[jira] [Updated] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error

2019-12-06 Thread Jacek Kikiewicz (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jacek Kikiewicz updated SOLR-13974:
---
Affects Version/s: 8.3.1

> Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
> --
>
> Key: SOLR-13974
> URL: https://issues.apache.org/jira/browse/SOLR-13974
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: http2
>Affects Versions: 8.3, 8.3.1
>Reporter: Jacek Kikiewicz
>Priority: Major
>
> We are running a solrcloud clusters with Solr 8.3 , from time to time during 
> data import we see following errors in solr log:
> {code:java}
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error at 
> org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189)
>  at 
> org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096)
>  at 
> org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78)
>  at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198)
>  at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at 
> org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at 
> org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424)
>  at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
>  at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) 
> at 
> org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) 
> at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
>  at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
>  at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) 
> at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) 
> at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
>  at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at org.eclipse.jetty.server.Server.handle(Server.java:505) at 
> org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) 
> at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
>  at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at 
> org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126)
>  at 
> org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:366)
>  at 
> org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(

[GitHub] [lucene-solr] janhoy commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup

2019-12-06 Thread GitBox
janhoy commented on a change in pull request #1058: SOLR-13972: Warn about 
insecure settings on startup
URL: https://github.com/apache/lucene-solr/pull/1058#discussion_r354736229
 
 

 ##
 File path: solr/core/src/java/org/apache/solr/core/CoreContainer.java
 ##
 @@ -897,6 +899,20 @@ private void reloadSecurityProperties() {
 initializeAuditloggerPlugin((Map) 
securityConfig.getData().get("auditlogging"));
   }
 
+  private void warnUsersIfSecurityDisabled() {
+if (authenticationPlugin == null || authorizationPlugin == null) {
+  log.warn("Not all security plugins configured!  authentication={} 
authorization={}.  Solr is only as secure as " +
+  "you make it. Consider configuring authentication/authorization 
before exposing Solr to users internal or " +
+  "external.  See 
https://lucene.apache.org/solr/guide/authentication-and-authorization-plugins.html
 for more info",
 
 Review comment:
   Point to securing-solr parent page instead?


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13972) Insecure Solr should generate startup warning

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989584#comment-16989584
 ] 

Jan Høydahl commented on SOLR-13972:


Commented on the PR.

Linking with SOLR-13985 since I think these two should be seen together. Should 
be no need to warn about SSL etc for localhost dev use?

> Insecure Solr should generate startup warning
> -
>
> Key: SOLR-13972
> URL: https://issues.apache.org/jira/browse/SOLR-13972
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Ishan Chattopadhyaya
>Priority: Critical
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Warning to the effect of, start Solr with: "solr auth enable -credentials 
> solr:foo -blockUnknown true” (or some other way to achieve the same effect) 
> if you want to expose this Solr instance directly to users. Maybe the link to 
> the ref guide discussing all this might be in good measure here.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer

2019-12-06 Thread Colvin Cowie (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989597#comment-16989597
 ] 

Colvin Cowie commented on SOLR-13954:
-

(y)

> Embedded ZooKeeper in Solr fails to load JettyAdminServer
> -
>
> Key: SOLR-13954
> URL: https://issues.apache.org/jira/browse/SOLR-13954
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3
>Reporter: Colvin Cowie
>Assignee: Jan Høydahl
>Priority: Minor
>  Labels: ZooKeeper
> Fix For: 8.4
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ 
> results in a ClassNotFoundException / NoClassDefFoundError in the log as 
> below. The server still functions correctly (except JettyAdminServer won't 
> work obviously), but it _looks_ like a problem, and isn't good for a first 
> time user to see
> {noformat}
> 2019-11-21 17:25:14.292 INFO  (main) [   ] o.a.s.c.SolrZkServer STARTING 
> EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983
> 2019-11-21 17:25:14.792 INFO  (main) [   ] o.a.s.c.ZkContainer Zookeeper 
> client=localhost:9983
> 2019-11-21
>  17:25:18.833 WARN  (Thread-13) [   ] o.a.z.s.a.AdminServerFactory 
> Unable to load jetty, not starting JettyAdminServer => 
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method)
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191]
>   at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191]
>   at 
> org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43)
>  ~[?:?]
>   at 
> org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136)
>  ~[?:?]
>   at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) 
> ~[?:?]
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector
>   at 
> org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577)
>  ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610]
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191]
>   ... 5 more
> 2019-11-21 17:25:19.365 INFO  (main) [   ] o.a.s.c.c.ConnectionManager 
> Waiting for client to connect to ZooKeeper
> 2019-11-21 17:25:19.396 INFO  (zkConnectionManagerCallback-7-thread-1) [   ] 
> o.a.s.c.c.ConnectionManager zkClient has connected
> 2019-11-21 17:25:19.396 INFO  (main) [   ] o.a.s.c.c.ConnectionManager Client 
> is connected to ZooKeeper{noformat}
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] janhoy merged pull request #1059: SOLR-13954: Embedded ZK in Solr now does not try to load JettyAdminServer

2019-12-06 Thread GitBox
janhoy merged pull request #1059: SOLR-13954: Embedded ZK in Solr now does not 
try to load JettyAdminServer
URL: https://github.com/apache/lucene-solr/pull/1059
 
 
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989599#comment-16989599
 ] 

ASF subversion and git services commented on SOLR-13954:


Commit 7417fa1cf3a7875b76419793a38080059f52b1fc in lucene-solr's branch 
refs/heads/master from Jan Høydahl
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=7417fa1 ]

SOLR-13954: Embedded ZooKeeper in Solr now does not try to load 
JettyAdminServer (#1059)



> Embedded ZooKeeper in Solr fails to load JettyAdminServer
> -
>
> Key: SOLR-13954
> URL: https://issues.apache.org/jira/browse/SOLR-13954
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3
>Reporter: Colvin Cowie
>Assignee: Jan Høydahl
>Priority: Minor
>  Labels: ZooKeeper
> Fix For: 8.4
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ 
> results in a ClassNotFoundException / NoClassDefFoundError in the log as 
> below. The server still functions correctly (except JettyAdminServer won't 
> work obviously), but it _looks_ like a problem, and isn't good for a first 
> time user to see
> {noformat}
> 2019-11-21 17:25:14.292 INFO  (main) [   ] o.a.s.c.SolrZkServer STARTING 
> EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983
> 2019-11-21 17:25:14.792 INFO  (main) [   ] o.a.s.c.ZkContainer Zookeeper 
> client=localhost:9983
> 2019-11-21
>  17:25:18.833 WARN  (Thread-13) [   ] o.a.z.s.a.AdminServerFactory 
> Unable to load jetty, not starting JettyAdminServer => 
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method)
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191]
>   at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191]
>   at 
> org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43)
>  ~[?:?]
>   at 
> org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136)
>  ~[?:?]
>   at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) 
> ~[?:?]
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector
>   at 
> org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577)
>  ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610]
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191]
>   ... 5 more
> 2019-11-21 17:25:19.365 INFO  (main) [   ] o.a.s.c.c.ConnectionManager 
> Waiting for client to connect to ZooKeeper
> 2019-11-21 17:25:19.396 INFO  (zkConnectionManagerCallback-7-thread-1) [   ] 
> o.a.s.c.c.ConnectionManager zkClient has connected
> 2019-11-21 17:25:19.396 INFO  (main) [   ] o.a.s.c.c.ConnectionManager Client 
> is connected to ZooKeeper{noformat}
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989601#comment-16989601
 ] 

ASF subversion and git services commented on SOLR-13954:


Commit 912789bb933b18742c72c48b6018985fd53f69ce in lucene-solr's branch 
refs/heads/branch_8x from Jan Høydahl
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=912789b ]

SOLR-13954: Embedded ZooKeeper in Solr now does not try to load 
JettyAdminServer (#1059)

(cherry picked from commit 7417fa1cf3a7875b76419793a38080059f52b1fc)


> Embedded ZooKeeper in Solr fails to load JettyAdminServer
> -
>
> Key: SOLR-13954
> URL: https://issues.apache.org/jira/browse/SOLR-13954
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3
>Reporter: Colvin Cowie
>Assignee: Jan Høydahl
>Priority: Minor
>  Labels: ZooKeeper
> Fix For: 8.4
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ 
> results in a ClassNotFoundException / NoClassDefFoundError in the log as 
> below. The server still functions correctly (except JettyAdminServer won't 
> work obviously), but it _looks_ like a problem, and isn't good for a first 
> time user to see
> {noformat}
> 2019-11-21 17:25:14.292 INFO  (main) [   ] o.a.s.c.SolrZkServer STARTING 
> EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983
> 2019-11-21 17:25:14.792 INFO  (main) [   ] o.a.s.c.ZkContainer Zookeeper 
> client=localhost:9983
> 2019-11-21
>  17:25:18.833 WARN  (Thread-13) [   ] o.a.z.s.a.AdminServerFactory 
> Unable to load jetty, not starting JettyAdminServer => 
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method)
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191]
>   at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191]
>   at 
> org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43)
>  ~[?:?]
>   at 
> org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136)
>  ~[?:?]
>   at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) 
> ~[?:?]
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector
>   at 
> org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577)
>  ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610]
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191]
>   ... 5 more
> 2019-11-21 17:25:19.365 INFO  (main) [   ] o.a.s.c.c.ConnectionManager 
> Waiting for client to connect to ZooKeeper
> 2019-11-21 17:25:19.396 INFO  (zkConnectionManagerCallback-7-thread-1) [   ] 
> o.a.s.c.c.ConnectionManager zkClient has connected
> 2019-11-21 17:25:19.396 INFO  (main) [   ] o.a.s.c.c.ConnectionManager Client 
> is connected to ZooKeeper{noformat}
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer

2019-12-06 Thread Jira


 [ 
https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jan Høydahl resolved SOLR-13954.

Resolution: Fixed

> Embedded ZooKeeper in Solr fails to load JettyAdminServer
> -
>
> Key: SOLR-13954
> URL: https://issues.apache.org/jira/browse/SOLR-13954
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3
>Reporter: Colvin Cowie
>Assignee: Jan Høydahl
>Priority: Minor
>  Labels: ZooKeeper
> Fix For: 8.4
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ 
> results in a ClassNotFoundException / NoClassDefFoundError in the log as 
> below. The server still functions correctly (except JettyAdminServer won't 
> work obviously), but it _looks_ like a problem, and isn't good for a first 
> time user to see
> {noformat}
> 2019-11-21 17:25:14.292 INFO  (main) [   ] o.a.s.c.SolrZkServer STARTING 
> EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983
> 2019-11-21 17:25:14.792 INFO  (main) [   ] o.a.s.c.ZkContainer Zookeeper 
> client=localhost:9983
> 2019-11-21
>  17:25:18.833 WARN  (Thread-13) [   ] o.a.z.s.a.AdminServerFactory 
> Unable to load jetty, not starting JettyAdminServer => 
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method)
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191]
>   at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191]
>   at 
> org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43)
>  ~[?:?]
>   at 
> org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136)
>  ~[?:?]
>   at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) 
> ~[?:?]
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector
>   at 
> org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577)
>  ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610]
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191]
>   ... 5 more
> 2019-11-21 17:25:19.365 INFO  (main) [   ] o.a.s.c.c.ConnectionManager 
> Waiting for client to connect to ZooKeeper
> 2019-11-21 17:25:19.396 INFO  (zkConnectionManagerCallback-7-thread-1) [   ] 
> o.a.s.c.c.ConnectionManager zkClient has connected
> 2019-11-21 17:25:19.396 INFO  (main) [   ] o.a.s.c.c.ConnectionManager Client 
> is connected to ZooKeeper{noformat}
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13987) fix admin UI to not rely on javascript eval()

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-13987?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989605#comment-16989605
 ] 

Jan Høydahl commented on SOLR-13987:


Thanks Kevin. I remember having looked at some of this crazy angular CSP at 
some point, perhpas even tried a quick fix but ran out of time or something. 
I'm happy to try out whatever you end up with and perhaps help out - I've been 
around most of the UI earlier.

> fix admin UI to not rely on javascript eval()
> -
>
> Key: SOLR-13987
> URL: https://issues.apache.org/jira/browse/SOLR-13987
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
>
> Followup from SOLR-13982: currently any CSP is weak because it must allow 
> this eval: means arbitrary javascript can still be executed. 
> Let's fix the admin UI to not require eval so it can be disabled by the 
> browser.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14023) tests.src.home points at ${user.dir}" for tests (?!)

2019-12-06 Thread Dawid Weiss (Jira)
Dawid Weiss created SOLR-14023:
--

 Summary: tests.src.home points at ${user.dir}" for tests (?!)
 Key: SOLR-14023
 URL: https://issues.apache.org/jira/browse/SOLR-14023
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Dawid Weiss


The "tests.src.home" variable points at ${user.dir} in common-build.xml. This 
property is used as a fallback in ExternalPaths to locate Solr sources to 
resolve certain paths...

All of the logic present in ExternalPaths is just wrong, really. It should be 
an explicit property pointing at an explicit location (ideally the output of a 
distribution assemble folder) which tests would then use.

As it stands now the code scans upwards from user.dir...

 

 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989623#comment-16989623
 ] 

Jan Høydahl commented on SOLR-14014:


{quote}Having the convenience of the admin UI has led us to neglect our APIs.
{quote}
That's a simplification and no excuse for designing bad APIs, but I get your 
point that you don't feel the pain of awkward APIs every day if you always just 
use the UI. But it is anyway not an argument to remove the UI. Remember where 
we came from with JSP and no APIs - the only way to do certain things was 
through inline Java code in those JSPs (yuck!).

I support the idea of a way to disable Admin UI for those that do not use it 
anyway. I think too that something like {{-DenableAdminUI=false}} is a better 
value. Also there should be no reason to disable it by default. The presence of 
the UI is no threat in itself, it is in the moment an Admin person loads it and 
becomes victim of XSS, cliks a link etc that it can hurt the Solr server.

My proposal is thus to educate the user through the AdminUI itself by adding a 
big fat INFO message on top of the dashboard that everyone will see. The 
message will be something like this:
{noformat}
IMPORTANT NOTICE

This is the Solr Administrative interface. It is a HTML5 application running in 
your browser. It talks to the Apache Solr server using HTTP calls, just as any 
other client. The UI gives great power, and can open up new security threats 
such as XSS attacks, if you as an administrator is not very careful when using 
it. Please read our recommendations in the Reference Guide  on what 
precautions to take. The most important are:

* Require some form of authentication to Solr
* Use a separate web browser for Solr, do not load other web sites in other tabs
* Log out when you are done
* Keep up to date on CVE vulnerabilities and keep Solr updated 

If you do not need the Admin UI, it can be disabled by starting Solr with the 
System property -DenableAdminUI=false.

WARNING: Your Solr instance is not protected by Authentication. 
WARNING: Your Solr instance does not use SSL. 
WARNING: Your Solr instance allows config edit though REST API 
WARNING: There is a newer version of Solr available, consider upgrading 


[Learn more about securing Solr]   [Dismiss. We'll set a cookie and not 
show this again]{noformat}
This would probably be a better channel to reach out to Admins than both the 
Ref-guide, mailing list and the Web page combined :)

> Allow Solr to start with Admin UI disabled
> --
>
> Key: SOLR-14014
> URL: https://issues.apache.org/jira/browse/SOLR-14014
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Admin UI, security
>Affects Versions: master (9.0), 8.3.1
>Reporter: Jason Gerlowski
>Priority: Major
>
> Currently Solr always runs the Admin UI. With the history of XSS issues and 
> other security concerns that have been found in the Admin UI, Solr should 
> offer a mode where the Admin UI is disabled. Maybe, and this is a topic 
> that'll need some serious discussion, this should even be the default when 
> Solr starts.
> NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even 
> with the Admin UI disabled, Solr will still be inherently unsafe without 
> firewall protection on a public network.
> *Proposed design:*
> A java system property called *headless* will be used as an internal flag for 
> starting Solr in headless mode. This property will default to true. A java 
> property can be used at startup to set this flag to false.
> Here is an example:
> {code:java}
>  bin/solr start -Dheadless=false {code}
> A message will be added following startup describing the mode.
> In headless mode the following message will be displayed:
> "solr is running in headless mode. The admin console is unavailable. To to 
> turn off headless mode and allow the admin console use the following 
> parameter startup parameter:
> -Dheadless=false 
>   
> In non-headless mode the following message will be displayed:
> "solr is running with headless mode turned off. The admin console is 
> available in this mode. Disabling the Admin UI removes XSS and other attack 
> vectors"  
> If a user attempts to access the admin console while Solr is in headless mode 
> it Solr will return 401 unauthorized.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (LUCENE-9077) Gradle build

2019-12-06 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss updated LUCENE-9077:

Description: 
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * [dw] Port other settings and randomizations from common-build.xml
 * [dw] Configure security policy/ sandboxing for tests.
 * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
it'll be difficult to run it sensibly because gradle doesn't offer cwd 
separation for the forked test runners.
 * jar checksums, jar checksum computation and validation. This should be done 
without intermediate folders (directly on dependency sets).
 * add a :helpDeps explanation to how the dependency system works (palantir 
plugin, lockfile) and how to retrieve structured information about current 
dependencies of a given module (in a tree-like output).
 * if you diff solr packaged distribution against ant-created distribution 
there are minor differences in library versions and some JARs are excluded/ 
moved around. I didn't try to force these as everything seems to work (tests, 
etc.) – perhaps these differences should  be fixed in the ant build instead.
 * identify and list precommit tasks so that they can be ported one by one. 
(Mark's branch has some of this stuff already implemented)
 * identify and port any other "check" utilities that may be called from ant. 
(Mark's branch has some of this stuff already implemented)
 * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, 
precompiled automata, etc.)
 * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
publications.
 * fill in POM details in gradle/defaults-maven.gradle so that they reflect the 
previous content better (dependencies aside).
 * Add any IDE integration layers that should be added (I use IntelliJ and it 
imports the project out of the box, without the need for any special tuning).
 * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
should just explicitly exclude whatever they don't need (and their dependencies 
currently declared explicitly should be folded). Figure out which scope to 
import a dependency to.
 * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently 
XSLT...)
 * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
from a binary distribution? 
 * ant build uses 'tempDir' system property: this is only used in a few places 
and is really irrelevant (should be just a regular temporary directory).

 

*{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
Cao Mạnh Đạt but also applies lessons learned from those two efforts:
 * *Do not try to do too many things at once*. If we deviate too far from 
master, the branch will be hard to merge.
 * *Do everything in baby-steps* and add small, independent build fragments 
replacing the old ant infrastructure.
 * *Try to engage people to run, test and contribute early*. It can't be a 
one-man effort. The more people understand and can contribute to the build, the 
more healthy it will be.

 

  was:
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * [dw] Port other settings and randomizations from common-build.xml
 * [dw] Co

[jira] [Comment Edited] (SOLR-14014) Allow Solr to start with Admin UI disabled

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989623#comment-16989623
 ] 

Jan Høydahl edited comment on SOLR-14014 at 12/6/19 10:41 AM:
--

{quote}Having the convenience of the admin UI has led us to neglect our APIs.
{quote}
That's a simplification and no excuse for designing bad APIs, but I get your 
point that you don't feel the pain of awkward APIs every day if you always just 
use the UI. But it is anyway not an argument to remove the UI. Remember where 
we came from with JSP and no APIs - the only way to do certain things was 
through inline Java code in those JSPs (yuck!).

I support the idea of a way to disable Admin UI for those that do not use it 
anyway. I think too that something like {{-DenableAdminUI=false}} is a better 
value. Also there should be no reason to disable it by default. The presence of 
the UI is no threat in itself, it is in the moment an Admin person loads it and 
becomes victim of XSS, cliks a link etc that it can hurt the Solr server.

My proposal is thus to educate the user through the AdminUI itself by adding a 
big fat INFO message on top of the dashboard that everyone will see on first 
use of the UI. The message will be something like this:
{quote}
*IMPORTANT NOTICE*

This is the Solr Administrative interface. It is a HTML5 application running in 
your browser. It talks to the Apache Solr server using HTTP calls, just as any 
other client. The UI gives great power, and can open up new security threats 
such as XSS attacks, if you as an administrator is not very careful when using 
it. Please read our recommendations in the Reference Guide  on what 
precautions to take. The most important are:

* Require some form of authentication to Solr
* Use a separate web browser for Solr, do not load other web sites in other tabs
* Log out when you are done
* Keep up to date on CVE vulnerabilities and keep Solr updated 

If you do not need the Admin UI, it can be disabled by starting Solr with the 
System property {{-DenableAdminUI=false}}.

WARNING: Your Solr instance is not protected by Authentication. 
WARNING: Your Solr instance does not use SSL. 
WARNING: Your Solr instance allows config edit though REST API 
WARNING: There is a newer version of Solr available, consider upgrading 


[Learn more about securing Solr]   [Dismiss. We'll set a cookie and not 
show this again]{quote}

This would probably be a better channel to reach out to Admins than both the 
Ref-guide, mailing list and the Web page combined :)


was (Author: janhoy):
{quote}Having the convenience of the admin UI has led us to neglect our APIs.
{quote}
That's a simplification and no excuse for designing bad APIs, but I get your 
point that you don't feel the pain of awkward APIs every day if you always just 
use the UI. But it is anyway not an argument to remove the UI. Remember where 
we came from with JSP and no APIs - the only way to do certain things was 
through inline Java code in those JSPs (yuck!).

I support the idea of a way to disable Admin UI for those that do not use it 
anyway. I think too that something like {{-DenableAdminUI=false}} is a better 
value. Also there should be no reason to disable it by default. The presence of 
the UI is no threat in itself, it is in the moment an Admin person loads it and 
becomes victim of XSS, cliks a link etc that it can hurt the Solr server.

My proposal is thus to educate the user through the AdminUI itself by adding a 
big fat INFO message on top of the dashboard that everyone will see. The 
message will be something like this:
{noformat}
IMPORTANT NOTICE

This is the Solr Administrative interface. It is a HTML5 application running in 
your browser. It talks to the Apache Solr server using HTTP calls, just as any 
other client. The UI gives great power, and can open up new security threats 
such as XSS attacks, if you as an administrator is not very careful when using 
it. Please read our recommendations in the Reference Guide  on what 
precautions to take. The most important are:

* Require some form of authentication to Solr
* Use a separate web browser for Solr, do not load other web sites in other tabs
* Log out when you are done
* Keep up to date on CVE vulnerabilities and keep Solr updated 

If you do not need the Admin UI, it can be disabled by starting Solr with the 
System property -DenableAdminUI=false.

WARNING: Your Solr instance is not protected by Authentication. 
WARNING: Your Solr instance does not use SSL. 
WARNING: Your Solr instance allows config edit though REST API 
WARNING: There is a newer version of Solr available, consider upgrading 


[Learn more about securing Solr]   [Dismiss. We'll set a cookie and not 
show this again]{noformat}
This would probably be a better channel to reach out to Admins than both the 
Ref-guide, mailing list and the Web page combined :)

> Allo

[jira] [Commented] (SOLR-13985) bind to localhost by default

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989630#comment-16989630
 ] 

Jan Høydahl commented on SOLR-13985:


[~uschindler] You almost had a patch ready to replace Jetty's start.jar with a 
solr.jar which moves all jetty xml configs into our own Java class instead. Is 
this a good time to pick it up again, would think that it would give us full 
control of what to bind to as well? I don't think it is as risky as it sounds 
like. We just do the Jetty init and servlet wirings from code instead of from 
xml. We already to this for our tests.

> bind to localhost by default
> 
>
> Key: SOLR-13985
> URL: https://issues.apache.org/jira/browse/SOLR-13985
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-13985.patch
>
>
> Currently solr binds to all interfaces by default. 
> The default should be safer, so that e.g. the user is not exposed to the 
> internet until they make an explicit step to do so.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13985) bind to localhost by default

2019-12-06 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989630#comment-16989630
 ] 

Jan Høydahl edited comment on SOLR-13985 at 12/6/19 10:54 AM:
--

[~uschindler] You almost had a patch ready to replace Jetty's start.jar with a 
solr.jar which moves all jetty xml configs into our own Java class instead. Is 
this a good time to pick it up again, would think that it would give us full 
control of what to bind to as well? I don't think it is as risky as it sounds 
like. We just do the Jetty init and servlet wirings from code instead of from 
xml. We already to this for our tests.
*EDIT*: Ok I just saw SOLR-13984 which is exactly about this


was (Author: janhoy):
[~uschindler] You almost had a patch ready to replace Jetty's start.jar with a 
solr.jar which moves all jetty xml configs into our own Java class instead. Is 
this a good time to pick it up again, would think that it would give us full 
control of what to bind to as well? I don't think it is as risky as it sounds 
like. We just do the Jetty init and servlet wirings from code instead of from 
xml. We already to this for our tests.

> bind to localhost by default
> 
>
> Key: SOLR-13985
> URL: https://issues.apache.org/jira/browse/SOLR-13985
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-13985.patch
>
>
> Currently solr binds to all interfaces by default. 
> The default should be safer, so that e.g. the user is not exposed to the 
> internet until they make an explicit step to do so.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989645#comment-16989645
 ] 

ASF subversion and git services commented on SOLR-13990:


Commit 2387bb9d60ae44eeeb4fbcb2f2877f46be5303a0 in lucene-solr's branch 
refs/heads/gradle-master from Anshum Gupta
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=2387bb9 ]

SOLR-13990: Switch out woodstox-core-asl with aalto-xml and upgrade woodstox 
stax-2 API (#1050)




> Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
> ---
>
> Key: SOLR-13990
> URL: https://issues.apache.org/jira/browse/SOLR-13990
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Anshum Gupta
>Assignee: Anshum Gupta
>Priority: Major
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 
> API. 
> About aalto-xml:
> Aalto XML processor is an ultra-high performance next generation Stax XML 
> processor implementation, implementing both basic Stax API 
> ({{javax.xml.stream}}) and Stax2 API extension 
> ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989648#comment-16989648
 ] 

ASF subversion and git services commented on SOLR-13954:


Commit 7417fa1cf3a7875b76419793a38080059f52b1fc in lucene-solr's branch 
refs/heads/gradle-master from Jan Høydahl
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=7417fa1 ]

SOLR-13954: Embedded ZooKeeper in Solr now does not try to load 
JettyAdminServer (#1059)



> Embedded ZooKeeper in Solr fails to load JettyAdminServer
> -
>
> Key: SOLR-13954
> URL: https://issues.apache.org/jira/browse/SOLR-13954
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3
>Reporter: Colvin Cowie
>Assignee: Jan Høydahl
>Priority: Minor
>  Labels: ZooKeeper
> Fix For: 8.4
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ 
> results in a ClassNotFoundException / NoClassDefFoundError in the log as 
> below. The server still functions correctly (except JettyAdminServer won't 
> work obviously), but it _looks_ like a problem, and isn't good for a first 
> time user to see
> {noformat}
> 2019-11-21 17:25:14.292 INFO  (main) [   ] o.a.s.c.SolrZkServer STARTING 
> EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983
> 2019-11-21 17:25:14.792 INFO  (main) [   ] o.a.s.c.ZkContainer Zookeeper 
> client=localhost:9983
> 2019-11-21
>  17:25:18.833 WARN  (Thread-13) [   ] o.a.z.s.a.AdminServerFactory 
> Unable to load jetty, not starting JettyAdminServer => 
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method)
> java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector
>   at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191]
>   at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191]
>   at 
> org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43)
>  ~[?:?]
>   at 
> org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136)
>  ~[?:?]
>   at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) 
> ~[?:?]
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector
>   at 
> org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577)
>  ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610]
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191]
>   ... 5 more
> 2019-11-21 17:25:19.365 INFO  (main) [   ] o.a.s.c.c.ConnectionManager 
> Waiting for client to connect to ZooKeeper
> 2019-11-21 17:25:19.396 INFO  (zkConnectionManagerCallback-7-thread-1) [   ] 
> o.a.s.c.c.ConnectionManager zkClient has connected
> 2019-11-21 17:25:19.396 INFO  (main) [   ] o.a.s.c.c.ConnectionManager Client 
> is connected to ZooKeeper{noformat}
> Caused by: java.lang.ClassNotFoundException: 
> org.eclipse.jetty.server.Connector



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13831) Support defining arbitrary autoscaling simulation scenarios

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13831?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989646#comment-16989646
 ] 

ASF subversion and git services commented on SOLR-13831:


Commit d2b01ef28f918e2f3575081c206203be49889501 in lucene-solr's branch 
refs/heads/gradle-master from Andrzej Bialecki
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=d2b01ef ]

SOLR-13831: Context property _loop_iter_ should be a string in order to support
variable expansion.


> Support defining arbitrary autoscaling simulation scenarios
> ---
>
> Key: SOLR-13831
> URL: https://issues.apache.org/jira/browse/SOLR-13831
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Andrzej Bialecki
>Assignee: Andrzej Bialecki
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-13831.patch, SOLR-13831.patch
>
>
> In many cases where the {{bin/solr autoscaling}} tool is used it would be 
> very useful to be able to specify a concrete scenario to play out, eg:
>  * load a snapshot (or create a simulated cluster of N nodes)
>  * calculate suggestions
>  * apply suggestions
>  * kill one or more nodes
>  * loop N times
>  * make some arbitrary SolrRequest-s
>  * save snapshot
>  * etc...
>  
> This could be expressed as a very simple DSL that can be loaded from a text 
> file, with the following format:
> {code:java}
> # comments
> // or comments
> create_cluster numNodes=5 // inline comment
> solr_request 
> /admin/collections?action=CREATE&name=testCollection&numShards=2&replicationFactor=2
> loop_start iterations=10
>   calculate_suggestions
>   apply_suggestions
> loop_end
> save_snapshot path=/foo{code}
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14020) move hadoop hacks out of lucene TestSecurityManager into a solr one

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14020?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989647#comment-16989647
 ] 

ASF subversion and git services commented on SOLR-14020:


Commit 33ca971d2b5af1ee674752dd3fb76ce512299bb2 in lucene-solr's branch 
refs/heads/gradle-master from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=33ca971 ]

SOLR-14020: move hadoop hacks out of lucene TestSecurityManager into a solr one


> move hadoop hacks out of lucene TestSecurityManager into a solr one
> ---
>
> Key: SOLR-14020
> URL: https://issues.apache.org/jira/browse/SOLR-14020
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-14020.patch
>
>
> The hadoop hacks here have a heavy toll: because we have to override some 
> methods like checkRead, it inserts non-jdk stack frame and breaks a lot of 
> JDK doPriv calls. So for example, it means permissions must be added to stuff 
> like /dev/random or windows fonts or all kinds of other nonsense.
> This is a price only solr should pay, not lucene. Lets split the stuff out.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests

2019-12-06 Thread Andrzej Bialecki (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrzej Bialecki updated SOLR-13979:

Attachment: SOLR-13979.patch

> Expose separate metrics for distributed and non-distributed requests
> 
>
> Key: SOLR-13979
> URL: https://issues.apache.org/jira/browse/SOLR-13979
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: metrics
>Reporter: Shalin Shekhar Mangar
>Assignee: Andrzej Bialecki
>Priority: Major
> Fix For: master (9.0), 8.4
>
> Attachments: SOLR-13979.patch
>
>
> Currently we expose metrics such as count, rate and latency on a per handler 
> level however for search requests there is no distinction made for distrib vs 
> non-distrib requests. This means that there is no way to find the count, rate 
> or latency of only user-sent queries.
> I propose that we expose distrib vs non-distrib metrics separately.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests

2019-12-06 Thread Andrzej Bialecki (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989695#comment-16989695
 ] 

Andrzej Bialecki commented on SOLR-13979:
-

This patch adds a set of separate "requestTimes" and "totalTime" metrics for 
distributed and local requests, based on the value of {{distrib}} parameter 
(defaults to true when in ZK mode).
These metrics are added to all handlers that inherit from 
{{RequestHandlerBase}}. This may be probably a bit too many, we could've added 
it to {{SearchHandler}} only, but on the other hand there are other handlers 
where this info comes useful, it also ensures that these metrics are also 
available in other custom handlers that inherit from this class.

> Expose separate metrics for distributed and non-distributed requests
> 
>
> Key: SOLR-13979
> URL: https://issues.apache.org/jira/browse/SOLR-13979
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: metrics
>Reporter: Shalin Shekhar Mangar
>Assignee: Andrzej Bialecki
>Priority: Major
> Fix For: master (9.0), 8.4
>
> Attachments: SOLR-13979.patch
>
>
> Currently we expose metrics such as count, rate and latency on a per handler 
> level however for search requests there is no distinction made for distrib vs 
> non-distrib requests. This means that there is no way to find the count, rate 
> or latency of only user-sent queries.
> I propose that we expose distrib vs non-distrib metrics separately.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989705#comment-16989705
 ] 

Dawid Weiss edited comment on SOLR-13990 at 12/6/19 12:32 PM:
--

Hadoop requires woodstock. Tests don't pass.

ant test -Dtestcase=TestHdfsUpdateLog -Dtests.disableHdfs=false


was (Author: dweiss):
Hadoop requires woodstock. Tests don't pass.

> Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
> ---
>
> Key: SOLR-13990
> URL: https://issues.apache.org/jira/browse/SOLR-13990
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Anshum Gupta
>Assignee: Anshum Gupta
>Priority: Major
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 
> API. 
> About aalto-xml:
> Aalto XML processor is an ultra-high performance next generation Stax XML 
> processor implementation, implementing both basic Stax API 
> ({{javax.xml.stream}}) and Stax2 API extension 
> ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989705#comment-16989705
 ] 

Dawid Weiss commented on SOLR-13990:


Hadoop requires woodstock. Tests don't pass.

> Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
> ---
>
> Key: SOLR-13990
> URL: https://issues.apache.org/jira/browse/SOLR-13990
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Anshum Gupta
>Assignee: Anshum Gupta
>Priority: Major
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 
> API. 
> About aalto-xml:
> Aalto XML processor is an ultra-high performance next generation Stax XML 
> processor implementation, implementing both basic Stax API 
> ({{javax.xml.stream}}) and Stax2 API extension 
> ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (LUCENE-9077) Gradle build

2019-12-06 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss updated LUCENE-9077:

Description: 
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * (/) Port other settings and randomizations from common-build.xml
 * [dw] Configure security policy/ sandboxing for tests.
 * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
it'll be difficult to run it sensibly because gradle doesn't offer cwd 
separation for the forked test runners.
 * jar checksums, jar checksum computation and validation. This should be done 
without intermediate folders (directly on dependency sets).
 * add a :helpDeps explanation to how the dependency system works (palantir 
plugin, lockfile) and how to retrieve structured information about current 
dependencies of a given module (in a tree-like output).
 * if you diff solr packaged distribution against ant-created distribution 
there are minor differences in library versions and some JARs are excluded/ 
moved around. I didn't try to force these as everything seems to work (tests, 
etc.) – perhaps these differences should  be fixed in the ant build instead.
 * identify and list precommit tasks so that they can be ported one by one. 
(Mark's branch has some of this stuff already implemented)
 * identify and port any other "check" utilities that may be called from ant. 
(Mark's branch has some of this stuff already implemented)
 * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, 
precompiled automata, etc.)
 * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
publications.
 * fill in POM details in gradle/defaults-maven.gradle so that they reflect the 
previous content better (dependencies aside).
 * Add any IDE integration layers that should be added (I use IntelliJ and it 
imports the project out of the box, without the need for any special tuning).
 * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
should just explicitly exclude whatever they don't need (and their dependencies 
currently declared explicitly should be folded). Figure out which scope to 
import a dependency to.
 * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently 
XSLT...)
 * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
from a binary distribution? 
 * ant build uses 'tempDir' system property: this is only used in a few places 
and is really irrelevant (should be just a regular temporary directory).

 

*{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
Cao Mạnh Đạt but also applies lessons learned from those two efforts:
 * *Do not try to do too many things at once*. If we deviate too far from 
master, the branch will be hard to merge.
 * *Do everything in baby-steps* and add small, independent build fragments 
replacing the old ant infrastructure.
 * *Try to engage people to run, test and contribute early*. It can't be a 
one-man effort. The more people understand and can contribute to the build, the 
more healthy it will be.

 

  was:
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * [dw] Port other settings and randomizations from common-build.xml
 * [dw] Con

[jira] [Updated] (LUCENE-9077) Gradle build

2019-12-06 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss updated LUCENE-9077:

Description: 
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * (/) Port other settings and randomizations from common-build.xml
 * [dw] Configure security policy/ sandboxing for tests.
 * Full test's console output on failure?
 * jar checksums, jar checksum computation and validation. This should be done 
without intermediate folders (directly on dependency sets).
 * add a :helpDeps explanation to how the dependency system works (palantir 
plugin, lockfile) and how to retrieve structured information about current 
dependencies of a given module (in a tree-like output).
 * identify and list precommit tasks so that they can be ported one by one. 
(Mark's branch has some of this stuff already implemented)
 * 

Of lesser importance:
 * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
publications.
 * Repro-line for failed tests/ runs.
 * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
it'll be difficult to run it sensibly because gradle doesn't offer cwd 
separation for the forked test runners.
 * if you diff solr packaged distribution against ant-created distribution 
there are minor differences in library versions and some JARs are excluded/ 
moved around. I didn't try to force these as everything seems to work (tests, 
etc.) – perhaps these differences should  be fixed in the ant build instead.
 * identify and port any other "check" utilities that may be called from ant. 
(Mark's branch has some of this stuff already implemented)
 * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, 
precompiled automata, etc.)
 * fill in POM details in gradle/defaults-maven.gradle so that they reflect the 
previous content better (dependencies aside).
 * Add any IDE integration layers that should be added (I use IntelliJ and it 
imports the project out of the box, without the need for any special tuning).
 * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
should just explicitly exclude whatever they don't need (and their dependencies 
currently declared explicitly should be folded). Figure out which scope to 
import a dependency to.
 * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently 
XSLT...)
 * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
from a binary distribution? 

 

*{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
Cao Mạnh Đạt but also applies lessons learned from those two efforts:
 * *Do not try to do too many things at once*. If we deviate too far from 
master, the branch will be hard to merge.
 * *Do everything in baby-steps* and add small, independent build fragments 
replacing the old ant infrastructure.
 * *Try to engage people to run, test and contribute early*. It can't be a 
one-man effort. The more people understand and can contribute to the build, the 
more healthy it will be.

 

  was:
This task focuses on providing gradle-based build equivalent for Lucene and 
Solr (on master branch). See notes below on why this respin is needed.

The code lives on *gradle-master* branch. It is kept with sync with *master*. 
Try running the following to see an overview of helper guides concerning 
typical workflow, testing and ant-migration helpers:

gradlew :help

A list of items that needs to be added or requires work. If you'd like to work 
on any of these, please add your name to the list. Once you have a patch/ pull 
request let me (dweiss) know - I'll try to coordinate the merges.
 * (/) Apply forbiddenAPIs
 * (/) Generate hardware-aware gradle defaults for parallelism (count of 
workers and test JVMs).
 * (/) Fail the build if --tests filter is applied and no tests execute during 
the entire build (this allows for an empty set of filtered tests at single 
project level).
 * (/) Port other settings and randomizations from common-build.xml
 * [dw] Configure security policy/ sandboxing for tests.
 

[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Joel Bernstein (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989726#comment-16989726
 ] 

Joel Bernstein commented on SOLR-14021:
---

There appears to be growing consensus among committers that it's time to start 
removing features so committers can have a manageable system to maintain. HDFS 
has come up a number of times as needing to be removed. The HDFS tests have not 
been maintained over years and fail frequently. We need to start removing 
features that no one cares about enough to even maintain the tests.

> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14024) Invalid html generated by changes2html.pl

2019-12-06 Thread Andras Salamon (Jira)
Andras Salamon created SOLR-14024:
-

 Summary: Invalid html generated by changes2html.pl
 Key: SOLR-14024
 URL: https://issues.apache.org/jira/browse/SOLR-14024
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Andras Salamon


I've validated the Changes.html file generated by the 
[changes2html.pl|https://github.com/apache/lucene-solr/blob/master/lucene/site/changes/changes2html.pl]
 file, and https://validator.w3.org/ listed hundreds of errors. The script 
should validate a valid HTML.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] asalamon74 opened a new pull request #1060: SOLR-14024: Invalid html generated by changes2html.pl

2019-12-06 Thread GitBox
asalamon74 opened a new pull request #1060: SOLR-14024: Invalid html generated 
by changes2html.pl
URL: https://github.com/apache/lucene-solr/pull/1060
 
 
   
   
   
   # Description
   
   changes2html.pl generates invalid html
   
   # Solution
   
   Fix it to generate a valid html.
   
