::getRequiredAccessForDDLOnCluster() const
|
|
|
|
{
|
|
|
|
const auto & query = query_ptr->as<const ASTSystemQuery &>();
|
|
|
|
using Type = ASTSystemQuery::Type;
|
|
|
|
AccessRightsElements required_access;
|
2021-06-20 08:24:43 +00:00
|
|
|
|
2020-01-24 16:20:36 +00:00
|
|
|
switch (query.type)
|
|
|
|
{
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::SHUTDOWN:
|
|
|
|
case Type::KILL:
|
2021-01-07 19:19:33 +00:00
|
|
|
case Type::SUSPEND:
|
2020-01-24 16:20:36 +00:00
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_SHUTDOWN);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::DROP_DNS_CACHE:
|
|
|
|
case Type::DROP_MARK_CACHE:
|
|
|
|
case Type::DROP_MMAP_CACHE:
|
2020-01-24 16:20:36 +00:00
|
|
|
#if USE_EMBEDDED_COMPILER
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::DROP_COMPILED_EXPRESSION_CACHE:
|
2020-01-24 16:20:36 +00:00
|
|
|
#endif
|
|
|
|
case Type::DROP_UNCOMPRESSED_CACHE:
|
2021-08-21 17:27:22 +00:00
|
|
|
case Type::DROP_INDEX_MARK_CACHE:
|
|
|
|
case Type::DROP_INDEX_UNCOMPRESSED_CACHE:
|
2022-03-30 11:47:44 +00:00
|
|
|
case Type::DROP_FILESYSTEM_CACHE:
|
2022-08-05 16:20:15 +00:00
|
|
|
case Type::DROP_SCHEMA_CACHE:
|
2020-01-24 16:20:36 +00:00
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_DROP_CACHE);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::RELOAD_DICTIONARY:
|
|
|
|
case Type::RELOAD_DICTIONARIES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::RELOAD_EMBEDDED_DICTIONARIES:
|
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_DICTIONARY);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::RELOAD_MODEL:
|
2021-04-16 09:56:40 +00:00
|
|
|
case Type::RELOAD_MODELS:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_MODEL);
|
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::RELOAD_FUNCTION:
|
2021-09-17 13:04:44 +00:00
|
|
|
case Type::RELOAD_FUNCTIONS:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_FUNCTION);
|
|
|
|
break;
|
|
|
|
}
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::RELOAD_CONFIG:
|
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_CONFIG);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-09-16 11:19:39 +00:00
|
|
|
case Type::RELOAD_USERS:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_USERS);
|
|
|
|
break;
|
|
|
|
}
|
2020-11-30 14:30:55 +00:00
|
|
|
case Type::RELOAD_SYMBOLS:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RELOAD_SYMBOLS);
|
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_MERGES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_MERGES:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_MERGES);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_MERGES, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_TTL_MERGES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_TTL_MERGES:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_TTL_MERGES);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_TTL_MERGES, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_MOVES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_MOVES:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_MOVES);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_MOVES, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_FETCHES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_FETCHES:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_FETCHES);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_FETCHES, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_DISTRIBUTED_SENDS:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_DISTRIBUTED_SENDS:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_DISTRIBUTED_SENDS);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_DISTRIBUTED_SENDS, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_REPLICATED_SENDS:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_REPLICATED_SENDS:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_REPLICATED_SENDS);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_REPLICATED_SENDS, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_REPLICATION_QUEUES:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::START_REPLICATION_QUEUES:
|
|
|
|
{
|
2021-11-11 13:28:18 +00:00
|
|
|
if (!query.table)
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_REPLICATION_QUEUES);
|
2020-01-24 16:20:36 +00:00
|
|
|
else
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_REPLICATION_QUEUES, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2020-05-17 12:44:22 +00:00
|
|
|
case Type::DROP_REPLICA:
|
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_DROP_REPLICA, query.getDatabase(), query.getTable());
|
2020-05-17 12:44:22 +00:00
|
|
|
break;
|
|
|
|
}
|
2021-06-20 08:24:43 +00:00
|
|
|
case Type::RESTORE_REPLICA:
|
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RESTORE_REPLICA, query.getDatabase(), query.getTable());
|
2021-06-20 08:24:43 +00:00
|
|
|
break;
|
|
|
|
}
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::SYNC_REPLICA:
|
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_SYNC_REPLICA, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case Type::RESTART_REPLICA:
|
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RESTART_REPLICA, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case Type::RESTART_REPLICAS:
|
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RESTART_REPLICA);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2022-05-01 13:40:18 +00:00
|
|
|
case Type::SYNC_DATABASE_REPLICA:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_SYNC_DATABASE_REPLICA, query.getDatabase());
|
|
|
|
break;
|
|
|
|
}
|
2022-05-25 20:20:13 +00:00
|
|
|
case Type::SYNC_TRANSACTION_LOG:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_SYNC_TRANSACTION_LOG);
|
|
|
|
break;
|
|
|
|
}
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::FLUSH_DISTRIBUTED:
|
|
|
|
{
|
2021-10-12 18:11:00 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_FLUSH_DISTRIBUTED, query.getDatabase(), query.getTable());
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case Type::FLUSH_LOGS:
|
|
|
|
{
|
2020-04-03 11:54:50 +00:00
|
|
|
required_access.emplace_back(AccessType::SYSTEM_FLUSH_LOGS);
|
2020-01-24 16:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2021-04-20 19:23:54 +00:00
|
|
|
case Type::RESTART_DISK:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_RESTART_DISK);
|
|
|
|
break;
|
|
|
|
}
|
2022-06-08 12:09:59 +00:00
|
|
|
case Type::UNFREEZE:
|
|
|
|
{
|
|
|
|
required_access.emplace_back(AccessType::SYSTEM_UNFREEZE);
|
|
|
|
break;
|
|
|
|
}
|
2022-04-19 15:51:23 +00:00
|
|
|
case Type::STOP_LISTEN_QUERIES:
|
|
|
|
case Type::START_LISTEN_QUERIES:
|
|
|
|
case Type::STOP_THREAD_FUZZER:
|
|
|
|
case Type::START_THREAD_FUZZER:
|
|
|
|
case Type::UNKNOWN:
|
2020-01-24 16:20:36 +00:00
|
|
|
case Type::END: break;
|
|
|
|
}
|
|
|
|
return required_access;
|
|
|
|
}
|
|
|
|
|
2021-04-10 23:33:54 +00:00
|
|
|
void InterpreterSystemQuery::extendQueryLogElemImpl(QueryLogElement & elem, const ASTPtr & /*ast*/, ContextPtr) const
|
2021-02-23 10:30:15 +00:00
|
|
|
{
|
|
|
|
elem.query_kind = "System";
|
|
|
|
}
|
|
|
|
|
2017-08-30 21:25:44 +00:00
|
|
|
}
|