Drop the AGPL license in favor of a source-available license. See the blog post [1] for details. [1] https://www.scylladb.com/2024/12/18/why-were-moving-to-a-source-available-license/
150 lines
4.6 KiB
Python
Executable File
150 lines
4.6 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright 2017-present ScyllaDB
|
|
#
|
|
#
|
|
# SPDX-License-Identifier: LicenseRef-ScyllaDB-Source-Available-1.0
|
|
#
|
|
import argparse
|
|
import sys
|
|
|
|
from cassandra.cluster import Cluster
|
|
from cassandra.auth import PlainTextAuthProvider
|
|
|
|
events_cols = {
|
|
'session_id': 'uuid',
|
|
'event_id': 'timeuuid',
|
|
'activity': 'text',
|
|
'source': 'inet',
|
|
'source_elapsed': 'int',
|
|
'thread': 'text',
|
|
'scylla_span_id': 'bigint',
|
|
'scylla_parent_id': 'bigint'
|
|
}
|
|
|
|
sessions_cols = {
|
|
'session_id': 'uuid',
|
|
'command': 'text',
|
|
'client': 'inet',
|
|
'coordinator': 'inet',
|
|
'duration': 'int',
|
|
'parameters': 'map<text, text>',
|
|
'request': 'text',
|
|
'started_at': 'timestamp',
|
|
'request_size': 'int',
|
|
'response_size': 'int',
|
|
'username': 'text'
|
|
}
|
|
|
|
slow_query_log_cols = {
|
|
'node_ip': 'inet',
|
|
'shard': 'int',
|
|
'session_id': 'uuid',
|
|
'date': 'timestamp',
|
|
'start_time': 'timeuuid',
|
|
'command': 'text',
|
|
'duration': 'int',
|
|
'parameters': 'map<text, text>',
|
|
'source_ip': 'inet',
|
|
'table_names': 'set<text>',
|
|
'username': 'text'
|
|
}
|
|
|
|
traces_tables_defs = {
|
|
'events': events_cols,
|
|
'sessions': sessions_cols,
|
|
'node_slow_log': slow_query_log_cols
|
|
}
|
|
################################################################################
|
|
credentials_cols = {
|
|
'username': 'text',
|
|
'options': 'map<text, text>',
|
|
'salted_hash': 'text'
|
|
}
|
|
|
|
permissions_cols = {
|
|
'username': 'text',
|
|
'resource': 'text',
|
|
'permissions': 'set<text>'
|
|
}
|
|
|
|
users_cols = {
|
|
'name': 'text',
|
|
'super': 'boolean'
|
|
}
|
|
|
|
auth_tables_defs = {
|
|
'credentials': credentials_cols,
|
|
'permissions': permissions_cols,
|
|
'users': users_cols
|
|
}
|
|
################################################################################
|
|
ks_defs = {
|
|
'system_traces': traces_tables_defs,
|
|
'system_auth': auth_tables_defs
|
|
}
|
|
################################################################################
|
|
|
|
|
|
def validate_and_fix(args):
|
|
res = True
|
|
if args.user:
|
|
auth_provider = PlainTextAuthProvider(username=args.user, password=args.password)
|
|
cluster = Cluster(auth_provider=auth_provider, contact_points=[args.node], port=args.port)
|
|
else:
|
|
cluster = Cluster(contact_points=[args.node], port=args.port)
|
|
|
|
try:
|
|
session = cluster.connect()
|
|
cluster_meta = session.cluster.metadata
|
|
for ks, tables_defs in ks_defs.items():
|
|
if ks not in cluster_meta.keyspaces:
|
|
print("keyspace {} doesn't exist - skipping".format(ks))
|
|
continue
|
|
|
|
ks_meta = cluster_meta.keyspaces[ks]
|
|
for table_name, table_cols in tables_defs.items():
|
|
|
|
if table_name not in ks_meta.tables:
|
|
print("{}.{} doesn't exist - skipping".format(ks, table_name))
|
|
continue
|
|
|
|
print("Adjusting {}.{}".format(ks, table_name))
|
|
|
|
table_meta = ks_meta.tables[table_name]
|
|
for column_name, column_type in table_cols.items():
|
|
if column_name in table_meta.columns:
|
|
column_meta = table_meta.columns[column_name]
|
|
if column_meta.cql_type != column_type:
|
|
print("ERROR: {}.{}::{} column has an unexpected column type: expected '{}' found '{}'".format(ks, table_name, column_name, column_type, column_meta.cql_type))
|
|
res = False
|
|
else:
|
|
try:
|
|
session.execute("ALTER TABLE {}.{} ADD {} {}".format(ks, table_name, column_name, column_type))
|
|
print("{}.{}: added column '{}' of the type '{}'".format(ks, table_name, column_name, column_type))
|
|
except Exception:
|
|
print("ERROR: {}.{}: failed to add column '{}' with type '{}': {}".format(ks, table_name, column_name, column_type, sys.exc_info()))
|
|
res = False
|
|
except Exception:
|
|
print("ERROR: {}".format(sys.exc_info()))
|
|
res = False
|
|
|
|
return res
|
|
|
|
|
|
################################################################################
|
|
if __name__ == '__main__':
|
|
argp = argparse.ArgumentParser(description='Validate distributed system keyspaces')
|
|
argp.add_argument('--user', '-u')
|
|
argp.add_argument('--password', '-p', default='none')
|
|
argp.add_argument('--node', default='127.0.0.1', help='Node to connect to.')
|
|
argp.add_argument('--port', default=9042, help='Port to connect to.', type=int)
|
|
|
|
args = argp.parse_args()
|
|
res = validate_and_fix(args)
|
|
if res:
|
|
sys.exit(0)
|
|
else:
|
|
sys.exit(1)
|