   # Tests
   
   Created the html and tested it using https://validator.w3.org/
   
   # Checklist
   
   Please review the following and check all that apply:
   
   - [x] I have reviewed the guidelines for [How to 
Contribute](https://wiki.apache.org/solr/HowToContribute) and my code conforms 
to the standards described there to the best of my ability.
   - [x] I have created a Jira issue and added the issue ID to my pull request 
title.
   - [x] I am authorized to contribute this code to the ASF and have removed 
any code I do not have a license to distribute.
   - [x] I have given Solr maintainers 
[access](https://help.github.com/en/articles/allowing-changes-to-a-pull-request-branch-created-from-a-fork)
 to contribute to my PR branch. (optional but recommended)
   - [x] I have developed this patch against the `master` branch.
   - [x] I have run `ant precommit` and the appropriate test suite.
   - [ ] I have added tests for my changes.
   - [ ] I have added documentation for the [Ref 
Guide](https://github.com/apache/lucene-solr/tree/master/solr/solr-ref-guide) 
(for Solr changes only).
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] gerlowskija commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup

2019-12-06 Thread GitBox
gerlowskija commented on a change in pull request #1058: SOLR-13972: Warn about 
insecure settings on startup
URL: https://github.com/apache/lucene-solr/pull/1058#discussion_r354818496
 
 

 ##
 File path: solr/core/src/java/org/apache/solr/core/CoreContainer.java
 ##
 @@ -897,6 +899,20 @@ private void reloadSecurityProperties() {
 initializeAuditloggerPlugin((Map) 
securityConfig.getData().get("auditlogging"));
   }
 
+  private void warnUsersIfSecurityDisabled() {
+if (authenticationPlugin == null || authorizationPlugin == null) {
+  log.warn("Not all security plugins configured!  authentication={} 
authorization={}.  Solr is only as secure as " +
+  "you make it. Consider configuring authentication/authorization 
before exposing Solr to users internal or " +
+  "external.  See 
https://lucene.apache.org/solr/guide/authentication-and-authorization-plugins.html
 for more info",
 
 Review comment:
   Sure.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Joel Bernstein (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989726#comment-16989726
 ] 

Joel Bernstein edited comment on SOLR-14021 at 12/6/19 1:00 PM:


There appears to be growing consensus among committers that it's time to start 
removing features so committers can have a manageable system to maintain. HDFS 
has come up a number of times as needing to be removed. The HDFS tests have not 
been maintained over the years and fail frequently. We need to start removing 
features that no one cares about enough to even maintain the tests.


was (Author: joel.bernstein):
There appears to be growing consensus among committers that it's time to start 
removing features so committers can have a manageable system to maintain. HDFS 
has come up a number of times as needing to be removed. The HDFS tests have not 
been maintained over years and fail frequently. We need to start removing 
features that no one cares about enough to even maintain the tests.

> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] gerlowskija edited a comment on issue #1058: SOLR-13972: Warn about insecure settings on startup

2019-12-06 Thread GitBox
gerlowskija edited a comment on issue #1058: SOLR-13972: Warn about insecure 
settings on startup
URL: https://github.com/apache/lucene-solr/pull/1058#issuecomment-562564527
 
 
   > I hoped we had a way to only log such warning if Solr is bound to a public 
network.
   
   I'd rather keep that sort of logic out of it.  I can imagine situations 
where Solr is nominally bound to "localhost", but is actually exposed more 
broadly because of traffic forwarding, iptables rules, etc.
   
   (I'm not the strongest network guy - if someone wants to argue with me that 
this isn't possible and we can always rely that localhost-binding == 
no-need-for-auth I'm happy to be corrected.)


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] gerlowskija commented on issue #1058: SOLR-13972: Warn about insecure settings on startup

2019-12-06 Thread GitBox
gerlowskija commented on issue #1058: SOLR-13972: Warn about insecure settings 
on startup
URL: https://github.com/apache/lucene-solr/pull/1058#issuecomment-562564527
 
 
   > I hoped we had a way to only log such warning if Solr is bound to a public 
network.
   I'd rather keep that sort of logic out of it.  I can imagine situations 
where Solr is nominally bound to "localhost", but is actually exposed more 
broadly because of traffic forwarding, iptables rules, etc.
   
   (I'm not the strongest network guy - if someone wants to argue with me that 
this isn't possible and we can always rely that localhost-binding == 
no-need-for-auth I'm happy to be corrected.)


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Joel Bernstein (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989742#comment-16989742
 ] 

Joel Bernstein commented on SOLR-14021:
---

I think anything that either is associated with a failing test or has no test 
should be removed. If there are parts of HDFS support that have working tests 
and there is consensus about letting them remain, then it makes sense to keep 
those parts.

> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Joel Bernstein (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Joel Bernstein updated SOLR-14021:
--
Description: 
This ticket will remove HDFS support from the Solr project.

There appears to be growing consensus among committers that it's time to start 
removing features so committers can have a manageable system to maintain. HDFS 
has come up a number of times as needing to be removed. The HDFS tests have not 
been maintained over the years and fail frequently. We need to start removing 
features that no one cares about enough to even maintain the tests.

  was:This ticket will remove HDFS support from the Solr project.


> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.
> There appears to be growing consensus among committers that it's time to 
> start removing features so committers can have a manageable system to 
> maintain. HDFS has come up a number of times as needing to be removed. The 
> HDFS tests have not been maintained over the years and fail frequently. We 
> need to start removing features that no one cares about enough to even 
> maintain the tests.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Issue Comment Deleted] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Joel Bernstein (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Joel Bernstein updated SOLR-14021:
--
Comment: was deleted

(was: There appears to be growing consensus among committers that it's time to 
start removing features so committers can have a manageable system to maintain. 
HDFS has come up a number of times as needing to be removed. The HDFS tests 
have not been maintained over the years and fail frequently. We need to start 
removing features that no one cares about enough to even maintain the tests.)

> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.
> There appears to be growing consensus among committers that it's time to 
> start removing features so committers can have a manageable system to 
> maintain. HDFS has come up a number of times as needing to be removed. The 
> HDFS tests have not been maintained over the years and fail frequently. We 
> need to start removing features that no one cares about enough to even 
> maintain the tests.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989753#comment-16989753
 ] 

Erick Erickson commented on SOLR-14021:
---

For backups etc., maybe this Jira might be relevant? It looks like a major 
effort though.

> Remove HDFS support from Solr
> -
>
> Key: SOLR-14021
> URL: https://issues.apache.org/jira/browse/SOLR-14021
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: hdfs
>Reporter: Joel Bernstein
>Priority: Major
>
> This ticket will remove HDFS support from the Solr project.
> There appears to be growing consensus among committers that it's time to 
> start removing features so committers can have a manageable system to 
> maintain. HDFS has come up a number of times as needing to be removed. The 
> HDFS tests have not been maintained over the years and fail frequently. We 
> need to start removing features that no one cares about enough to even 
> maintain the tests.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989758#comment-16989758
 ] 

Jason Gerlowski commented on SOLR-14014:


bq. I don't like it; I liken it to removing useful features just because of the 
possibility of bugs.

I don't think that comparison is accurate.  The proposal here isn't to rip out 
the Admin UI, it's just to add a feature flag for it.  No one's suggesting 
removing features.  We should 100% fix the problems we know about in the Admin 
UI, and this shouldn't replace that work.  I'd like to think that work will 
prevent all future UI vulnerabilities but we've been wrong so many times 
recently that it seems prudent to give our users a safety net just in case.

Other thoughts.

1. Don't feel strongly about the name.  +1 to {{enableAdminUI}} if people like 
that.
2. I don't feel strongly about whether the UI is enabled/disabled by default. A 
smarter option (maybe?) would be to have this ticket set the default to 
"disabled" and make changing the default back to "enabled" be a part of 
SOLR-13987.  That way the UI being enabled (by default) would be contingent on 
fixing the XSS exploit paths.  But again, I think the important thing is 
getting a feature flag in, I think the default is secondary.

> Allow Solr to start with Admin UI disabled
> --
>
> Key: SOLR-14014
> URL: https://issues.apache.org/jira/browse/SOLR-14014
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Admin UI, security
>Affects Versions: master (9.0), 8.3.1
>Reporter: Jason Gerlowski
>Priority: Major
>
> Currently Solr always runs the Admin UI. With the history of XSS issues and 
> other security concerns that have been found in the Admin UI, Solr should 
> offer a mode where the Admin UI is disabled. Maybe, and this is a topic 
> that'll need some serious discussion, this should even be the default when 
> Solr starts.
> NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even 
> with the Admin UI disabled, Solr will still be inherently unsafe without 
> firewall protection on a public network.
> *Proposed design:*
> A java system property called *headless* will be used as an internal flag for 
> starting Solr in headless mode. This property will default to true. A java 
> property can be used at startup to set this flag to false.
> Here is an example:
> {code:java}
>  bin/solr start -Dheadless=false {code}
> A message will be added following startup describing the mode.
> In headless mode the following message will be displayed:
> "solr is running in headless mode. The admin console is unavailable. To to 
> turn off headless mode and allow the admin console use the following 
> parameter startup parameter:
> -Dheadless=false 
>   
> In non-headless mode the following message will be displayed:
> "solr is running with headless mode turned off. The admin console is 
> available in this mode. Disabling the Admin UI removes XSS and other attack 
> vectors"  
> If a user attempts to access the admin console while Solr is in headless mode 
> it Solr will return 401 unauthorized.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-14014) Allow Solr to start with Admin UI disabled

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989758#comment-16989758
 ] 

Jason Gerlowski edited comment on SOLR-14014 at 12/6/19 1:35 PM:
-

bq. I don't like it; I liken it to removing useful features just because of the 
possibility of bugs.

I don't think that comparison is accurate.  The proposal here isn't to rip out 
the Admin UI, it's just to add a feature flag for it.  No one's suggesting 
removing features.  We should 100% fix the problems we know about in the Admin 
UI, and this shouldn't replace that work.  I'd like to think that work will 
prevent all future UI vulnerabilities but we've been wrong so many times 
recently that it seems prudent to give our users a safety net just in case.

Other thoughts.

1. Don't feel strongly about the name.  +1 to {{enableAdminUI}} if people like 
that.
2. I don't feel strongly about whether the UI is enabled/disabled by default. A 
smarter option (maybe?) would be to have this ticket set the default to 
"disabled" and make changing the default back to "enabled" be a part of 
SOLR-13987.  That way the UI being enabled (by default) would be contingent on 
fixing the XSS exploit paths.  But again, I think the important thing is 
getting a feature flag in, I think the default is secondary.
3. +1 to Jan's warnings and documentation suggestions.


was (Author: gerlowskija):
bq. I don't like it; I liken it to removing useful features just because of the 
possibility of bugs.

I don't think that comparison is accurate.  The proposal here isn't to rip out 
the Admin UI, it's just to add a feature flag for it.  No one's suggesting 
removing features.  We should 100% fix the problems we know about in the Admin 
UI, and this shouldn't replace that work.  I'd like to think that work will 
prevent all future UI vulnerabilities but we've been wrong so many times 
recently that it seems prudent to give our users a safety net just in case.

Other thoughts.

1. Don't feel strongly about the name.  +1 to {{enableAdminUI}} if people like 
that.
2. I don't feel strongly about whether the UI is enabled/disabled by default. A 
smarter option (maybe?) would be to have this ticket set the default to 
"disabled" and make changing the default back to "enabled" be a part of 
SOLR-13987.  That way the UI being enabled (by default) would be contingent on 
fixing the XSS exploit paths.  But again, I think the important thing is 
getting a feature flag in, I think the default is secondary.

> Allow Solr to start with Admin UI disabled
> --
>
> Key: SOLR-14014
> URL: https://issues.apache.org/jira/browse/SOLR-14014
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Admin UI, security
>Affects Versions: master (9.0), 8.3.1
>Reporter: Jason Gerlowski
>Priority: Major
>
> Currently Solr always runs the Admin UI. With the history of XSS issues and 
> other security concerns that have been found in the Admin UI, Solr should 
> offer a mode where the Admin UI is disabled. Maybe, and this is a topic 
> that'll need some serious discussion, this should even be the default when 
> Solr starts.
> NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even 
> with the Admin UI disabled, Solr will still be inherently unsafe without 
> firewall protection on a public network.
> *Proposed design:*
> A java system property called *headless* will be used as an internal flag for 
> starting Solr in headless mode. This property will default to true. A java 
> property can be used at startup to set this flag to false.
> Here is an example:
> {code:java}
>  bin/solr start -Dheadless=false {code}
> A message will be added following startup describing the mode.
> In headless mode the following message will be displayed:
> "solr is running in headless mode. The admin console is unavailable. To to 
> turn off headless mode and allow the admin console use the following 
> parameter startup parameter:
> -Dheadless=false 
>   
> In non-headless mode the following message will be displayed:
> "solr is running with headless mode turned off. The admin console is 
> available in this mode. Disabling the Admin UI removes XSS and other attack 
> vectors"  
> If a user attempts to access the admin console while Solr is in headless mode 
> it Solr will return 401 unauthorized.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14026) Upgrade Jetty to 9.4.24.v20191120

2019-12-06 Thread Erick Erickson (Jira)
Erick Erickson created SOLR-14026:
-

 Summary: Upgrade Jetty to 9.4.24.v20191120
 Key: SOLR-14026
 URL: https://issues.apache.org/jira/browse/SOLR-14026
 Project: Solr
  Issue Type: Improvement
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Erick Erickson
Assignee: Erick Erickson


Prompted by the linked JIRA.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989762#comment-16989762
 ] 

Erick Erickson commented on SOLR-13974:
---

We should make the Jetty upgrade its own Jira for tracking purposes.

> Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
> --
>
> Key: SOLR-13974
> URL: https://issues.apache.org/jira/browse/SOLR-13974
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: http2
>Affects Versions: 8.3, 8.3.1
>Reporter: Jacek Kikiewicz
>Priority: Major
>
> We are running a solrcloud clusters with Solr 8.3 , from time to time during 
> data import we see following errors in solr log:
> {code:java}
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error at 
> org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189)
>  at 
> org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096)
>  at 
> org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78)
>  at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198)
>  at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at 
> org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at 
> org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424)
>  at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
>  at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) 
> at 
> org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) 
> at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
>  at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
>  at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) 
> at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) 
> at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
>  at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at org.eclipse.jetty.server.Server.handle(Server.java:505) at 
> org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) 
> at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
>  at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at 
> org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126)
>  at 
> org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(

[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989764#comment-16989764
 ] 

Erick Erickson commented on SOLR-13974:
---

This'll be awkward to test. [~jaceq] If we upgraded jetty, would you be 
able/willing to test before we release the next version of Solr?

> Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
> --
>
> Key: SOLR-13974
> URL: https://issues.apache.org/jira/browse/SOLR-13974
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: http2
>Affects Versions: 8.3, 8.3.1
>Reporter: Jacek Kikiewicz
>Priority: Major
>
> We are running a solrcloud clusters with Solr 8.3 , from time to time during 
> data import we see following errors in solr log:
> {code:java}
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error at 
> org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189)
>  at 
> org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096)
>  at 
> org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78)
>  at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198)
>  at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at 
> org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at 
> org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424)
>  at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
>  at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) 
> at 
> org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) 
> at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
>  at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
>  at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) 
> at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) 
> at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
>  at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at org.eclipse.jetty.server.Server.handle(Server.java:505) at 
> org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) 
> at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
>  at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at 
> org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126)
>  at 
> org

[jira] [Created] (SOLR-14027) Zookeeper Status Page does not work with SSL Enabled Zookeeper

2019-12-06 Thread Ryan Rockenbaugh (Jira)
Ryan Rockenbaugh created SOLR-14027:
---

 Summary: Zookeeper Status Page does not work with SSL Enabled 
Zookeeper
 Key: SOLR-14027
 URL: https://issues.apache.org/jira/browse/SOLR-14027
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
  Components: Admin UI
Affects Versions: 8.3.1, 8.3, 8.2
Reporter: Ryan Rockenbaugh


In class org.apache.solr.handler.admin.ZookeeperStatusHandler, method 
getZkRawResponse uses a standard java.net.Socket to communicate with Zookeeper 
and get the status.  This does not work for SSL-Enabled zookeeper communication.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection

2019-12-06 Thread GitBox
gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support 
changing schema without collection
URL: https://github.com/apache/lucene-solr/pull/1015#issuecomment-562586282
 
 
   > Current apis do not allow modifying a configset if it is not associated 
with a collection/core
   For cases where a configset is created, modified and then used this is 
necessary
   
   If you're uploading and modifying the configset before it's ever used, why 
wouldn't you just make your edits locally before uploading the configset?  Is 
there a particular use-case I'm missing here?


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection

2019-12-06 Thread GitBox
gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support 
changing schema without collection
URL: https://github.com/apache/lucene-solr/pull/1015#issuecomment-562591284
 
 
   Two other comments/concerns:
   
   1. This PR adds a new API for modifying configsets, but AFAICT it doesn't 
deprecate the old configset API.  We aren't going to want to maintain two APIs 
going forward, are we?  If we really want/need this new API we should deprecate 
the old one.
   2. There's no documentation for the new API at all.  This should be covered 
_somewhere_ in the ref guide.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989818#comment-16989818
 ] 

Jason Gerlowski commented on SOLR-13936:


I put a similar comment on your PR, but I'm not sure I see the use case for 
this API.  If you want the ability to upload a config and then modify it before 
it's ever used, couldn't you just do the edits locally and upload the configset 
the way you actually intend to use it?

I'm not against the new API necessarily. I just wonder whether it's worth the 
increased API surface area without a clear use case.

> Schema/Config endpoints to modify configset with no core/collection
> ---
>
> Key: SOLR-13936
> URL: https://issues.apache.org/jira/browse/SOLR-13936
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: config-api
>Reporter: Apoorv Bhawsar
>Priority: Minor
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>
> All schema/config configurations should work even in cases where a collection 
> is not associated with them
>  This jira will involve
>  1. Refactoring existing handler/manager to work without {{SolrCore}}
>  2. Adding {{/api/cluster}} endpoints to support such modifications
>  Endpoints -
>  * {{/api/cluster/configset/\{name}/schema}}
>  * {{/ap/cluster/configset/\{name}/config}}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989818#comment-16989818
 ] 

Jason Gerlowski edited comment on SOLR-13936 at 12/6/19 2:32 PM:
-

I put a similar comment on your PR, but I'm not sure I see the use case for 
this API.  If you want the ability to upload a config and then modify it before 
it's ever used, couldn't you just do the edits locally and upload the configset 
the way you actually intend to use it?

I'm not against the new API necessarily. I just wonder whether it's worth the 
increased API surface area since I don't understand the use case yet.


was (Author: gerlowskija):
I put a similar comment on your PR, but I'm not sure I see the use case for 
this API.  If you want the ability to upload a config and then modify it before 
it's ever used, couldn't you just do the edits locally and upload the configset 
the way you actually intend to use it?

I'm not against the new API necessarily. I just wonder whether it's worth the 
increased API surface area without a clear use case.

> Schema/Config endpoints to modify configset with no core/collection
> ---
>
> Key: SOLR-13936
> URL: https://issues.apache.org/jira/browse/SOLR-13936
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: config-api
>Reporter: Apoorv Bhawsar
>Priority: Minor
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>
> All schema/config configurations should work even in cases where a collection 
> is not associated with them
>  This jira will involve
>  1. Refactoring existing handler/manager to work without {{SolrCore}}
>  2. Adding {{/api/cluster}} endpoints to support such modifications
>  Endpoints -
>  * {{/api/cluster/configset/\{name}/schema}}
>  * {{/ap/cluster/configset/\{name}/config}}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989832#comment-16989832
 ] 

Jason Gerlowski commented on SOLR-13942:


I echo some of Anshum and Jan's concerns here.  Good ZooKeeper clients abound.  
We ship one in the current Solr distribution, and we provide support for some 
ZK commands in {{bin/solr}} itself.  I don't see the use case to add API 
surface area to provide yet-another way to access ZooKeeper.  ZooKeeper access 
is only intended for administrators, and there are plenty of other tools that 
allow them to do that just fine right now.

> /api/cluster/zk/* to fetch raw ZK data
> --
>
> Key: SOLR-13942
> URL: https://issues.apache.org/jira/browse/SOLR-13942
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Noble Paul
>Priority: Major
>
> If the requested path is a node with children show the list of child nodes 
> and their meta data



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989836#comment-16989836
 ] 

Erick Erickson edited comment on SOLR-13942 at 12/6/19 2:49 PM:


How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at 
the functionality, just askin'. I also loathe having a zillion ways to do 
things that we then have to support.

I realize that this won't need you to drop into a terminal and be able to 
execute bin/solr, but is that enough of a benefit?


was (Author: erickerickson):
How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at 
the functionality, just askin'. I also loathe having a zillion ways to do 
things that we then have to support.

> /api/cluster/zk/* to fetch raw ZK data
> --
>
> Key: SOLR-13942
> URL: https://issues.apache.org/jira/browse/SOLR-13942
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Noble Paul
>Priority: Major
>
> If the requested path is a node with children show the list of child nodes 
> and their meta data



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14001:

Attachment: SOLR-14001.patch

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
>   at javax.security.auth.login.LoginContext.login(LoginContext.java:587)
>   at 
> org.apache.hadoop.security.UserGroupInform

[jira] [Assigned] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden reassigned SOLR-14001:
---

Assignee: Kevin Risden

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
>   at javax.security.auth.login.LoginContext.login(LoginContext.java:587)
>   at 
> org.apache.hadoop.security.UserGroupInfor

[jira] [Commented] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989836#comment-16989836
 ] 

Erick Erickson commented on SOLR-13942:
---

How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at 
the functionality, just askin'. I also loathe having a zillion ways to do 
things that we then have to support.

> /api/cluster/zk/* to fetch raw ZK data
> --
>
> Key: SOLR-13942
> URL: https://issues.apache.org/jira/browse/SOLR-13942
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Noble Paul
>Priority: Major
>
> If the requested path is a node with children show the list of child nodes 
> and their meta data



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989838#comment-16989838
 ] 

ASF subversion and git services commented on SOLR-14001:


Commit dad933b933058c9eb39687d50b068552bd8f511a in lucene-solr's branch 
refs/heads/master from Kevin Risden
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=dad933b ]

SOLR-14001: fix HdfsBackupRepositoryTest on windows

Signed-off-by: Kevin Risden 


> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginConte

[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989839#comment-16989839
 ] 

ASF subversion and git services commented on SOLR-14001:


Commit 81e99697d7f2f55607880f132084e8f9b479b3f7 in lucene-solr's branch 
refs/heads/branch_8x from Kevin Risden
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=81e9969 ]

SOLR-14001: fix HdfsBackupRepositoryTest on windows

Signed-off-by: Kevin Risden 


> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginCo

[jira] [Created] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest

2019-12-06 Thread Kevin Risden (Jira)
Kevin Risden created SOLR-14028:
---

 Summary: Fix test permissions for TestSolrCLIRunExample and 
ActionThrottleTest
 Key: SOLR-14028
 URL: https://issues.apache.org/jira/browse/SOLR-14028
 Project: Solr
  Issue Type: Test
  Security Level: Public (Default Security Level. Issues are Public)
  Components: Tests
Reporter: Kevin Risden






--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989844#comment-16989844
 ] 

Kevin Risden commented on SOLR-14001:
-

Most of the 32 failures were due to too much logging. There are 2 tests that 
look to be failing but aren't HdfsBackupRepositoryTest. Created SOLR-14028 to 
follow up. 

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security

[jira] [Resolved] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden resolved SOLR-14001.
-
Resolution: Fixed

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
>   at javax.security.auth.login.LoginContext.login(LoginContext.java:587)
>   at 
> org.apache.hadoop.security.UserGroupInformation$Had

[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Attachment: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml

> Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest
> -
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989858#comment-16989858
 ] 

Kevin Risden commented on SOLR-14028:
-

The weird part about this test is that 
C:\Users\vagrant\repos\apache\lucene-solr\solr and subdirs should already have 
read permissions:

{code:java}
access denied ("java.io.FilePermission" 
"C:\Users\vagrant\repos\apache\lucene-solr\solr\example\exampledocs\*.xml" 
"read")
access denied ("java.io.FilePermission" 
"C:\Users\vagrant\repos\apache\lucene-solr\solr\build\solr-core\test\J0\temp\solr.util.TestSolrCLIRunExample_C3E6CF976F89E34-001\tempDir-005\failExecuteScript"
 "execute")

ant test  -Dtestcase=TestSolrCLIRunExample 
-Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
-Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
-Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
{code}


> Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest
> -
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Summary: Fix test permissions for TestSolrCLIRunExample  (was: Fix test 
permissions for TestSolrCLIRunExample and ActionThrottleTest)

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> tests-failures.txt
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Attachment: tests-failures.txt

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> tests-failures.txt
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Description: 
This was found while looking at SOLR-14001. It fails on Windows:

{code:java}
ant test  -Dtestcase=TestSolrCLIRunExample 
-Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
-Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
-Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
{code}

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14026) Upgrade Jetty to 9.4.24.v20191120

2019-12-06 Thread Erick Erickson (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14026?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989861#comment-16989861
 ] 

Erick Erickson commented on SOLR-14026:
---

What do people think about committing this Real Soon Now (like today or this 
weekend?) assuming tests pass?

> Upgrade Jetty to 9.4.24.v20191120
> -
>
> Key: SOLR-14026
> URL: https://issues.apache.org/jira/browse/SOLR-14026
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Erick Erickson
>Assignee: Erick Erickson
>Priority: Major
>
> Prompted by the linked JIRA.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14013) javabin performance regressions

2019-12-06 Thread Yonik Seeley (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14013?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989860#comment-16989860
 ] 

Yonik Seeley commented on SOLR-14013:
-

Just an update... I tried speeding things up by skipping most of the above, and 
it did get faster, but it's still much slower.  Still digging...

> javabin performance regressions
> ---
>
> Key: SOLR-14013
> URL: https://issues.apache.org/jira/browse/SOLR-14013
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 7.7
>Reporter: Yonik Seeley
>Assignee: Yonik Seeley
>Priority: Major
> Attachments: test.json
>
>
> As noted by [~rrockenbaugh] in SOLR-13963, javabin also recently became 
> orders of magnitude slower in certain cases since v7.7.  The cases identified 
> so far include large numbers of values in a field.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989862#comment-16989862
 ] 

Kevin Risden commented on SOLR-14028:
-

[~rmuir] any ideas here? 

{code:java}

{code}

and from 
https://github.com/apache/lucene-solr/blob/master/lucene/tools/junit4/solr-tests.policy#L24

{code:java}
permission java.io.FilePermission "${common-solr.dir}${/}-", "read";
{code}

So idk why the following error would be reported:

{code:java}
access denied ("java.io.FilePermission" 
"C:\Users\vagrant\repos\apache\lucene-solr\solr\example\exampledocs\*.xml" 
"read")
{code}



> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989863#comment-16989863
 ] 

Dawid Weiss commented on SOLR-14001:


Kevin how do you run those hdfs tests on windows so that they don't fail with 
some weird native lib link error?

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)

[jira] [Commented] (LUCENE-9077) Gradle build

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989866#comment-16989866
 ] 

Dawid Weiss commented on LUCENE-9077:
-

I got lucene tests to run under security manager. But gradle test runner is 
really sensitive to "-Djava.security.debug=access,failure" (read: it's broken 
because it tries to capture the process output and falls into an endless loop). 
Makes debugging really, really hard.

