Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pr 640 #172

Closed
wants to merge 30 commits into from
Closed

Pr 640 #172

wants to merge 30 commits into from

Conversation

pxLi
Copy link
Owner

@pxLi pxLi commented Sep 8, 2020

No description provided.

tgravescs and others added 30 commits August 31, 2020 14:16
* Fix leak when we throw

Signed-off-by: Thomas Graves <[email protected]>

* Change to use closeOnExcept

Signed-off-by: Thomas Graves <[email protected]>

Co-authored-by: Thomas Graves <[email protected]>
* cudf and spark version info in artifacts

Add cudf and spark version info in rapids-plugin artifacts file:

rapids4spark-version-info.properties

Signed-off-by: Tim Liu <[email protected]>

* Add cuDF and spark version info in artifacts

Create the separate files in the jar files

Save relevant spark versions in all the shim jars

* Add cudf & spark version files

Create a separate file 'dependency-info.properties' in the jar to save cudf & spark version info

* Include shims SparkShimServiceProvider into META-INF

* SPARK_VER-info.properties files in the rapids jar

* Add prefix with spark for the version files

Co-authored-by: Tim Liu <[email protected]>
* changelog generator

Signed-off-by: Peixin Li <[email protected]>
Fixing an EOFExcetpion by creating a new file object on the same
socket as output of the python worker process.
- Add a new object `PythonWorkerSemaphore`.
- Add a new conf `spark.rapids.python.concurrentPythonWorkers`
- Change class GpuSemaphore from `private` to `private[rapids]`
- Let GpuSemaphore support not to initialize the GPU
Currently the limitation only works when pool memory
is enabled.
- Separate the configs for Python.
- Add `OptionalConfEntry` for Python configs
including 5 types
  SQL_MAP_PANDAS_ITER_UDF
  SQL_GROUPED_AGG_PANDAS_UDF
  SQL_GROUPED_MAP_PANDAS_UDF
  SQL_SCALAR_PANDAS_ITER_UDF
  SQL_SCALAR_PANDAS_UDF
by 4 physical plans
  GpuMapInPandasExec
  GpuAggregateInPandasExec
  GpuFlatMapGroupsInPandasExec
  GpuArrowEvalPythonExec

along with a API update in python/worker.
These two types are
  SQL_COGROUPED_MAP_PANDAS_UDF and
  SQL_WINDOW_AGG_PANDAS_UDF,
mapping to
  GpuFlatMapCoGroupsInPandasExec and
  GPuWindowInPandasExec
respectively.
to include the Python configs in config doc generation
to update the file `configs.md`.
And
- Move python config check to driver side.
- Throw an exception when python module mismatches.
And make the uvm config of Python internal.
Signed-off-by: Peixin Li <[email protected]>
@pxLi
Copy link
Owner Author

pxLi commented Sep 8, 2020

build

2 similar comments
@pxLi
Copy link
Owner Author

pxLi commented Sep 8, 2020

build

@pxLi
Copy link
Owner Author

pxLi commented Sep 8, 2020

build

@github-actions
Copy link

github-actions bot commented Sep 8, 2020

dataComponent | Vulnerability | Severity
Apache Commons BeanUtils | BDSA-2014-0001 | CRITICAL
Apache Commons BeanUtils | CVE-2019-10086 | HIGH
Apache Commons BeanUtils | BDSA-2014-0001 | CRITICAL
Apache Commons BeanUtils | CVE-2019-10086 | HIGH
Apache Commons Codec | BDSA-2012-0001 | MEDIUM
Apache Commons Compress | BDSA-2019-2725 | MEDIUM
Apache Commons Compress | CVE-2018-11771 | MEDIUM
Apache HttpClient | BDSA-2012-0025 | MEDIUM
Apache HttpClient | BDSA-2014-0112 | MEDIUM
Apache HttpClient | BDSA-2014-0126 | MEDIUM
Apache HttpClient | CVE-2015-5262 | MEDIUM
Apache HttpClient | BDSA-2012-0025 | MEDIUM
Apache HttpClient | BDSA-2014-0112 | MEDIUM
Apache HttpClient | BDSA-2014-0126 | MEDIUM
Apache HttpComponents Core | BDSA-2012-0025 | MEDIUM
Apache HttpComponents Core | BDSA-2014-0112 | MEDIUM
Apache HttpComponents Core | BDSA-2014-0126 | MEDIUM
Apache log4j | BDSA-2017-0180 | CRITICAL
Apache log4j | CVE-2019-17571 | CRITICAL
Apache log4j | CVE-2020-9488 | LOW
Apache Xerces2 J | BDSA-2009-0005 | MEDIUM
Apache Xerces2 J | BDSA-2016-1289 | MEDIUM
Apache Xerces2 J | CVE-2012-0881 | HIGH
Guava: Google Core Libraries for Java | CVE-2018-10237 | MEDIUM
Guava: Google Core Libraries for Java | CVE-2018-10237 | MEDIUM
jackson-databind | BDSA-2019-3135 | HIGH
jackson-databind | BDSA-2019-3215 | HIGH
Jackson JSON processor | CVE-2019-10172 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2009-0010 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2009-0012 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2018-2904 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1166 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1169 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1179 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2011-4461 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7656 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7657 | CRITICAL
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7658 | CRITICAL
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-9735 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2009-0010 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2009-0012 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2018-2904 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1166 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1169 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | BDSA-2019-1179 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2011-4461 | MEDIUM
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7656 | HIGH
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7657 | CRITICAL
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-7658 | CRITICAL
Jetty: Java based HTTP/1.x, HTTP/2, Servlet, WebSocket Server | CVE-2017-9735 | HIGH
Netty Project | BDSA-2018-4022 | MEDIUM
Netty Project | BDSA-2018-4022 | MEDIUM
Nimbus-JOSE-JWT | CVE-2019-17195 | CRITICAL

@pxLi pxLi closed this Jan 29, 2021
pxLi pushed a commit that referenced this pull request Jun 10, 2021
* merge qa test to integration test

* add run control for qa test and update sql

* Update build script for qatest
pxLi pushed a commit that referenced this pull request May 12, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants