ClickHouse/src/Storages/StorageKeeperMap.cpp

694 lines
21 KiB
C++
Raw Normal View History

2022-07-27 13:20:45 +00:00
#include <Storages/StorageKeeperMap.h>
2022-07-26 09:08:55 +00:00
#include <Columns/ColumnString.h>
2022-07-27 13:20:45 +00:00
#include <Core/NamesAndTypes.h>
2022-07-26 09:08:55 +00:00
#include <DataTypes/DataTypeString.h>
2022-07-27 13:20:45 +00:00
#include <Interpreters/evaluateConstantExpression.h>
#include <Parsers/ASTCreateQuery.h>
#include <Parsers/ASTExpressionList.h>
#include <Parsers/ASTFunction.h>
#include <Parsers/ASTIdentifier.h>
#include <Parsers/ASTSelectQuery.h>
2022-07-26 09:08:55 +00:00
#include <Processors/ISource.h>
#include <Processors/Sinks/SinkToStorage.h>
2022-07-27 13:20:45 +00:00
#include <Storages/ColumnsDescription.h>
#include <Storages/KVStorageUtils.h>
2022-07-26 09:08:55 +00:00
#include <Storages/StorageFactory.h>
2022-07-27 13:20:45 +00:00
#include <Storages/StorageInMemoryMetadata.h>
#include <Storages/checkAndGetLiteralArgument.h>
2022-08-23 13:15:31 +00:00
#include "Common/Exception.h"
2022-07-26 09:08:55 +00:00
#include <Common/ZooKeeper/KeeperException.h>
#include <Common/ZooKeeper/Types.h>
2022-08-23 13:15:31 +00:00
#include <Common/ZooKeeper/ZooKeeper.h>
2022-07-27 13:20:45 +00:00
#include <Common/ZooKeeper/ZooKeeperConstants.h>
#include <boost/algorithm/string/classification.hpp>
#include <Poco/Base64Decoder.h>
#include <Poco/Base64Encoder.h>
#include <Poco/MemoryStream.h>
#include <Poco/StreamCopier.h>
2022-07-26 09:08:55 +00:00
namespace DB
{
namespace ErrorCodes
{
2022-08-03 13:34:14 +00:00
extern const int NUMBER_OF_ARGUMENTS_DOESNT_MATCH;
extern const int BAD_ARGUMENTS;
extern const int KEEPER_EXCEPTION;
2022-08-03 14:02:14 +00:00
extern const int LOGICAL_ERROR;
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
namespace
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
std::string base64Encode(const std::string & decoded)
{
std::ostringstream ostr; // STYLE_CHECK_ALLOW_STD_STRING_STREAM
ostr.exceptions(std::ios::failbit);
Poco::Base64Encoder encoder(ostr, Poco::BASE64_URL_ENCODING);
encoder.rdbuf()->setLineLength(0);
encoder << decoded;
encoder.close();
return ostr.str();
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
std::string base64Decode(const std::string & encoded)
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
std::string decoded;
Poco::MemoryInputStream istr(encoded.data(), encoded.size());
Poco::Base64Decoder decoder(istr, Poco::BASE64_URL_ENCODING);
Poco::StreamCopier::copyToString(decoder, decoded);
return decoded;
}
2022-08-03 13:34:14 +00:00
constexpr std::string_view default_host = "default";
2022-08-08 09:43:29 +00:00
std::string_view getBaseName(const std::string_view path)
{
auto last_slash = path.find_last_of('/');
if (last_slash == std::string_view::npos)
throw Exception(DB::ErrorCodes::LOGICAL_ERROR, "Failed to get basename of path '{}'", path);
return path.substr(last_slash + 1);
}
struct ZooKeeperLock
{
explicit ZooKeeperLock(std::string lock_path_, zkutil::ZooKeeperPtr client_, bool defer_lock = false)
2022-08-08 09:43:29 +00:00
: lock_path(std::move(lock_path_)), client(std::move(client_))
{
if (!defer_lock)
lock();
2022-08-08 09:43:29 +00:00
}
~ZooKeeperLock()
{
if (locked)
unlock();
}
void lock()
{
assert(!locked);
sequence_path = client->create(std::filesystem::path(lock_path) / "lock-", "", zkutil::CreateMode::EphemeralSequential);
auto node_name = getBaseName(sequence_path);
while (true)
{
auto children = client->getChildren(lock_path);
assert(!children.empty());
::sort(children.begin(), children.end());
auto node_it = std::find(children.begin(), children.end(), node_name);
if (node_it == children.begin())
{
locked = true;
return;
}
client->waitForDisappear(*(node_it - 1));
}
}
void unlock()
{
assert(locked);
client->tryRemove(sequence_path);
2022-08-08 09:43:29 +00:00
}
2022-08-23 13:15:31 +00:00
// release the ownership and return the path
// for the lock
std::string release()
{
assert(locked);
locked = false;
return std::move(sequence_path);
}
2022-08-08 09:43:29 +00:00
private:
std::string lock_path;
std::string sequence_path;
zkutil::ZooKeeperPtr client;
bool locked{false};
};
2022-07-26 09:08:55 +00:00
}
class StorageKeeperMapSink : public SinkToStorage
{
StorageKeeperMap & storage;
std::unordered_map<std::string, std::string> new_values;
2022-07-27 13:20:45 +00:00
size_t primary_key_pos;
2022-07-26 09:08:55 +00:00
public:
2022-07-27 13:20:45 +00:00
StorageKeeperMapSink(StorageKeeperMap & storage_, const StorageMetadataPtr & metadata_snapshot)
: SinkToStorage(metadata_snapshot->getSampleBlock()), storage(storage_)
{
auto primary_key = storage.getPrimaryKey();
assert(primary_key.size() == 1);
primary_key_pos = getHeader().getPositionByName(storage.getPrimaryKey()[0]);
}
2022-07-26 09:08:55 +00:00
std::string getName() const override { return "StorageKeeperMapSink"; }
void consume(Chunk chunk) override
{
2022-07-27 13:20:45 +00:00
auto rows = chunk.getNumRows();
auto block = getHeader().cloneWithColumns(chunk.detachColumns());
WriteBufferFromOwnString wb_key;
WriteBufferFromOwnString wb_value;
2022-07-26 09:08:55 +00:00
for (size_t i = 0; i < rows; ++i)
{
2022-07-27 13:20:45 +00:00
wb_key.restart();
wb_value.restart();
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
size_t idx = 0;
for (const auto & elem : block)
{
elem.type->getDefaultSerialization()->serializeBinary(*elem.column, i, idx == primary_key_pos ? wb_key : wb_value);
++idx;
}
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
auto key = base64Encode(wb_key.str());
new_values[std::move(key)] = std::move(wb_value.str());
2022-07-26 09:08:55 +00:00
}
}
void onFinish() override
{
auto & zookeeper = storage.getClient();
2022-08-08 09:43:29 +00:00
2022-07-26 09:08:55 +00:00
Coordination::Requests requests;
2022-08-08 09:43:29 +00:00
2022-08-23 13:15:31 +00:00
for (const auto & [key, value] : new_values)
2022-08-08 09:43:29 +00:00
{
2022-08-23 13:15:31 +00:00
auto path = storage.fullPathForKey(key);
2022-08-08 09:43:29 +00:00
2022-08-23 13:15:31 +00:00
if (zookeeper->exists(path))
requests.push_back(zkutil::makeSetRequest(path, value, -1));
else
requests.push_back(zkutil::makeCreateRequest(path, value, zkutil::CreateMode::Persistent));
2022-08-08 09:43:29 +00:00
}
2022-07-26 09:08:55 +00:00
zookeeper->multi(requests);
}
};
2022-07-27 13:20:45 +00:00
template <typename KeyContainer>
2022-07-26 09:08:55 +00:00
class StorageKeeperMapSource : public ISource
{
2022-07-27 13:20:45 +00:00
const StorageKeeperMap & storage;
2022-07-26 09:08:55 +00:00
size_t max_block_size;
2022-07-27 13:20:45 +00:00
using KeyContainerPtr = std::shared_ptr<KeyContainer>;