[https://github.com/gradle/gradle/issues/11609]

> Gradle build
> 
>
> Key: LUCENE-9077
> URL: https://issues.apache.org/jira/browse/LUCENE-9077
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> This task focuses on providing gradle-based build equivalent for Lucene and 
> Solr (on master branch). See notes below on why this respin is needed.
> The code lives on *gradle-master* branch. It is kept with sync with *master*. 
> Try running the following to see an overview of helper guides concerning 
> typical workflow, testing and ant-migration helpers:
> gradlew :help
> A list of items that needs to be added or requires work. If you'd like to 
> work on any of these, please add your name to the list. Once you have a 
> patch/ pull request let me (dweiss) know - I'll try to coordinate the merges.
>  * (/) Apply forbiddenAPIs
>  * (/) Generate hardware-aware gradle defaults for parallelism (count of 
> workers and test JVMs).
>  * (/) Fail the build if --tests filter is applied and no tests execute 
> during the entire build (this allows for an empty set of filtered tests at 
> single project level).
>  * (/) Port other settings and randomizations from common-build.xml
>  * [dw] Configure security policy/ sandboxing for tests.
>  * Full test's console output on failure?
>  * jar checksums, jar checksum computation and validation. This should be 
> done without intermediate folders (directly on dependency sets).
>  * add a :helpDeps explanation to how the dependency system works (palantir 
> plugin, lockfile) and how to retrieve structured information about current 
> dependencies of a given module (in a tree-like output).
>  * identify and list precommit tasks so that they can be ported one by one. 
> (Mark's branch has some of this stuff already implemented)
>  * 
> Of lesser importance:
>  * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
> publications.
>  * Repro-line for failed tests/ runs.
>  * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
> it'll be difficult to run it sensibly because gradle doesn't offer cwd 
> separation for the forked test runners.
>  * if you diff solr packaged distribution against ant-created distribution 
> there are minor differences in library versions and some JARs are excluded/ 
> moved around. I didn't try to force these as everything seems to work (tests, 
> etc.) – perhaps these differences should  be fixed in the ant build instead.
>  * identify and port any other "check" utilities that may be called from ant. 
> (Mark's branch has some of this stuff already implemented)
>  * [EOE] identify and port various "regenerate" tasks from ant builds 
> (javacc, precompiled automata, etc.)
>  * fill in POM details in gradle/defaults-maven.gradle so that they reflect 
> the previous content better (dependencies aside).
>  * Add any IDE integration layers that should be added (I use IntelliJ and it 
> imports the project out of the box, without the need for any special tuning).
>  * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
> should just explicitly exclude whatever they don't need (and their 
> dependencies currently declared explicitly should be folded). Figure out 
> which scope to import a dependency to.
>  * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; 
> currently XSLT...)
>  * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
> from a binary distribution? 
>  
> *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
> Cao Mạnh Đạt but also applies lessons learned from those two efforts:
>  * *Do not try to do too many things at once*. If we deviate too far from 
> master, the branch will be hard to merge.
>  * *Do everything in baby-steps* and add small, independent build fragments 
> replacing the old ant infrastructure.
>  * *Try to engage people to run, test and contribute early*. It can't be a 
> one-man effort. The more people understand and can contribute to the build, 
> the more healthy it will be.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For a

[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Attachment: security_debug-tests-failures.txt.zip

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989867#comment-16989867
 ] 

Kevin Risden commented on SOLR-14028:
-

Here is the security debug run:

{code:java}
ant test  -Dtestcase=TestSolrCLIRunExample 
-Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
-Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
-Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 
-D'args="-Djava.security.debug=access,failure"'
{code}

 [^security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip] 
 [^security_debug-tests-failures.txt.zip] 

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989869#comment-16989869
 ] 

Kevin Risden commented on SOLR-14001:
-

The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It 
just tries to load some configurations. So it is different than any of the 
other HDFS tests that actually run a real cluster. 

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native

[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14028:

Attachment: 
security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13933) Cluster mode Stress test suite

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13933?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989873#comment-16989873
 ] 

Jason Gerlowski commented on SOLR-13933:


bq. This suite should run nightly,

Is part of this JIRA finding some place for this suite to run?  Is it going to 
be able to run on the Apache Jenkins, or is it too heavy of a test for that to 
be feasible (you mention 100s of nodes)?

bq. I've evaluated sundial, argo, etc. JMeter's embdedded mode also came close. 
Ditched all of them, as the configurations were very ugly. So, consequently, 
building this from scratch

I'm not familiar with any of those except JMeter, and I can't recommend 
anything better if JMeter didn't get the job done for you.  Hopefully you can 
avoid building it from scratch though.  Ugly configuration seems preferable to 
a bunch of additional code to maintain.  But you're the one with the context, 
so of course it's your best judgement.

> Cluster mode Stress test suite 
> ---
>
> Key: SOLR-13933
> URL: https://issues.apache.org/jira/browse/SOLR-13933
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Ishan Chattopadhyaya
>Assignee: Ishan Chattopadhyaya
>Priority: Major
>
> We need a stress test harness based on 10s or 100s of nodes, 1000s of 
> collection API operations, overseer operations etc. This suite should run 
> nightly, publish results publicly, so as to help with:
> # Uncover stability problems
> # Benchmarking (timings, resource metrics etc.) on collection operations
> # Indexing/querying performance
> # Validate the accuracy of potential improvements
> References:
> SOLR-10317
> https://github.com/lucidworks/solr-scale-tk
> https://github.com/shalinmangar/solr-perf-tools
> Lucene benchmarks



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989872#comment-16989872
 ] 

Robert Muir commented on SOLR-14028:


Kevin, maybe the problem is the bogus way that I construct the common-solr.dir 
in the junit4 task of lucene/common-build.xml? Maybe, Probably, it does not 
work on windows at all. Note: its not related to the common-solr.dir you quoted 
from the solr build files.

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989869#comment-16989869
 ] 

Kevin Risden edited comment on SOLR-14001 at 12/6/19 3:18 PM:
--

The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It 
just tries to load some configurations. So it is different than any of the 
other HDFS tests that actually run a real cluster. 

Most of the HDFS tests have an assume not windows based on the following:
* https://github.com/apache/lucene-solr/blob/master/solr/common-build.xml#L164
* 
https://github.com/apache/lucene-solr/blob/master/solr/core/src/test/org/apache/solr/cloud/hdfs/HdfsTestUtil.java

HdfsBackupRepositoryTest doesn't use HdfsTestUtil since it isn't spinning up a 
cluster.


was (Author: risdenk):
The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It 
just tries to load some configurations. So it is different than any of the 
other HDFS tests that actually run a real cluster. 

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.a

[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989876#comment-16989876
 ] 

Robert Muir commented on SOLR-14028:


also sometimes it helps to run the test with 
{{-Dargs="-Djava.security.debug=policy"}} in cases like this, where you think 
there may be some issue with the final resulting policy (after expansion and 
stuff). It will print what it looks like after the variable substitution and 
stuff.

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989879#comment-16989879
 ] 

Kevin Risden commented on SOLR-14028:
-

Ok cool thanks I'll check it out. 

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989881#comment-16989881
 ] 

Dawid Weiss commented on SOLR-13990:


This failure is also related to this issue:
{code:java}
org.apache.solr.handler.dataimport.TestXPathEntityProcessor > testMultiValued 
FAILED
org.apache.solr.handler.dataimport.DataImportHandlerException: Parsing 
failed for xml, url:testdata.xml rows processed:0
at 
__randomizedtesting.SeedInfo.seed([CE4E371EC10BBB2F:1A6E532C0FC9FB67]:0)
at 
org.apache.solr.handler.dataimport.DataImportHandlerException.wrapAndThrow(DataImportHandlerException.java:69)
at 
org.apache.solr.handler.dataimport.XPathEntityProcessor.initQuery(XPathEntityProcessor.java:331)
at 
org.apache.solr.handler.dataimport.XPathEntityProcessor.fetchNextRow(XPathEntityProcessor.java:232)
at 
org.apache.solr.handler.dataimport.XPathEntityProcessor.nextRow(XPathEntityProcessor.java:212)
at 
org.apache.solr.handler.dataimport.TestXPathEntityProcessor.testMultiValued(TestXPathEntityProcessor.java:84)
Caused by:
java.lang.RuntimeException: com.fasterxml.aalto.WFCException: General 
entity reference (ü) encountered in entity expanding mode: operation not 
(yet) implemented
 at [row,col {unknown-source}]: [5,32]
at 
org.apache.solr.handler.dataimport.XPathRecordReader.streamRecords(XPathRecordReader.java:183)
at 
org.apache.solr.handler.dataimport.XPathEntityProcessor.initQuery(XPathEntityProcessor.java:326)
... 3 moreCaused by:
com.fasterxml.aalto.WFCException: General entity reference (ü) 
encountered in entity expanding mode: operation not (yet) implemented
 at [row,col {unknown-source}]: [5,32]
at 
com.fasterxml.aalto.in.XmlScanner.reportInputProblem(XmlScanner.java:1333)
at 
com.fasterxml.aalto.in.ReaderScanner.handleEntityInText(ReaderScanner.java:1256)
at 
com.fasterxml.aalto.in.ReaderScanner.nextFromTree(ReaderScanner.java:304)
at 
com.fasterxml.aalto.stax.StreamReaderImpl.next(StreamReaderImpl.java:760)
at 
org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:277)
at 
org.apache.solr.handler.dataimport.XPathRecordReader$Node.handleStartElement(XPathRecordReader.java:342)
at 
org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:306)
at 
org.apache.solr.handler.dataimport.XPathRecordReader$Node.handleStartElement(XPathRecordReader.java:342)
at 
org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:306)
at 
org.apache.solr.handler.dataimport.XPathRecordReader.streamRecords(XPathRecordReader.java:180)
... 4 more
 {code}

> Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
> ---
>
> Key: SOLR-13990
> URL: https://issues.apache.org/jira/browse/SOLR-13990
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Anshum Gupta
>Assignee: Anshum Gupta
>Priority: Major
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 
> API. 
> About aalto-xml:
> Aalto XML processor is an ultra-high performance next generation Stax XML 
> processor implementation, implementing both basic Stax API 
> ({{javax.xml.stream}}) and Stax2 API extension 
> ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API

2019-12-06 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989883#comment-16989883
 ] 

Dawid Weiss commented on SOLR-13990:


[~anshum] Could you revert this patch until it passes tests? Thanks.

> Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
> ---
>
> Key: SOLR-13990
> URL: https://issues.apache.org/jira/browse/SOLR-13990
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Anshum Gupta
>Assignee: Anshum Gupta
>Priority: Major
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 
> API. 
> About aalto-xml:
> Aalto XML processor is an ultra-high performance next generation Stax XML 
> processor implementation, implementing both basic Stax API 
> ({{javax.xml.stream}}) and Stax2 API extension 
> ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14003) Refactor code to avoid reading state of replica from the data object

2019-12-06 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14003?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989885#comment-16989885
 ] 

Jason Gerlowski commented on SOLR-14003:


I don't have any problems with this change necessarily, but it's hard to judge 
without any context.  Can you explain the rationale here please?Is there 
something wrong with the existing getState() and isActive() methods in 
themselves?  Is it part of a larger change you're working towards? etc.

> Refactor code to avoid reading state of replica from the data object  
> --
>
> Key: SOLR-14003
> URL: https://issues.apache.org/jira/browse/SOLR-14003
> Project: Solr
>  Issue Type: Sub-task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Noble Paul
>Priority: Major
>
> Deprecate
>  * {{Replica#getState()}}
>  * {{Replica#isActive()}}
> Use an implementation of {{ReplicaStateProvider}} to fetch the state
> {code:java}
> /**An implementation that fetches the state of each replica in a collection
>  * and it also provides the leader of shards
>  *
>  */
> public interface ReplicaStateProvider {
>   Replica.State getState(Replica replica);
>   Replica getLeader(Slice slice);
>   boolean isActive(Replica replica);
> }
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-9077) Gradle build

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989887#comment-16989887
 ] 

ASF subversion and git services commented on LUCENE-9077:
-

Commit 9ec8a86d69a8044a010f01894863eb4066f9d21b in lucene-solr's branch 
refs/heads/master from Dawid Weiss
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=9ec8a86 ]

LUCENE-9077: Add support for running under gradle test runner.


> Gradle build
> 
>
> Key: LUCENE-9077
> URL: https://issues.apache.org/jira/browse/LUCENE-9077
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> This task focuses on providing gradle-based build equivalent for Lucene and 
> Solr (on master branch). See notes below on why this respin is needed.
> The code lives on *gradle-master* branch. It is kept with sync with *master*. 
> Try running the following to see an overview of helper guides concerning 
> typical workflow, testing and ant-migration helpers:
> gradlew :help
> A list of items that needs to be added or requires work. If you'd like to 
> work on any of these, please add your name to the list. Once you have a 
> patch/ pull request let me (dweiss) know - I'll try to coordinate the merges.
>  * (/) Apply forbiddenAPIs
>  * (/) Generate hardware-aware gradle defaults for parallelism (count of 
> workers and test JVMs).
>  * (/) Fail the build if --tests filter is applied and no tests execute 
> during the entire build (this allows for an empty set of filtered tests at 
> single project level).
>  * (/) Port other settings and randomizations from common-build.xml
>  * [dw] Configure security policy/ sandboxing for tests.
>  * Full test's console output on failure?
>  * jar checksums, jar checksum computation and validation. This should be 
> done without intermediate folders (directly on dependency sets).
>  * add a :helpDeps explanation to how the dependency system works (palantir 
> plugin, lockfile) and how to retrieve structured information about current 
> dependencies of a given module (in a tree-like output).
>  * identify and list precommit tasks so that they can be ported one by one. 
> (Mark's branch has some of this stuff already implemented)
>  * 
> Of lesser importance:
>  * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
> publications.
>  * Repro-line for failed tests/ runs.
>  * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
> it'll be difficult to run it sensibly because gradle doesn't offer cwd 
> separation for the forked test runners.
>  * if you diff solr packaged distribution against ant-created distribution 
> there are minor differences in library versions and some JARs are excluded/ 
> moved around. I didn't try to force these as everything seems to work (tests, 
> etc.) – perhaps these differences should  be fixed in the ant build instead.
>  * identify and port any other "check" utilities that may be called from ant. 
> (Mark's branch has some of this stuff already implemented)
>  * [EOE] identify and port various "regenerate" tasks from ant builds 
> (javacc, precompiled automata, etc.)
>  * fill in POM details in gradle/defaults-maven.gradle so that they reflect 
> the previous content better (dependencies aside).
>  * Add any IDE integration layers that should be added (I use IntelliJ and it 
> imports the project out of the box, without the need for any special tuning).
>  * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
> should just explicitly exclude whatever they don't need (and their 
> dependencies currently declared explicitly should be folded). Figure out 
> which scope to import a dependency to.
>  * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; 
> currently XSLT...)
>  * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
> from a binary distribution? 
>  
> *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
> Cao Mạnh Đạt but also applies lessons learned from those two efforts:
>  * *Do not try to do too many things at once*. If we deviate too far from 
> master, the branch will be hard to merge.
>  * *Do everything in baby-steps* and add small, independent build fragments 
> replacing the old ant infrastructure.
>  * *Try to engage people to run, test and contribute early*. It can't be a 
> one-man effort. The more people understand and can contribute to the build, 
> the more healthy it will be.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lu

[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error

2019-12-06 Thread Jacek Kikiewicz (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989888#comment-16989888
 ] 

Jacek Kikiewicz commented on SOLR-13974:


Hi [~erickerickson]

Sure, I am happy to test as much as I can.

 

 

> Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
> --
>
> Key: SOLR-13974
> URL: https://issues.apache.org/jira/browse/SOLR-13974
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: http2
>Affects Versions: 8.3, 8.3.1
>Reporter: Jacek Kikiewicz
>Priority: Major
>
> We are running a solrcloud clusters with Solr 8.3 , from time to time during 
> data import we see following errors in solr log:
> {code:java}
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error at 
> org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189)
>  at 
> org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096)
>  at 
> org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78)
>  at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198)
>  at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at 
> org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at 
> org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424)
>  at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
>  at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) 
> at 
> org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) 
> at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
>  at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
>  at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) 
> at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) 
> at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
>  at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at org.eclipse.jetty.server.Server.handle(Server.java:505) at 
> org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) 
> at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
>  at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at 
> org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126)
>  at 
> org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.r

[jira] [Commented] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests

2019-12-06 Thread Christine Poerschke (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989889#comment-16989889
 ] 

Christine Poerschke commented on SOLR-13979:


Differentiation of timings for user-sent vs. within-Solr queries sounds a 
familiar scenario. +1 to provide separate metrics.

How about also mentioning the differentiation in the reference guide, maybe in 
the 
[https://lucene.apache.org/solr/guide/8_3/performance-statistics-reference.html#commonly-used-stats-for-request-handlers]
 section and/or elsewhere too?

> Expose separate metrics for distributed and non-distributed requests
> 
>
> Key: SOLR-13979
> URL: https://issues.apache.org/jira/browse/SOLR-13979
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: metrics
>Reporter: Shalin Shekhar Mangar
>Assignee: Andrzej Bialecki
>Priority: Major
> Fix For: master (9.0), 8.4
>
> Attachments: SOLR-13979.patch
>
>
> Currently we expose metrics such as count, rate and latency on a per handler 
> level however for search requests there is no distinction made for distrib vs 
> non-distrib requests. This means that there is no way to find the count, rate 
> or latency of only user-sent queries.
> I propose that we expose distrib vs non-distrib metrics separately.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error

2019-12-06 Thread Jacek Kikiewicz (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989888#comment-16989888
 ] 

Jacek Kikiewicz edited comment on SOLR-13974 at 12/6/19 3:32 PM:
-

Hi [~erickerickson]

Sure, I am happy to test as much as I can. 


was (Author: jaceq):
Hi [~erickerickson]

Sure, I am happy to test as much as I can.

 

 

> Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
> --
>
> Key: SOLR-13974
> URL: https://issues.apache.org/jira/browse/SOLR-13974
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: http2
>Affects Versions: 8.3, 8.3.1
>Reporter: Jacek Kikiewicz
>Priority: Major
>
> We are running a solrcloud clusters with Solr 8.3 , from time to time during 
> data import we see following errors in solr log:
> {code:java}
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error
> java.io.IOException: cancel_stream_error at 
> org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189)
>  at 
> org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096)
>  at 
> org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78)
>  at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198)
>  at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at 
> org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at 
> org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424)
>  at 
> org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311)
>  at 
> org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265)
>  at 
> org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
>  at 
> org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) 
> at 
> org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) 
> at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
>  at 
> org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
>  at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) 
> at 
> org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
>  at 
> org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249)
>  at 
> org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) 
> at 
> org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
>  at 
> org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at 
> org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335)
>  at 
> org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
>  at org.eclipse.jetty.server.Server.handle(Server.java:505) at 
> org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at 
> org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) 
> at 
> org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
>  at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at 
> org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
>  at 
> org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
>  at 
> org.eclipse.jetty.util.t

[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989893#comment-16989893
 ] 

Robert Muir commented on SOLR-14028:


Here's the specific sketchy line that i did (sorry): 
https://github.com/apache/lucene-solr/blob/c4126ef858b9bac167f51b3c08d51dc28404ced9/lucene/common-build.xml#L1097

It would be my prime suspect at least.

> Fix test permissions for TestSolrCLIRunExample
> --
>
> Key: SOLR-14028
> URL: https://issues.apache.org/jira/browse/SOLR-14028
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Kevin Risden
>Priority: Major
> Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, 
> security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, 
> security_debug-tests-failures.txt.zip, tests-failures.txt
>
>
> This was found while looking at SOLR-14001. It fails on Windows:
> {code:java}
> ant test  -Dtestcase=TestSolrCLIRunExample 
> -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG 
> -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection

2019-12-06 Thread Ishan Chattopadhyaya (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989897#comment-16989897
 ] 

Ishan Chattopadhyaya commented on SOLR-13936:
-

Need for hand editing configset should be eliminated. This is one step towards 
that goal. Today, starting from default configset you can add fields, 
components etc only after creating a collection. This jira will help in doing 
so even before creating a collection so that user can edit one configset and 
create many collections that have the changes.

> Schema/Config endpoints to modify configset with no core/collection
> ---
>
> Key: SOLR-13936
> URL: https://issues.apache.org/jira/browse/SOLR-13936
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: config-api
>Reporter: Apoorv Bhawsar
>Priority: Minor
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>
> All schema/config configurations should work even in cases where a collection 
> is not associated with them
>  This jira will involve
>  1. Refactoring existing handler/manager to work without {{SolrCore}}
>  2. Adding {{/api/cluster}} endpoints to support such modifications
>  Endpoints -
>  * {{/api/cluster/configset/\{name}/schema}}
>  * {{/ap/cluster/configset/\{name}/config}}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-9077) Gradle build

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989899#comment-16989899
 ] 

Robert Muir commented on LUCENE-9077:
-

Dawid, can we also add the runner to the "SolrSecurityManager"? I'm sorry we 
have to do it in two places: for now the checkExit logic is duped because 
subclassing would just make things even more complex at the moment (sorry). I 
had to do this in SOLR-14020 so that solr problems didn't interfere with lucene 
issues.

> Gradle build
> 
>
> Key: LUCENE-9077
> URL: https://issues.apache.org/jira/browse/LUCENE-9077
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> This task focuses on providing gradle-based build equivalent for Lucene and 
> Solr (on master branch). See notes below on why this respin is needed.
> The code lives on *gradle-master* branch. It is kept with sync with *master*. 
> Try running the following to see an overview of helper guides concerning 
> typical workflow, testing and ant-migration helpers:
> gradlew :help
> A list of items that needs to be added or requires work. If you'd like to 
> work on any of these, please add your name to the list. Once you have a 
> patch/ pull request let me (dweiss) know - I'll try to coordinate the merges.
>  * (/) Apply forbiddenAPIs
>  * (/) Generate hardware-aware gradle defaults for parallelism (count of 
> workers and test JVMs).
>  * (/) Fail the build if --tests filter is applied and no tests execute 
> during the entire build (this allows for an empty set of filtered tests at 
> single project level).
>  * (/) Port other settings and randomizations from common-build.xml
>  * [dw] Configure security policy/ sandboxing for tests.
>  * Full test's console output on failure?
>  * jar checksums, jar checksum computation and validation. This should be 
> done without intermediate folders (directly on dependency sets).
>  * add a :helpDeps explanation to how the dependency system works (palantir 
> plugin, lockfile) and how to retrieve structured information about current 
> dependencies of a given module (in a tree-like output).
>  * identify and list precommit tasks so that they can be ported one by one. 
> (Mark's branch has some of this stuff already implemented)
>  * 
> Of lesser importance:
>  * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
> publications.
>  * Repro-line for failed tests/ runs.
>  * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
> it'll be difficult to run it sensibly because gradle doesn't offer cwd 
> separation for the forked test runners.
>  * if you diff solr packaged distribution against ant-created distribution 
> there are minor differences in library versions and some JARs are excluded/ 
> moved around. I didn't try to force these as everything seems to work (tests, 
> etc.) – perhaps these differences should  be fixed in the ant build instead.
>  * identify and port any other "check" utilities that may be called from ant. 
> (Mark's branch has some of this stuff already implemented)
>  * [EOE] identify and port various "regenerate" tasks from ant builds 
> (javacc, precompiled automata, etc.)
>  * fill in POM details in gradle/defaults-maven.gradle so that they reflect 
> the previous content better (dependencies aside).
>  * Add any IDE integration layers that should be added (I use IntelliJ and it 
> imports the project out of the box, without the need for any special tuning).
>  * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
> should just explicitly exclude whatever they don't need (and their 
> dependencies currently declared explicitly should be folded). Figure out 
> which scope to import a dependency to.
>  * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; 
> currently XSLT...)
>  * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
> from a binary distribution? 
>  
> *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
> Cao Mạnh Đạt but also applies lessons learned from those two efforts:
>  * *Do not try to do too many things at once*. If we deviate too far from 
> master, the branch will be hard to merge.
>  * *Do everything in baby-steps* and add small, independent build fragments 
> replacing the old ant infrastructure.
>  * *Try to engage people to run, test and contribute early*. It can't be a 
> one-man effort. The more people understand and can contribute to the build, 
> the more healthy it will be.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For add

[jira] [Created] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect

2019-12-06 Thread Alessandro Benedetti (Jira)
Alessandro Benedetti created SOLR-14029:
---

 Summary: Documentation for the handleSelect and QT is partially 
incorrect
 Key: SOLR-14029
 URL: https://issues.apache.org/jira/browse/SOLR-14029
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
  Components: documentation
Affects Versions: 8.3.1
Reporter: Alessandro Benedetti


In this documentation page:
https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html

we find this sentence:

"The first configurable item is the handleSelect attribute on the 
  
*A value of "true" will route query requests to the parser defined with the qt 
value.*"

This bit is incorrect, it should be:
*A value of "true" will route query requests to the parser defined with the qt 
value if the /select request handler is not defined.
*

It seems a trivial change but it gave me quite an headache to verify that qt is 
ignored almost all the times.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect

2019-12-06 Thread Alessandro Benedetti (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14029?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alessandro Benedetti updated SOLR-14029:

Description: 
In this documentation page:
https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html

we find this sentence:

"The first configurable item is the handleSelect attribute on the 
  
*A value of "true" will route query requests to the parser defined with the qt 
value.*"

This bit is incorrect, it should be:
*A value of "true" will route query requests to the parser defined with the qt 
value if the /select request handler is not defined.
*

It seems a trivial change but it gave me quite an headache to verify that qt is 
ignored almost all the times.

More info in: 
[https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html]

  was:
In this documentation page:
https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html

we find this sentence:

"The first configurable item is the handleSelect attribute on the 
  
*A value of "true" will route query requests to the parser defined with the qt 
value.*"

This bit is incorrect, it should be:
*A value of "true" will route query requests to the parser defined with the qt 
value if the /select request handler is not defined.
*

It seems a trivial change but it gave me quite an headache to verify that qt is 
ignored almost all the times.


> Documentation for the handleSelect and QT is partially incorrect
> 
>
> Key: SOLR-14029
> URL: https://issues.apache.org/jira/browse/SOLR-14029
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: documentation
>Affects Versions: 8.3.1
>Reporter: Alessandro Benedetti
>Priority: Major
>
> In this documentation page:
> https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html
> we find this sentence:
> "The first configurable item is the handleSelect attribute on the 
>   
> *A value of "true" will route query requests to the parser defined with the 
> qt value.*"
> This bit is incorrect, it should be:
> *A value of "true" will route query requests to the parser defined with the 
> qt value if the /select request handler is not defined.
> *
> It seems a trivial change but it gave me quite an headache to verify that qt 
> is ignored almost all the times.
> More info in: 
> [https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14003) Refactor code to avoid reading state of replica from the data object

2019-12-06 Thread Ishan Chattopadhyaya (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14003?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989900#comment-16989900
 ] 

Ishan Chattopadhyaya commented on SOLR-14003:
-

It is a precursor to SOLR-13951. Obtaining accurate state for a replica 
shouldn't be available without a replica state provider. Today, that logic can 
be wired into a concrete class of the provider using same logic. In SOLR-13951, 
the provider can supply that state optimistically (cached).

> Refactor code to avoid reading state of replica from the data object  
> --
>
> Key: SOLR-14003
> URL: https://issues.apache.org/jira/browse/SOLR-14003
> Project: Solr
>  Issue Type: Sub-task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Noble Paul
>Priority: Major
>
> Deprecate
>  * {{Replica#getState()}}
>  * {{Replica#isActive()}}
> Use an implementation of {{ReplicaStateProvider}} to fetch the state
> {code:java}
> /**An implementation that fetches the state of each replica in a collection
>  * and it also provides the leader of shards
>  *
>  */
> public interface ReplicaStateProvider {
>   Replica.State getState(Replica replica);
>   Replica getLeader(Slice slice);
>   boolean isActive(Replica replica);
> }
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-9077) Gradle build

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989903#comment-16989903
 ] 

Robert Muir commented on LUCENE-9077:
-

{quote}
I got lucene tests to run under security manager. But gradle test runner is 
really sensitive to "-Djava.security.debug=access,failure" (read: it's broken 
because it tries to capture the process output and falls into an endless loop). 
Makes debugging really, really hard.

https://github.com/gradle/gradle/issues/11609
{quote}

As a workaround, maybe there is some way we could use the existing junit4 
runner with the gradle build to debug such things. Because junit4 already 
solved the hard problem. I don't know how messy that would be, but if its even 
possible then it is better than nothing.

