[jira] [Commented] (IGNITE-6628) Make possible to rebuild all SQL indexes programmatically with enabled persistence.

2022-05-27 Thread Maxim Muzafarov (Jira)


[ 
https://issues.apache.org/jira/browse/IGNITE-6628?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17543003#comment-17543003
 ] 

Maxim Muzafarov commented on IGNITE-6628:
-

[~ascherbakov] Hello,

It seems the issue described here already resolved, right? IGNITE-14321
Can we close this one?

> Make possible to rebuild all SQL indexes programmatically with enabled 
> persistence.
> ---
>
> Key: IGNITE-6628
> URL: https://issues.apache.org/jira/browse/IGNITE-6628
> Project: Ignite
>  Issue Type: Improvement
>Affects Versions: 2.0
>Reporter: Alexey Scherbakov
>Priority: Major
>
> We have unofficial way for rebuilding indexes, which is called on activation 
> if index.bin is removed from PDS directory.
> Code is located here [1]
> I think it's ok to make it public for several cases: model is changed, index 
> is damaged, etc...
> Also current impl has a bug: CacheEntry in [2] is not touched, polluting heap 
> and leading to OOM.
> [1] 
> org.apache.ignite.internal.processors.cache.persistence.GridCacheDatabaseSharedManager#beforeExchange
> [2] 
> org.apache.ignite.internal.processors.query.h2.IgniteH2Indexing#rebuildIndexesFromHash



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Resolved] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin resolved IGNITE-15241.
---
Resolution: Won't Fix

> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary real impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
> version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
> up to 2.0.202.
> * [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 
> in embedded mode. H2 cannot be externally exposed in embedded mode. The 
> vulnerability could be exploited on the local machine where Ignite is 
> running. However, this limits the severity a lot.
> * [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> use and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.
>   
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{{}ignite-indexing{}}}) depends on H2 database 
version 1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary real impact analysis considering how Ignite uses H2:
 * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/]
This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
 * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
 * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
 * [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 in 
embedded mode. H2 cannot be externally exposed in embedded mode. The 
vulnerability could be exploited on the local machine where Ignite is running. 
However, this limits the severity a lot.
 * [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
This vulnerability is not applicable to H2 in Ignite since Ignite does not use 
and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary real impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
  This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 in 
embedded mode. H2 cannot be externally exposed in embedded mode. The 
vulnerability could be exploited on the local machine where Ignite is running. 
However, this limits the severity a lot.
* [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
use and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.
  
We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{{}ignite-indexing{}}}) depends on H2 database 
> version 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvede

[jira] [Closed] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin closed IGNITE-15241.
-
Ignite Flags:   (was: Docs Required,Release Notes Required)

> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary real impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
> version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
> up to 2.0.202.
> * [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 
> in embedded mode. H2 cannot be externally exposed in embedded mode. The 
> vulnerability could be exploited on the local machine where Ignite is 
> running. However, this limits the severity a lot.
> * [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> use and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.
>   
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


[ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17542992#comment-17542992
 ] 

Alexey Kukushkin commented on IGNITE-15241:
---

The [H2's PR 2227|https://github.com/h2database/h2database/pull/2227] really 
makes it impossible to upgrade to a newer H2 version where all the 
vulnerabilities are addressed.

I see the following options to address the problem:
 # None of the vulnerabilities is really applicable to H2 in Apache Ignite due 
to specifics of how Ignite uses H2. See the impact analysis in the description 
of this JIRA.
This can be used as a justification for appropriate team (DevOps, security) in 
the organization to add the H2 modules used by Ignite to the list of exceptions 
of the security vulnerabilities scanner.
 # H2 module shading: rename the H2 module group or name and replace the 
default H2 with the new one. This could be done manually or using the [Apache 
Maven Shade Plugin|https://maven.apache.org/plugins/maven-shade-plugin/]. There 
is not guarantee that specific security vulnerabilities scanner will not detect 
such a trick but most likely it will not and the scan would be clean.
 # [Calcite-based SQL 
Engine|https://ignite.apache.org/docs/latest/SQL/sql-calcite] was added in 
Ignite 2.13. This is an alternative to H2 and H2 could be excluded if the 
Calcite-based engine is configured. The Calcite engine is in beta in release 
2.13 and the community wants to announce it as production ready in release 2.14 
or 2.15. However, there is no guarantee about that and the release dates are 
not known at the moment of writing this comment.
However, some application development teams may consider trying the Calcite 
engine and it may prove to be stable enough for them, allowing to get rid of 
the H2 dependency.

> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary real impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
> version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
> up to 2.0.202.
> * [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 
> in embedded mode. H2 cannot be externally exposed in embedded mode. The 
> vulnerability could be exploited on the local machine where Ignite is 
> running. However, this limits the severity a lot.
> * [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> use and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.
>   
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary real impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
  This vulnerability is not applicable to H2 in Ignite since Ignite runs H2 in 
embedded mode. H2 cannot be externally exposed in embedded mode. The 
vulnerability could be exploited on the local machine where Ignite is running. 
However, this limits the severity a lot.
* [CVE-2021-42392|https://www.cvedetails.com/cve/CVE-2021-42392/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
use and does not expose the {{org.h2.util.JdbcUtils.getConnection}} method.
  
We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary real impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
  

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary real impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cv

[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary real impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
  

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary *real* impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* 

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary real impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
> version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
> up to 2.0.202.
> * [CVE-2022-23221|https://www.cvedetails.com/cve/CVE-2022-23221/]
>   
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, ou

[jira] [Updated] (IGNITE-17002) Indexes rebuild in Maintenance Mode

2022-05-27 Thread Semyon Danilov (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-17002?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Semyon Danilov updated IGNITE-17002:

Release Note: Added control.sh command that schedules index rebuild via the 
maintenance mode

> Indexes rebuild in Maintenance Mode
> ---
>
> Key: IGNITE-17002
> URL: https://issues.apache.org/jira/browse/IGNITE-17002
> Project: Ignite
>  Issue Type: Improvement
>  Components: control.sh, persistence
>Reporter: Sergey Chugunov
>Assignee: Semyon Danilov
>Priority: Major
> Fix For: 2.14
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Now Ignite supports entering Maintenance Mode after index corruption 
> automatically - this was implemented in linked issue.
> But there are use-cases when user needs to request rebuilding specific 
> indexes in MM, so we need to provide a control.sh API to make these requests.
> Also for better integration with monitoring tools it is nice to provide an 
> API to check status of rebuilding task and print message to logs when each 
> task is finished and all tasks are finished.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-17002) Indexes rebuild in Maintenance Mode

2022-05-27 Thread Semyon Danilov (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-17002?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Semyon Danilov updated IGNITE-17002:

Reviewer: Kirill Tkalenko

> Indexes rebuild in Maintenance Mode
> ---
>
> Key: IGNITE-17002
> URL: https://issues.apache.org/jira/browse/IGNITE-17002
> Project: Ignite
>  Issue Type: Improvement
>  Components: control.sh, persistence
>Reporter: Sergey Chugunov
>Assignee: Semyon Danilov
>Priority: Major
> Fix For: 2.14
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Now Ignite supports entering Maintenance Mode after index corruption 
> automatically - this was implemented in linked issue.
> But there are use-cases when user needs to request rebuilding specific 
> indexes in MM, so we need to provide a control.sh API to make these requests.
> Also for better integration with monitoring tools it is nice to provide an 
> API to check status of rebuilding task and print message to logs when each 
> task is finished and all tasks are finished.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Assigned] (IGNITE-16962) SQL API: Implement query metadata.

2022-05-27 Thread Andrey Mashenkov (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-16962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrey Mashenkov reassigned IGNITE-16962:
-

Assignee: Andrey Mashenkov

> SQL API: Implement query metadata.
> --
>
> Key: IGNITE-16962
> URL: https://issues.apache.org/jira/browse/IGNITE-16962
> Project: Ignite
>  Issue Type: Improvement
>  Components: sql
>Reporter: Andrey Mashenkov
>Assignee: Andrey Mashenkov
>Priority: Major
>  Labels: ignite-3
> Fix For: 3.0.0-alpha5
>
>
> Implement query result metadata.
> Add public classes for SQL types (if needed) and map them to Calcite types.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Created] (IGNITE-17046) Move H2RowComparator logic to the core module

2022-05-27 Thread Aleksey Plekhanov (Jira)
Aleksey Plekhanov created IGNITE-17046:
--

 Summary: Move H2RowComparator logic to the core module
 Key: IGNITE-17046
 URL: https://issues.apache.org/jira/browse/IGNITE-17046
 Project: Ignite
  Issue Type: Improvement
Reporter: Aleksey Plekhanov
Assignee: Aleksey Plekhanov


{{H2RowComparator}} depends on H2 classes and can't be used without 
ignite-indexing module. We should move the logic from this comparator to the 
core module providing backward compatibility, to be able to use indexes without 
H2.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (IGNITE-17002) Indexes rebuild in Maintenance Mode

2022-05-27 Thread Ignite TC Bot (Jira)


[ 
https://issues.apache.org/jira/browse/IGNITE-17002?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17542909#comment-17542909
 ] 

Ignite TC Bot commented on IGNITE-17002:


{panel:title=Branch: [pull/10042/head] Base: [master] : No blockers 
found!|borderStyle=dashed|borderColor=#ccc|titleBGColor=#D6F7C1}{panel}
{panel:title=Branch: [pull/10042/head] Base: [master] : New Tests 
(9)|borderStyle=dashed|borderColor=#ccc|titleBGColor=#D6F7C1}
{color:#8b}PDS (Indexing){color} [[tests 
1|https://ci.ignite.apache.org/viewLog.html?buildId=6591334]]
* {color:#013220}IgnitePdsWithIndexingTestSuite: 
MaintenanceRebuildIndexUtilsSelfTest.testConstructFromMap - PASSED{color}

{color:#8b}Control Utility{color} [[tests 
8|https://ci.ignite.apache.org/viewLog.html?buildId=6591342]]
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testCorruptedIndexRebuildCacheWithGroupOnAllNodes
 - PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testErrors - PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testConsecutiveCommandInvocations - 
PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testCorruptedIndexRebuildCacheWithGroup - 
PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testCorruptedIndexRebuildCache - 
PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testCorruptedIndexRebuildCacheOnAllNodes - 
PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
GridCommandHandlerIndexRebuildTest.testRebuild - PASSED{color}
* {color:#013220}IgniteControlUtilityTestSuite: 
CommandHandlerParsingTest.testIndexRebuildWrongArgs - PASSED{color}

{panel}
[TeamCity *--> Run :: All* 
Results|https://ci.ignite.apache.org/viewLog.html?buildId=6590633&buildTypeId=IgniteTests24Java8_RunAll]

> Indexes rebuild in Maintenance Mode
> ---
>
> Key: IGNITE-17002
> URL: https://issues.apache.org/jira/browse/IGNITE-17002
> Project: Ignite
>  Issue Type: Improvement
>  Components: control.sh, persistence
>Reporter: Sergey Chugunov
>Assignee: Semyon Danilov
>Priority: Major
> Fix For: 2.14
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Now Ignite supports entering Maintenance Mode after index corruption 
> automatically - this was implemented in linked issue.
> But there are use-cases when user needs to request rebuilding specific 
> indexes in MM, so we need to provide a control.sh API to make these requests.
> Also for better integration with monitoring tools it is nice to provide an 
> API to check status of rebuilding task and print message to logs when each 
> task is finished and all tasks are finished.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-17045) SQL Cache Replicated - Select doesn't work

2022-05-27 Thread Angelo Pingo (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-17045?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Angelo Pingo updated IGNITE-17045:
--
Description: 
I upgraded the Apache Ignite version from 2.12.0 to 2.13.0 and all my SQL 
Caches configured as Replicated mode does not work correctly (2.12.0 works 
fine). The table is created successfully and the inserts are done without any 
problem, but I can't select the inserted rows.

Queries to reproduce the issue:

CREATE TABLE test_table (
  field1 varchar,
  field2 BOOLEAN,
  PRIMARY KEY (field1)
) WITH "template=Replicated";

INSERT INTO test_table (field1, field2) VALUES
  ('field-value-1', true),
  ('field-value-2', true, ),
  ('field-value-3', false);

SELECT * FROM test_table;

  was:
I upgraded the Apache Ignite from 2.12.0 to 2.13.0 and all my SQL Caches 
configured as Replicated mode does not work correctly. The table is created 
successfully and the inserts are done without any problem, but I can't select 
the inserted rows.