KeyContainerPtr container;
using KeyContainerIter = typename KeyContainer::const_iterator;
KeyContainerIter it;
KeyContainerIter end;
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
public:
StorageKeeperMapSource(
const StorageKeeperMap & storage_,
const Block & header,
size_t max_block_size_,
KeyContainerPtr container_,
KeyContainerIter begin_,
KeyContainerIter end_)
: ISource(header), storage(storage_), max_block_size(max_block_size_), container(std::move(container_)), it(begin_), end(end_)
{
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
std::string getName() const override { return "StorageKeeperMapSource"; }
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
Chunk generate() override
{
if (it >= end)
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
it = {};
return {};
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
using KeyType = typename KeyContainer::value_type;
if constexpr (std::same_as<KeyType, Field>)
{
const auto & sample_block = getPort().getHeader();
const auto & key_column_type = sample_block.getByName(storage.getPrimaryKey().at(0)).type;
auto raw_keys = serializeKeysToRawString(it, end, key_column_type, max_block_size);
for (auto & raw_key : raw_keys)
raw_key = base64Encode(raw_key);
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
return storage.getBySerializedKeys(raw_keys, nullptr);
}
else
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
size_t elem_num = std::min(max_block_size, static_cast<size_t>(end - it));
auto chunk = storage.getBySerializedKeys(std::span{it, it + elem_num}, nullptr);
it += elem_num;
return chunk;
2022-07-26 09:08:55 +00:00
}
}
2022-07-27 13:20:45 +00:00
};
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
StorageKeeperMap::StorageKeeperMap(
2022-08-23 13:15:31 +00:00
ContextPtr context_,
2022-07-27 13:20:45 +00:00
const StorageID & table_id,
const StorageInMemoryMetadata & metadata,
bool attach,
2022-07-27 13:20:45 +00:00
std::string_view primary_key_,
2022-08-23 13:15:31 +00:00
const std::string & root_path_,
bool create_missing_root_path)
: IStorage(table_id)
, WithContext(context_->getGlobalContext())
, root_path(zkutil::extractZooKeeperPath(root_path_, false))
, primary_key(primary_key_)
, zookeeper_name(zkutil::extractZooKeeperName(root_path_))
, log(&Poco::Logger::get("StorageKeeperMap"))
2022-07-27 13:20:45 +00:00
{
setInMemoryMetadata(metadata);
2022-07-26 09:08:55 +00:00
2022-08-10 08:52:36 +00:00
if (root_path.empty())
throw Exception("root_path should not be empty", ErrorCodes::BAD_ARGUMENTS);
if (!root_path.starts_with('/'))
throw Exception("root_path should start with '/'", ErrorCodes::BAD_ARGUMENTS);
2022-07-26 09:08:55 +00:00
2022-08-10 08:52:36 +00:00
std::filesystem::path root_path_fs{root_path};
2022-08-23 13:15:31 +00:00
auto metadata_path_fs = root_path_fs / "ch_metadata";
2022-08-10 08:52:36 +00:00
metadata_path = metadata_path_fs;
lock_path = metadata_path_fs / "lock";
2022-08-23 13:15:31 +00:00
tables_path = metadata_path_fs / "tables";
dropped_path = metadata_path_fs / "dropped";
2022-08-10 08:52:36 +00:00
if (attach)
{
2022-08-23 13:15:31 +00:00
checkTable<false>();
return;
}
2022-08-23 13:15:31 +00:00
auto client = getClient();
2022-08-10 08:52:36 +00:00
if (root_path != "/" && !client->exists(root_path))
2022-07-27 13:20:45 +00:00
{
2022-08-03 13:34:14 +00:00
