Files
scylladb/fix_system_distributed_tables.py
Avi Kivity fcb8d040e8 treewide: use Software Package Data Exchange (SPDX) license identifiers
Instead of lengthy blurbs, switch to single-line, machine-readable
standardized (https://spdx.dev) license identifiers. The Linux kernel
switched long ago, so there is strong precedent.

Three cases are handled: AGPL-only, Apache-only, and dual licensed.
For the latter case, I chose (AGPL-3.0-or-later and Apache-2.0),
reasoning that our changes are extensive enough to apply our license.

The changes we applied mechanically with a script, except to
licenses/README.md.

Closes #9937
2022-01-18 12:15:18 +01:00

150 lines
4.6 KiB
Python
Executable File

#!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright 2017-present ScyllaDB
#
#
# SPDX-License-Identifier: AGPL-3.0-or-later
#
import argparse
import sys
from cassandra.cluster import Cluster
from cassandra.auth import PlainTextAuthProvider
events_cols = {
'session_id': 'uuid',
'event_id': 'timeuuid',
'activity': 'text',
'source': 'inet',
'source_elapsed': 'int',
'thread': 'text',
'scylla_span_id': 'bigint',
'scylla_parent_id': 'bigint'
}
sessions_cols = {
'session_id': 'uuid',
'command': 'text',
'client': 'inet',
'coordinator': 'inet',
'duration': 'int',
'parameters': 'map<text, text>',
'request': 'text',
'started_at': 'timestamp',
'request_size': 'int',
'response_size': 'int',
'username': 'text'
}
slow_query_log_cols = {
'node_ip': 'inet',
'shard': 'int',
'session_id': 'uuid',
'date': 'timestamp',
'start_time': 'timeuuid',
'command': 'text',
'duration': 'int',
'parameters': 'map<text, text>',
'source_ip': 'inet',
'table_names': 'set<text>',
'username': 'text'
}
traces_tables_defs = {
'events': events_cols,
'sessions': sessions_cols,
'node_slow_log': slow_query_log_cols
}
################################################################################
credentials_cols = {
'username': 'text',
'options': 'map<text, text>',
'salted_hash': 'text'
}
permissions_cols = {
'username': 'text',
'resource': 'text',
'permissions': 'set<text>'
}
users_cols = {
'name': 'text',
'super': 'boolean'
}
auth_tables_defs = {
'credentials': credentials_cols,
'permissions': permissions_cols,
'users': users_cols
}
################################################################################
ks_defs = {
'system_traces': traces_tables_defs,
'system_auth': auth_tables_defs
}
################################################################################
def validate_and_fix(args):
res = True
if args.user:
auth_provider = PlainTextAuthProvider(username=args.user, password=args.password)
cluster = Cluster(auth_provider=auth_provider, contact_points=[args.node], port=args.port)
else:
cluster = Cluster(contact_points=[args.node], port=args.port)
try:
session = cluster.connect()
cluster_meta = session.cluster.metadata
for ks, tables_defs in ks_defs.items():
if ks not in cluster_meta.keyspaces:
print("keyspace {} doesn't exist - skipping".format(ks))
continue
ks_meta = cluster_meta.keyspaces[ks]
for table_name, table_cols in tables_defs.items():
if table_name not in ks_meta.tables:
print("{}.{} doesn't exist - skipping".format(ks, table_name))
continue
print("Adjusting {}.{}".format(ks, table_name))
table_meta = ks_meta.tables[table_name]
for column_name, column_type in table_cols.items():
if column_name in table_meta.columns:
column_meta = table_meta.columns[column_name]
if column_meta.cql_type != column_type:
print("ERROR: {}.{}::{} column has an unexpected column type: expected '{}' found '{}'".format(ks, table_name, column_name, column_type, column_meta.cql_type))
res = False
else:
try:
session.execute("ALTER TABLE {}.{} ADD {} {}".format(ks, table_name, column_name, column_type))
print("{}.{}: added column '{}' of the type '{}'".format(ks, table_name, column_name, column_type))
except Exception:
print("ERROR: {}.{}: failed to add column '{}' with type '{}': {}".format(ks, table_name, column_name, column_type, sys.exc_info()))
res = False
except Exception:
print("ERROR: {}".format(sys.exc_info()))
res = False
return res
################################################################################
if __name__ == '__main__':
argp = argparse.ArgumentParser(description='Validate distributed system keyspaces')
argp.add_argument('--user', '-u')
argp.add_argument('--password', '-p', default='none')
argp.add_argument('--node', default='127.0.0.1', help='Node to connect to.')
argp.add_argument('--port', default=9042, help='Port to connect to.', type=int)
args = argp.parse_args()
res = validate_and_fix(args)
if res:
sys.exit(0)
else:
sys.exit(1)