Queries to reproduce the issue:

CREATE TABLE test_table (
  field1 varchar,
  field2 BOOLEAN,
  PRIMARY KEY (field1)
) WITH "template=Replicated";

INSERT INTO test_table (field1, field2) VALUES
  ('field-value-1', true),
  ('field-value-2', true, ),
  ('field-value-3', false);

SELECT * FROM test_table;


> SQL Cache Replicated - Select doesn't work
> --
>
> Key: IGNITE-17045
> URL: https://issues.apache.org/jira/browse/IGNITE-17045
> Project: Ignite
>  Issue Type: Bug
>  Components: cache, sql
>Affects Versions: 2.13
> Environment: Official Helm for Kubernetes.
> Apache Ignite version 2.13.0.
> node-configuration.xml attached.
>Reporter: Angelo Pingo
>Priority: Blocker
> Attachments: ignite-issue-partitioned.PNG, 
> ignite-issue-replicated.PNG, node-configuration.xml
>
>
> I upgraded the Apache Ignite version from 2.12.0 to 2.13.0 and all my SQL 
> Caches configured as Replicated mode does not work correctly (2.12.0 works 
> fine). The table is created successfully and the inserts are done without any 
> problem, but I can't select the inserted rows.
> Queries to reproduce the issue:
> CREATE TABLE test_table (
>   field1 varchar,
>   field2 BOOLEAN,
>   PRIMARY KEY (field1)
> ) WITH "template=Replicated";
> INSERT INTO test_table (field1, field2) VALUES
>   ('field-value-1', true),
>   ('field-value-2', true, ),
>   ('field-value-3', false);
> SELECT * FROM test_table;



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-17045) SQL Cache Replicated - Select doesn't work

2022-05-27 Thread Angelo Pingo (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-17045?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Angelo Pingo updated IGNITE-17045:
--
Summary: SQL Cache Replicated - Select doesn't work  (was: SQL Cache 
Replicated )

> SQL Cache Replicated - Select doesn't work
> --
>
> Key: IGNITE-17045
> URL: https://issues.apache.org/jira/browse/IGNITE-17045
> Project: Ignite
>  Issue Type: Bug
>  Components: cache, sql
>Affects Versions: 2.13
> Environment: Official Helm for Kubernetes.
> Apache Ignite version 2.13.0.
> node-configuration.xml attached.
>Reporter: Angelo Pingo
>Priority: Blocker
> Attachments: ignite-issue-partitioned.PNG, 
> ignite-issue-replicated.PNG, node-configuration.xml
>
>
> I upgraded the Apache Ignite from 2.12.0 to 2.13.0 and all my SQL Caches 
> configured as Replicated mode does not work correctly. The table is created 
> successfully and the inserts are done without any problem, but I can't select 
> the inserted rows.
> Queries to reproduce the issue:
> CREATE TABLE test_table (
>   field1 varchar,
>   field2 BOOLEAN,
>   PRIMARY KEY (field1)
> ) WITH "template=Replicated";
> INSERT INTO test_table (field1, field2) VALUES
>   ('field-value-1', true),
>   ('field-value-2', true, ),
>   ('field-value-3', false);
> SELECT * FROM test_table;



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Created] (IGNITE-17045) SQL Cache Replicated

2022-05-27 Thread Angelo Pingo (Jira)
Angelo Pingo created IGNITE-17045:
-

 Summary: SQL Cache Replicated 
 Key: IGNITE-17045
 URL: https://issues.apache.org/jira/browse/IGNITE-17045
 Project: Ignite
  Issue Type: Bug
  Components: cache, sql
Affects Versions: 2.13
 Environment: Official Helm for Kubernetes.

Apache Ignite version 2.13.0.

node-configuration.xml attached.
Reporter: Angelo Pingo
 Attachments: ignite-issue-partitioned.PNG, 
ignite-issue-replicated.PNG, node-configuration.xml

I upgraded the Apache Ignite from 2.12.0 to 2.13.0 and all my SQL Caches 
configured as Replicated mode does not work correctly. The table is created 
successfully and the inserts are done without any problem, but I can't select 
the inserted rows.

Queries to reproduce the issue:

CREATE TABLE test_table (
  field1 varchar,
  field2 BOOLEAN,
  PRIMARY KEY (field1)
) WITH "template=Replicated";

INSERT INTO test_table (field1, field2) VALUES
  ('field-value-1', true),
  ('field-value-2', true, ),
  ('field-value-3', false);

SELECT * FROM test_table;



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary *real* impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement
* [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
  This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
up to 2.0.202.
* 

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary *real* impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary *real* impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> * [CVE-2021-23463|https://www.cvedetails.com/cve/CVE-2021-23463/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite uses H2 
> version 1.4.197 and the vulnerability is applicable to H2 version 1.4.198 and 
> up to 2.0.202.
> * 
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007

[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2: 
!Ignite-H2-Vulnerabilities.png!