if (!create_missing_root_path)
2022-07-26 09:08:55 +00:00
{
2022-08-03 13:34:14 +00:00
throw Exception(
ErrorCodes::BAD_ARGUMENTS,
"Path '{}' doesn't exist. Please create it or set 'create_missing_root_path' to true'",
2022-08-10 08:52:36 +00:00
root_path_);
2022-08-03 13:34:14 +00:00
}
else
{
2022-08-10 08:52:36 +00:00
LOG_TRACE(log, "Creating root path {}", root_path);
2022-08-03 13:34:14 +00:00
size_t cur_pos = 0;
do
{
size_t search_start = cur_pos + 1;
2022-08-10 08:52:36 +00:00
cur_pos = root_path.find('/', search_start);
2022-08-03 13:34:14 +00:00
if (search_start == cur_pos)
2022-08-10 08:52:36 +00:00
throw Exception("root_path is invalid, contains subsequent '/'", ErrorCodes::BAD_ARGUMENTS);
2022-08-03 13:34:14 +00:00
2022-08-10 08:52:36 +00:00
auto path = root_path.substr(0, cur_pos);
2022-08-08 09:43:29 +00:00
client->createIfNotExists(path, "");
2022-08-03 13:34:14 +00:00
} while (cur_pos != std::string_view::npos);
}
2022-07-26 09:08:55 +00:00
}
2022-08-08 09:43:29 +00:00
2022-08-23 13:15:31 +00:00
ZooKeeperLock lock(lock_path, client, true);
bool locked = false;
try
{
2022-08-23 13:15:31 +00:00
lock.lock();
locked = true;
}
catch (const Coordination::Exception & e)
{
if (e.code != Coordination::Error::ZNONODE)
throw;
}
2022-08-23 13:15:31 +00:00
{
Coordination::Stat stats;
auto exists = client->exists(root_path, &stats);
if (!exists)
throw Exception(DB::ErrorCodes::LOGICAL_ERROR, "Path '{}' should exist, but was deleted from another source", root_path);
}
2022-08-08 09:43:29 +00:00
2022-08-23 13:15:31 +00:00
const auto set_tables_num = [&]
{
std::string tables_num_str;
auto exists = client->tryGet(tables_path, tables_num_str);
if (!exists)
{
client->create(tables_path, toString(1), zkutil::CreateMode::Persistent);
}
else
{
uint64_t tables_num = parse<uint64_t>(tables_num_str);
client->set(tables_path, toString(tables_num + 1), zkutil::CreateMode::Persistent);
}
};
// we have metadata and lock nodes, because they can't be deleted with the lock acquired
if (locked)
{
if (client->exists(dropped_path))
{
client->removeChildrenRecursive(root_path, getBaseName(metadata_path));
client->remove(dropped_path);
}
set_tables_num();
return;
}
client->createIfNotExists(metadata_path, "");
client->createIfNotExists(lock_path, "");
lock.lock();
set_tables_num();
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
2022-07-26 09:08:55 +00:00
Pipe StorageKeeperMap::read(
const Names & column_names,
2022-07-27 13:20:45 +00:00
const StorageSnapshotPtr & storage_snapshot,
2022-07-26 09:08:55 +00:00
SelectQueryInfo & query_info,
2022-08-23 13:15:31 +00:00
ContextPtr context_,
2022-07-26 09:08:55 +00:00
QueryProcessingStage::Enum /*processed_stage*/,
size_t max_block_size,
2022-07-27 13:20:45 +00:00
unsigned num_streams)
2022-07-26 09:08:55 +00:00
{
2022-08-23 13:15:31 +00:00
checkTable<true>();
2022-07-27 13:20:45 +00:00
storage_snapshot->check(column_names);
FieldVectorPtr filtered_keys;
bool all_scan;
Block sample_block = storage_snapshot->metadata->getSampleBlock();
auto primary_key_type = sample_block.getByName(primary_key).type;
2022-08-23 13:15:31 +00:00
std::tie(filtered_keys, all_scan) = getFilterKeys(primary_key, primary_key_type, query_info, context_);
2022-07-27 13:20:45 +00:00
const auto process_keys = [&]<typename KeyContainerPtr>(KeyContainerPtr keys) -> Pipe