We did preliminary *real* impact analysis considering how Ignite uses H2:
* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
store data in H2 and thus there can be no H2 backups in Ignite.
* [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
  This vulnerability is not applicable to H2 in Ignite since Ignite does not 
support the {{CREATE ALIAS}} statement

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2 (see  !Ignite-H2-Vulnerabilities.png! :
* *Critical* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  *Impact Analysis*; This vulnerability is not applicable to the H2 in Ignite 
since Ignite does not store data in H2 and thus there can be no H2 backups in 
Ignite.
* d !Ignite-H2-Vulnerabilities.png! 

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2: 
> !Ignite-H2-Vulnerabilities.png!
> We did preliminary *real* impact analysis considering how Ignite uses H2:
> * [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> store data in H2 and thus there can be no H2 backups in Ignite.
> * [CVE-2018-10054|https://www.cvedetails.com/cve/CVE-2018-10054/]
>   This vulnerability is not applicable to H2 in Ignite since Ignite does not 
> support the {{CREATE ALIAS}} statement
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Created] (IGNITE-17044) [Native Persistence 3.0] End-to-end test for in-memory PageMemory

2022-05-27 Thread Kirill Tkalenko (Jira)
Kirill Tkalenko created IGNITE-17044:


 Summary: [Native Persistence 3.0] End-to-end test for in-memory 
PageMemory
 Key: IGNITE-17044
 URL: https://issues.apache.org/jira/browse/IGNITE-17044
 Project: Ignite
  Issue Type: Task
Reporter: Kirill Tkalenko
Assignee: Kirill Tkalenko
 Fix For: 3.0.0-alpha5


In-memory PageMemory storage was ported and fully integrated into ignite-3, 
though only unit tests were written covering this piece of functionality.

We need to write an end-to-end integration test for PageMemory-based in-memory 
storage. The test should include:
* New storage creation with necessary configuration;
* Simple store/retrieve operations showing that storage actually performs its 
tasks.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Description: 
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197. Black Duck SCA detects these [security 
vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
 in H2 (see  !Ignite-H2-Vulnerabilities.png! :
* *Critical* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
  *Impact Analysis*; This vulnerability is not applicable to the H2 in Ignite 
since Ignite does not store data in H2 and thus there can be no H2 backups in 
Ignite.
* d !Ignite-H2-Vulnerabilities.png! 

We realize all those vulnerabilities are not applicable to H2 in Apache Ignite. 
However, our security policies are very formal and require somehow addressing 
the security vulnerabilities anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.

  was:
Upgrade H2 dependency of the ignite-indexing module to the latest version 
1.4.200.

Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
1.4.197, which has these two [security 
vulnerabilities|https://www.cvedetails.com/vulnerability-list/vendor_id-17893/product_id-45580/year-2018/H2database-H2.html]

[CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] is regarded as 
a critical vulnerability by our analyzer (Black Duck SCA) and makes it 
impossible to use Ignite SQL due to security policies. We realize this 
vulnerability is probably not even applicable to the H2 in Ignite since there 
is no H2 database or H2 backups in Ignite. Still the security policies are very 
formal and do not allow that anyway.

We believe there are lots of other enterprises having the same issue. For 
example, there is another issue IGNITE-14381 referencing the same problem.

The latest H2 1.4.200 has no vulnerabilities.


> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197. Black Duck SCA detects these [security 
> vulnerabilities|https://www.cvedetails.com/product/45580/H2database-H2.html?vendor_id=17893]
>  in H2 (see  !Ignite-H2-Vulnerabilities.png! :
> * *Critical* [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] 
>   *Impact Analysis*; This vulnerability is not applicable to the H2 in Ignite 
> since Ignite does not store data in H2 and thus there can be no H2 backups in 
> Ignite.
> * d !Ignite-H2-Vulnerabilities.png! 
> We realize all those vulnerabilities are not applicable to H2 in Apache 
> Ignite. However, our security policies are very formal and require somehow 
> addressing the security vulnerabilities anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Updated] (IGNITE-15241) Ignite H2 Security Vulnerabilities