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
if (keys->empty())
return {};
::sort(keys->begin(), keys->end());
keys->erase(std::unique(keys->begin(), keys->end()), keys->end());
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
Pipes pipes;
2022-07-26 09:08:55 +00:00
2022-07-27 13:20:45 +00:00
size_t num_keys = keys->size();
size_t num_threads = std::min<size_t>(num_streams, keys->size());
assert(num_keys <= std::numeric_limits<uint32_t>::max());
assert(num_threads <= std::numeric_limits<uint32_t>::max());
for (size_t thread_idx = 0; thread_idx < num_threads; ++thread_idx)
{
size_t begin = num_keys * thread_idx / num_threads;
size_t end = num_keys * (thread_idx + 1) / num_threads;
using KeyContainer = typename KeyContainerPtr::element_type;
pipes.emplace_back(std::make_shared<StorageKeeperMapSource<KeyContainer>>(
*this, sample_block, max_block_size, keys, keys->begin() + begin, keys->begin() + end));
}
return Pipe::unitePipes(std::move(pipes));
};
auto & client = getClient();
if (all_scan)
2022-08-10 08:52:36 +00:00
return process_keys(std::make_shared<std::vector<std::string>>(client->getChildren(root_path)));
2022-07-27 13:20:45 +00:00
return process_keys(std::move(filtered_keys));
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
SinkToStoragePtr StorageKeeperMap::write(const ASTPtr & /*query*/, const StorageMetadataPtr & metadata_snapshot, ContextPtr /*context*/)
2022-07-26 09:08:55 +00:00
{
2022-08-23 13:15:31 +00:00
checkTable<true>();
2022-07-27 13:20:45 +00:00
return std::make_shared<StorageKeeperMapSink>(*this, metadata_snapshot);
2022-07-26 09:08:55 +00:00
}
2022-08-23 13:15:31 +00:00
void StorageKeeperMap::truncate(const ASTPtr &, const StorageMetadataPtr &, ContextPtr, TableExclusiveLockHolder &)
{
2022-08-23 13:15:31 +00:00
checkTable<true>();
auto client = getClient();
2022-08-23 13:15:31 +00:00
ZooKeeperLock keeper_lock(lock_path, client);
client->removeChildrenRecursive(root_path, getBaseName(metadata_path));
}
void StorageKeeperMap::drop()
{
2022-08-23 13:15:31 +00:00
checkTable<true>();
auto client = getClient();
2022-08-23 13:15:31 +00:00
ZooKeeperLock lock(lock_path, client);
auto tables_num_str = client->get(tables_path);
auto tables_num = parse<uint64_t>(tables_num_str);
--tables_num;
if (tables_num > 0)
{
client->set(tables_path, toString(tables_num));
return;
}
client->create(dropped_path, "", zkutil::CreateMode::Persistent);
client->removeChildrenRecursive(root_path, getBaseName(metadata_path));
Coordination::Requests requests;
// we need to release lock and delete everything at the same time
// so create doesn't take a lock while delete is being run
auto current_lock_path = lock.release();
requests.push_back(zkutil::makeRemoveRequest(current_lock_path, -1));
requests.push_back(zkutil::makeRemoveRequest(lock_path, -1));
requests.push_back(zkutil::makeRemoveRequest(tables_path, -1));
requests.push_back(zkutil::makeRemoveRequest(dropped_path, -1));
requests.push_back(zkutil::makeRemoveRequest(metadata_path, -1));
client->multi(requests);
}
2022-07-27 13:20:45 +00:00
zkutil::ZooKeeperPtr & StorageKeeperMap::getClient() const
2022-07-26 09:08:55 +00:00
{
2022-08-23 13:15:31 +00:00
std::lock_guard lock{zookeeper_mutex};
if (!zookeeper_client || zookeeper_client->expired())
2022-08-03 13:34:14 +00:00
{
2022-08-23 13:15:31 +00:00