2022-05-27 Thread Alexey Kukushkin (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-15241?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alexey Kukushkin updated IGNITE-15241:
--
Attachment: Ignite-H2-Vulnerabilities.png

> Ignite H2 Security Vulnerabilities
> --
>
> Key: IGNITE-15241
> URL: https://issues.apache.org/jira/browse/IGNITE-15241
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Affects Versions: 2.13
>Reporter: Alexey Kukushkin
>Assignee: Alexey Kukushkin
>Priority: Major
>  Labels: cggg
> Attachments: Ignite-H2-Vulnerabilities.png
>
>   Original Estimate: 80h
>  Remaining Estimate: 80h
>
> Upgrade H2 dependency of the ignite-indexing module to the latest version 
> 1.4.200.
> Apache Ignite SQL (module {{ignite-indexing}}) depends on H2 database version 
> 1.4.197, which has these two [security 
> vulnerabilities|https://www.cvedetails.com/vulnerability-list/vendor_id-17893/product_id-45580/year-2018/H2database-H2.html]
> [CVE-2018-14335|https://www.cvedetails.com/cve/CVE-2018-14335/] is regarded 
> as a critical vulnerability by our analyzer (Black Duck SCA) and makes it 
> impossible to use Ignite SQL due to security policies. We realize this 
> vulnerability is probably not even applicable to the H2 in Ignite since there 
> is no H2 database or H2 backups in Ignite. Still the security policies are 
> very formal and do not allow that anyway.
> We believe there are lots of other enterprises having the same issue. For 
> example, there is another issue IGNITE-14381 referencing the same problem.
> The latest H2 1.4.200 has no vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Assigned] (IGNITE-17043) Performance degradation in Marshaller

2022-05-27 Thread Semyon Danilov (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-17043?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Semyon Danilov reassigned IGNITE-17043:
---

Assignee: Semyon Danilov

> Performance degradation in Marshaller
> -
>
> Key: IGNITE-17043
> URL: https://issues.apache.org/jira/browse/IGNITE-17043
> Project: Ignite
>  Issue Type: Bug
>  Components: cache
>Affects Versions: 2.13, 2.14
>Reporter: Sergey Kosarev
>Assignee: Semyon Danilov
>Priority: Major
>
> There is a problem in ignite-core code in GridHandleTable used inside 
> OptimizedMarshaller where the internal buffers grow in size and does not 
> shrink back.
> What problematic is in GridHandleTable? This is its reset() method that fills 
> arrays in memory. Done once, it's not a big deal. Done a million times for a 
> long buffer, it becomes really long and CPU-consuming.
> Here is simple reproducer (omitting imports for brevity):
> Marshalling of the same object at first takes about 50ms, and then after 
> degradation more than 100 seconds.
> {code:title=DegradationReproducer.java|borderStyle=solid}
> public class DegradationReproducer extends BinaryMarshallerSelfTest {
> @Test
> public void reproduce() throws Exception {
> List> obj = IntStream.range(0, 
> 10).mapToObj(Collections::singletonList).collect(Collectors.toList());
> for (int i = 0; i < 50; i++) {
> Assert.assertThat(measureMarshal(obj), Matchers.lessThan(1000L));
> }
> binaryMarshaller().marshal(
> Collections.singletonList(IntStream.range(0, 
> 1000_000).mapToObj(String::valueOf).collect(Collectors.toList()))
> );
> Assert.assertThat(measureMarshal(obj), Matchers.lessThan(1000L));
> }
> private long measureMarshal(List> obj) throws 
> IgniteCheckedException {
> info("marshalling started ");
> long millis = System.currentTimeMillis();
> binaryMarshaller().marshal(obj);
> millis = System.currentTimeMillis() - millis;
> info("marshalling finished in " + millis + " ms");
> return millis;
> }
> }
> {code}
> on my machine reslust is:
> {quote}
> .
> [2022-05-26 20:58:27,178][INFO 
> ][test-runner-#1%binary.DegradationReproducer%][root] marshalling finished in 
> 39 ms
> [2022-05-26 20:58:27,769][INFO 
> ][test-runner-#1%binary.DegradationReproducer%][root] marshalling started 
> [2022-05-26 21:02:03,588][INFO 
> ][test-runner-#1%binary.DegradationReproducer%][root] marshalling finished in 
> 215819 ms
> [2022-05-26 21:02:03,593][ERROR][main][root] Test failed 
> [test=DegradationReproducer#reproduce[useBinaryArrays = true], 
> duration=218641]
> java.lang.AssertionError: 
> Expected: a value less than <1000L>
>  but: <*215819L*> was greater than <1000L>
>   at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
>   at org.junit.Assert.assertThat(Assert.java:956)
>   at org.junit.Assert.assertThat(Assert.java:923)
>   at 
> org.apache.ignite.internal.binary.DegradationReproducer.reproduce(DegradationReproducer.java:27)
> {quote}