zookeeper_client = nullptr;
if (zookeeper_name == "default")
zookeeper_client = getContext()->getZooKeeper();
else
zookeeper_client = getContext()->getAuxiliaryZooKeeper(zookeeper_name);
2022-08-03 13:34:14 +00:00
}
2022-07-26 09:08:55 +00:00
return zookeeper_client;
}
const std::string & StorageKeeperMap::rootKeeperPath() const
{
2022-08-10 08:52:36 +00:00
return root_path;
2022-07-26 09:08:55 +00:00
}
2022-07-27 13:20:45 +00:00
std::string StorageKeeperMap::fullPathForKey(const std::string_view key) const
{
2022-08-10 08:52:36 +00:00
return fmt::format("{}/{}", root_path, key);
2022-07-27 13:20:45 +00:00
}
2022-08-08 09:43:29 +00:00
const std::string & StorageKeeperMap::lockPath() const
{
return lock_path;
}
2022-08-23 13:15:31 +00:00
std::optional<bool> StorageKeeperMap::isTableValid() const
2022-08-08 09:43:29 +00:00
{
2022-08-23 13:15:31 +00:00
std::lock_guard lock{init_mutex};
if (table_is_valid.has_value())
return *table_is_valid;
try
{
// validate all metadata nodes are present
Coordination::Requests requests;
requests.push_back(zkutil::makeCheckRequest(root_path, -1));
requests.push_back(zkutil::makeCheckRequest(metadata_path, -1));
requests.push_back(zkutil::makeCheckRequest(lock_path, -1));
requests.push_back(zkutil::makeCheckRequest(tables_path, -1));
Coordination::Responses responses;
auto client = getClient();
auto res = client->tryMulti(requests, responses);
table_is_valid = res == Coordination::Error::ZOK;
}
catch (const Coordination::Exception & e)
{
tryLogCurrentException(log);
std::array retriable_errors{
Coordination::Error::ZCONNECTIONLOSS, Coordination::Error::ZSESSIONEXPIRED, Coordination::Error::ZOPERATIONTIMEOUT};
bool retriable_error
= std::any_of(retriable_errors.begin(), retriable_errors.end(), [&](const auto error) { return error == e.code; });
if (!retriable_error)
table_is_valid = false;
}
catch (const Exception &)
{
tryLogCurrentException(log);
table_is_valid = false;
}
return table_is_valid;
2022-08-08 09:43:29 +00:00
}
Chunk StorageKeeperMap::getByKeys(const ColumnsWithTypeAndName & keys, PaddedPODArray<UInt8> & null_map, const Names &) const
2022-07-27 13:20:45 +00:00
{
if (keys.size() != 1)
throw Exception(ErrorCodes::LOGICAL_ERROR, "StorageKeeperMap supports only one key, got: {}", keys.size());
auto raw_keys = serializeKeysToRawString(keys[0]);
if (raw_keys.size() != keys[0].column->size())
throw DB::Exception(ErrorCodes::LOGICAL_ERROR, "Assertion failed: {} != {}", raw_keys.size(), keys[0].column->size());
return getBySerializedKeys(raw_keys, &null_map);
}
Chunk StorageKeeperMap::getBySerializedKeys(const std::span<const std::string> keys, PaddedPODArray<UInt8> * null_map) const
{
Block sample_block = getInMemoryMetadataPtr()->getSampleBlock();
MutableColumns columns = sample_block.cloneEmptyColumns();
size_t primary_key_pos = getPrimaryKeyPos(sample_block, getPrimaryKey());
if (null_map)
{
null_map->clear();
null_map->resize_fill(keys.size(), 1);
}
auto client = getClient();
std::vector<std::future<Coordination::GetResponse>> values;
values.reserve(keys.size());
for (const auto & key : keys)
{
2022-08-08 09:43:29 +00:00
const auto full_path = fullPathForKey(key);
if (full_path == metadata_path)
{
values.emplace_back();
continue;
}
values.emplace_back(client->asyncTryGet(full_path));
2022-07-27 13:20:45 +00:00
}