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (IGNITE-16103) Failed to create index for table "table" with some options

2022-05-27 Thread Luchnikov Alexander (Jira)


[ 
https://issues.apache.org/jira/browse/IGNITE-16103?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17542811#comment-17542811
 ] 

Luchnikov Alexander commented on IGNITE-16103:
--

[~timonin.maksim] As agreed earlier - assign a ticket to you, for evaluation 
its implementation as suggested in https://github.com/apache/ignite/pull/9837 
based on switch to calcite, defect priority and fix cost.

> Failed to create index for table "table" with some options
> --
>
> Key: IGNITE-16103
> URL: https://issues.apache.org/jira/browse/IGNITE-16103
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Reporter: Maksim Timonin
>Assignee: Maksim Timonin
>Priority: Minor
>  Labels: good-first-issue, newbie
>  Time Spent: 2h 40m
>  Remaining Estimate: 0h
>
> 1. How to reproduce - all options CACHE_NAME, VALUE_TYPE, INLINE_SIZE should 
> be in the queries to reproduce failure:
> ```
> create table table(id int PRIMARY KEY, fld1 int, fld2 int) with 
> "CACHE_NAME=TEST_CACHE_NAME,VALUE_TYPE=TEST_VALUE_TYPE";
> create index idx_0 on table(fld1, fld2) INLINE_SIZE 0;
> ```
> Creation of index fails with exception:
> Syntax error in SQL statement "CREATE INDEX IDX_0 ON TABLE(FLD1, FLD2) 
> INLINE_SIZE[*] 0 "; SQL statement:
> create index IDX_0 on table(fld1, fld2) INLINE_SIZE 0 [42000-197]
> at
>  
> 2. How to fix: need to debug why parameters matters, looks like appearance of 
> this options triggers some checks that doesn't run while no options 
> specified. Then this checks should be triggers independently on specified 
> options or should be removed (depends on).
>  



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Assigned] (IGNITE-16103) Failed to create index for table "table" with some options

2022-05-27 Thread Luchnikov Alexander (Jira)


 [ 
https://issues.apache.org/jira/browse/IGNITE-16103?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Luchnikov Alexander reassigned IGNITE-16103:


Assignee: Maksim Timonin  (was: Luchnikov Alexander)

> Failed to create index for table "table" with some options
> --
>
> Key: IGNITE-16103
> URL: https://issues.apache.org/jira/browse/IGNITE-16103
> Project: Ignite
>  Issue Type: Bug
>  Components: sql
>Reporter: Maksim Timonin
>Assignee: Maksim Timonin
>Priority: Minor
>  Labels: good-first-issue, newbie
>  Time Spent: 2h 40m
>  Remaining Estimate: 0h
>
> 1. How to reproduce - all options CACHE_NAME, VALUE_TYPE, INLINE_SIZE should 
> be in the queries to reproduce failure:
> ```
> create table table(id int PRIMARY KEY, fld1 int, fld2 int) with 
> "CACHE_NAME=TEST_CACHE_NAME,VALUE_TYPE=TEST_VALUE_TYPE";
> create index idx_0 on table(fld1, fld2) INLINE_SIZE 0;
> ```
> Creation of index fails with exception:
> Syntax error in SQL statement "CREATE INDEX IDX_0 ON TABLE(FLD1, FLD2) 
> INLINE_SIZE[*] 0 "; SQL statement:
> create index IDX_0 on table(fld1, fld2) INLINE_SIZE 0 [42000-197]
> at
>  
> 2. How to fix: need to debug why parameters matters, looks like appearance of 
> this options triggers some checks that doesn't run while no options 
> specified. Then this checks should be triggers independently on specified 
> options or should be removed (depends on).
>  



--
This message was sent by Atlassian Jira
(v8.20.7#820007)