auto wait_until = std::chrono::system_clock::now() + std::chrono::milliseconds(Coordination::DEFAULT_OPERATION_TIMEOUT_MS);
for (size_t i = 0; i < keys.size(); ++i)
{
auto & value = values[i];
2022-08-08 09:43:29 +00:00
if (!value.valid())
continue;
2022-07-27 13:20:45 +00:00
if (value.wait_until(wait_until) != std::future_status::ready)
throw DB::Exception(ErrorCodes::LOGICAL_ERROR, "Failed to fetch values: timeout");
auto response = value.get();
Coordination::Error code = response.error;
if (code == Coordination::Error::ZOK)
{
fillColumns(base64Decode(keys[i]), response.data, primary_key_pos, sample_block, columns);
}
else if (code == Coordination::Error::ZNONODE)
{
if (null_map)
{
(*null_map)[i] = 0;
for (size_t col_idx = 0; col_idx < sample_block.columns(); ++col_idx)
columns[col_idx]->insert(sample_block.getByPosition(col_idx).type->getDefault());
}
}
else
{
throw DB::Exception(ErrorCodes::KEEPER_EXCEPTION, "Failed to fetch value: {}", code);
}
}
size_t num_rows = columns.at(0)->size();
return Chunk(std::move(columns), num_rows);
}
Block StorageKeeperMap::getSampleBlock(const Names &) const
{
auto metadata = getInMemoryMetadataPtr();
return metadata ? metadata->getSampleBlock() : Block();
}
2022-07-27 13:20:45 +00:00
namespace
{
2022-08-23 13:15:31 +00:00
StoragePtr create(const StorageFactory::Arguments & args)
{
ASTs & engine_args = args.engine_args;
if (engine_args.empty() || engine_args.size() > 4)
throw Exception(
ErrorCodes::NUMBER_OF_ARGUMENTS_DOESNT_MATCH,
"Storage KeeperMap requires 1-5 arguments:\n"
"root_path: path in the Keeper where the values will be stored (required)\n"
"hosts: comma separated Keeper hosts, set to '{0}' to use the same Keeper as ClickHouse (default: '{0}')\n"
"create_missing_root_path: 1 if the root path should be created if it's missing, otherwise throw exception (default: 1)\n",
"remove_existing_data: true if children inside 'root_path' should be deleted, otherwise throw exception (default: 0)",
default_host);
auto root_path = checkAndGetLiteralArgument<std::string>(engine_args[0], "root_path");
bool create_missing_root_path = true;
if (engine_args.size() > 1)
create_missing_root_path = checkAndGetLiteralArgument<UInt64>(engine_args[1], "create_missing_root_path");
StorageInMemoryMetadata metadata;
metadata.setColumns(args.columns);
metadata.setConstraints(args.constraints);
if (!args.storage_def->primary_key)
throw Exception("StorageKeeperMap requires one column in primary key", ErrorCodes::BAD_ARGUMENTS);
metadata.primary_key = KeyDescription::getKeyFromAST(args.storage_def->primary_key->ptr(), metadata.columns, args.getContext());
auto primary_key_names = metadata.getColumnsRequiredForPrimaryKey();
if (primary_key_names.size() != 1)
throw Exception("StorageKeeperMap requires one column in primary key", ErrorCodes::BAD_ARGUMENTS);
return std::make_shared<StorageKeeperMap>(
args.getContext(), args.table_id, metadata, args.query.attach, primary_key_names[0], root_path, create_missing_root_path);
}
2022-07-27 13:20:45 +00:00
}
2022-07-26 09:08:55 +00:00
void registerStorageKeeperMap(StorageFactory & factory)
{
factory.registerStorage(
"KeeperMap",
2022-07-27 13:20:45 +00:00
create,
2022-07-26 09:08:55 +00:00
{
2022-07-27 13:20:45 +00:00
.supports_sort_order = true,
.supports_parallel_insert = true,
});
2022-07-26 09:08:55 +00:00
}
}