> Gradle build
> 
>
> Key: LUCENE-9077
> URL: https://issues.apache.org/jira/browse/LUCENE-9077
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> This task focuses on providing gradle-based build equivalent for Lucene and 
> Solr (on master branch). See notes below on why this respin is needed.
> The code lives on *gradle-master* branch. It is kept with sync with *master*. 
> Try running the following to see an overview of helper guides concerning 
> typical workflow, testing and ant-migration helpers:
> gradlew :help
> A list of items that needs to be added or requires work. If you'd like to 
> work on any of these, please add your name to the list. Once you have a 
> patch/ pull request let me (dweiss) know - I'll try to coordinate the merges.
>  * (/) Apply forbiddenAPIs
>  * (/) Generate hardware-aware gradle defaults for parallelism (count of 
> workers and test JVMs).
>  * (/) Fail the build if --tests filter is applied and no tests execute 
> during the entire build (this allows for an empty set of filtered tests at 
> single project level).
>  * (/) Port other settings and randomizations from common-build.xml
>  * [dw] Configure security policy/ sandboxing for tests.
>  * Full test's console output on failure?
>  * jar checksums, jar checksum computation and validation. This should be 
> done without intermediate folders (directly on dependency sets).
>  * add a :helpDeps explanation to how the dependency system works (palantir 
> plugin, lockfile) and how to retrieve structured information about current 
> dependencies of a given module (in a tree-like output).
>  * identify and list precommit tasks so that they can be ported one by one. 
> (Mark's branch has some of this stuff already implemented)
>  * 
> Of lesser importance:
>  * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
> publications.
>  * Repro-line for failed tests/ runs.
>  * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
> it'll be difficult to run it sensibly because gradle doesn't offer cwd 
> separation for the forked test runners.
>  * if you diff solr packaged distribution against ant-created distribution 
> there are minor differences in library versions and some JARs are excluded/ 
> moved around. I didn't try to force these as everything seems to work (tests, 
> etc.) – perhaps these differences should  be fixed in the ant build instead.
>  * identify and port any other "check" utilities that may be called from ant. 
> (Mark's branch has some of this stuff already implemented)
>  * [EOE] identify and port various "regenerate" tasks from ant builds 
> (javacc, precompiled automata, etc.)
>  * fill in POM details in gradle/defaults-maven.gradle so that they reflect 
> the previous content better (dependencies aside).
>  * Add any IDE integration layers that should be added (I use IntelliJ and it 
> imports the project out of the box, without the need for any special tuning).
>  * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
> should just explicitly exclude whatever they don't need (and their 
> dependencies currently declared explicitly should be folded). Figure out 
> which scope to import a dependency to.
>  * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; 
> currently XSLT...)
>  * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
> from a binary distribution? 
>  
> *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
> Cao Mạnh Đạt but also applies lessons learned from those two efforts:
>  * *Do not try to do too many things at once*. If we deviate too far from 
> master, the branch will be hard to merge.
>  * *Do everything in baby-steps* and add small, independent build fragments 
> replacing the old ant infrastructure.
>  * *Try to engage people to run, test and contribute early*. It can't be a 
> one-man effort. The more 

[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled

2019-12-06 Thread Christine Poerschke (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989906#comment-16989906
 ] 

Christine Poerschke commented on SOLR-14014:


{quote}... Don't feel strongly about the name. ... I don't feel strongly about 
whether the UI is enabled/disabled by default. ...
{quote}
Both {{-DenableAdminUI=...}} and {{-DdisableAdminUI=...}} names seem clear to 
me:
 * If the name was {{enableAdminUI}} then I would expect a Solr instance (that 
supports the flag) to have the admin UI disabled if started without the flag 
i.e. an explicit {{-DenableAdminUI=true}} would seem necessary to turn the 
admin UI on.
 * If the name was {{disableAdminUI}} then I would expect a Solr instance (that 
supports the flag) to have the admin UI enabled if started without the flag 
i.e. an explicit {{-DdisableAdminUI=true}} would seem necessary to turn the 
admin UI off.

Such expectations are a bit subjective though of course.

Given that existing Solr instance behaviour is to have the admin UI enabled by 
default I'd have a small preference for an opt-out style flag name like 
{{disableAdminUI}} or {{withoutAdminUI}} over an opt-in flag name like 
{{enableAdminUI}} or {{withAdminUI}}.

> Allow Solr to start with Admin UI disabled
> --
>
> Key: SOLR-14014
> URL: https://issues.apache.org/jira/browse/SOLR-14014
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Admin UI, security
>Affects Versions: master (9.0), 8.3.1
>Reporter: Jason Gerlowski
>Priority: Major
>
> Currently Solr always runs the Admin UI. With the history of XSS issues and 
> other security concerns that have been found in the Admin UI, Solr should 
> offer a mode where the Admin UI is disabled. Maybe, and this is a topic 
> that'll need some serious discussion, this should even be the default when 
> Solr starts.
> NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even 
> with the Admin UI disabled, Solr will still be inherently unsafe without 
> firewall protection on a public network.
> *Proposed design:*
> A java system property called *headless* will be used as an internal flag for 
> starting Solr in headless mode. This property will default to true. A java 
> property can be used at startup to set this flag to false.
> Here is an example:
> {code:java}
>  bin/solr start -Dheadless=false {code}
> A message will be added following startup describing the mode.
> In headless mode the following message will be displayed:
> "solr is running in headless mode. The admin console is unavailable. To to 
> turn off headless mode and allow the admin console use the following 
> parameter startup parameter:
> -Dheadless=false 
>   
> In non-headless mode the following message will be displayed:
> "solr is running with headless mode turned off. The admin console is 
> available in this mode. Disabling the Admin UI removes XSS and other attack 
> vectors"  
> If a user attempts to access the admin console while Solr is in headless mode 
> it Solr will return 401 unauthorized.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] alessandrobenedetti opened a new pull request #1061: [SOLR-14029] Documentation updated

2019-12-06 Thread GitBox
alessandrobenedetti opened a new pull request #1061: [SOLR-14029] Documentation 
updated
URL: https://github.com/apache/lucene-solr/pull/1061
 
 
   
   # Description
   
   Incorrect documentation for handleSelect and qt param.
   
   # Solution
   
   Short documentation update
   
   # Tests
   
   N.A.
   
   # Checklist
   
   Please review the following and check all that apply:
   
   - [ Y] I have reviewed the guidelines for [How to 
Contribute](https://wiki.apache.org/solr/HowToContribute) and my code conforms 
to the standards described there to the best of my ability.
   - [ Y] I have created a Jira issue and added the issue ID to my pull request 
title.
   - [ Y] I am authorized to contribute this code to the ASF and have removed 
any code I do not have a license to distribute.
   - [Y ] I have given Solr maintainers 
[access](https://help.github.com/en/articles/allowing-changes-to-a-pull-request-branch-created-from-a-fork)
 to contribute to my PR branch. (optional but recommended)
   - [Y ] I have developed this patch against the `master` branch.
   - [ Y] I have run `ant precommit` and the appropriate test suite.
   - [ Y] I have added tests for my changes.
   - [ Y ] I have added documentation for the [Ref 
Guide](https://github.com/apache/lucene-solr/tree/master/solr/solr-ref-guide) 
(for Solr changes only).
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect

2019-12-06 Thread Alessandro Benedetti (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14029?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989908#comment-16989908
 ] 

Alessandro Benedetti commented on SOLR-14029:
-

Tentative adjustment of the documentation is in the Pull Request.
Feel free to elaborate more if necessary.

> Documentation for the handleSelect and QT is partially incorrect
> 
>
> Key: SOLR-14029
> URL: https://issues.apache.org/jira/browse/SOLR-14029
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: documentation
>Affects Versions: 8.3.1
>Reporter: Alessandro Benedetti
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> In this documentation page:
> https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html
> we find this sentence:
> "The first configurable item is the handleSelect attribute on the 
>   
> *A value of "true" will route query requests to the parser defined with the 
> qt value.*"
> This bit is incorrect, it should be:
> *A value of "true" will route query requests to the parser defined with the 
> qt value if the /select request handler is not defined.
> *
> It seems a trivial change but it gave me quite an headache to verify that qt 
> is ignored almost all the times.
> More info in: 
> [https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Closed] (SOLR-12682) add/replace custom Streaming Expressions documentation

2019-12-06 Thread Christine Poerschke (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-12682?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christine Poerschke closed SOLR-12682.
--

> add/replace custom Streaming Expressions documentation
> --
>
> Key: SOLR-12682
> URL: https://issues.apache.org/jira/browse/SOLR-12682
> Project: Solr
>  Issue Type: Task
>  Components: streaming expressions
>Reporter: Christine Poerschke
>Priority: Minor
> Attachments: SOLR-12682.patch
>
>
> (draft proposed patch to follow)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-12682) add/replace custom Streaming Expressions documentation

2019-12-06 Thread Christine Poerschke (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-12682?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christine Poerschke resolved SOLR-12682.

Resolution: Duplicate

> add/replace custom Streaming Expressions documentation
> --
>
> Key: SOLR-12682
> URL: https://issues.apache.org/jira/browse/SOLR-12682
> Project: Solr
>  Issue Type: Task
>  Components: streaming expressions
>Reporter: Christine Poerschke
>Priority: Minor
> Attachments: SOLR-12682.patch
>
>
> (draft proposed patch to follow)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989914#comment-16989914
 ] 

Robert Muir commented on SOLR-14001:


Thank you again for digging into this!

> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
>   at java.security.AccessController.doPrivileged(Native Method)
>   at 
> javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
>   at javax.security.auth.login.LoginContext.login(LoginContext.java

[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989917#comment-16989917
 ] 

ASF subversion and git services commented on SOLR-14001:


Commit dad933b933058c9eb39687d50b068552bd8f511a in lucene-solr's branch 
refs/heads/gradle-master from Kevin Risden
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=dad933b ]

SOLR-14001: fix HdfsBackupRepositoryTest on windows

Signed-off-by: Kevin Risden 


> fix HdfsBackupRepositoryTest on windows
> ---
>
> Key: SOLR-14001
> URL: https://issues.apache.org/jira/browse/SOLR-14001
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip
>
>
> Its a missing permission, but the exception gets swallowed so jenkins logs 
> aren't enough :(
> I mentioned this was likely to happen with SOLR-13991 changes.
> It needs different loadLibrary permission on windows (IIRC). I will spin up a 
> windows VM and run the test with -Djava.security.debug and fix it:
> {noformat}
> org.apache.solr.common.SolrException: 
> org.apache.hadoop.security.KerberosAuthException: failure to login: 
> javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at 
> org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
>   at 
> org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
>   at 
> org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
>   at 
> org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
>   at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
>   at 
> org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
>   at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
>   at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
>   at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
>   at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
>   at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
>   at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394)
>   at 
> com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13)
> Caused by: org.apache.hadoop.security.KerberosAuthException: failure to 
> login: javax.security.auth.login.LoginException: Security Exception
>   at 
> org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847)
>   at 
> org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660)
>   at 
> org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322)
>   at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289)
>   at 
> org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176)
>   at 
> org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303)
>   at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476)
>   at 
> org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89)
>   ... 21 more
> Caused by: javax.security.auth.login.LoginException: Security Exception
>   at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840)
>   at 
> javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
>   at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
>   at javax.security.auth.login.Log

[jira] [Commented] (LUCENE-9077) Gradle build

2019-12-06 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989918#comment-16989918
 ] 

ASF subversion and git services commented on LUCENE-9077:
-

Commit 9ec8a86d69a8044a010f01894863eb4066f9d21b in lucene-solr's branch 
refs/heads/gradle-master from Dawid Weiss
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=9ec8a86 ]

LUCENE-9077: Add support for running under gradle test runner.


> Gradle build
> 
>
> Key: LUCENE-9077
> URL: https://issues.apache.org/jira/browse/LUCENE-9077
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> This task focuses on providing gradle-based build equivalent for Lucene and 
> Solr (on master branch). See notes below on why this respin is needed.
> The code lives on *gradle-master* branch. It is kept with sync with *master*. 
> Try running the following to see an overview of helper guides concerning 
> typical workflow, testing and ant-migration helpers:
> gradlew :help
> A list of items that needs to be added or requires work. If you'd like to 
> work on any of these, please add your name to the list. Once you have a 
> patch/ pull request let me (dweiss) know - I'll try to coordinate the merges.
>  * (/) Apply forbiddenAPIs
>  * (/) Generate hardware-aware gradle defaults for parallelism (count of 
> workers and test JVMs).
>  * (/) Fail the build if --tests filter is applied and no tests execute 
> during the entire build (this allows for an empty set of filtered tests at 
> single project level).
>  * (/) Port other settings and randomizations from common-build.xml
>  * [dw] Configure security policy/ sandboxing for tests.
>  * Full test's console output on failure?
>  * jar checksums, jar checksum computation and validation. This should be 
> done without intermediate folders (directly on dependency sets).
>  * add a :helpDeps explanation to how the dependency system works (palantir 
> plugin, lockfile) and how to retrieve structured information about current 
> dependencies of a given module (in a tree-like output).
>  * identify and list precommit tasks so that they can be ported one by one. 
> (Mark's branch has some of this stuff already implemented)
>  * 
> Of lesser importance:
>  * add rendering of javadocs (gradlew javadoc) and attaching them to maven 
> publications.
>  * Repro-line for failed tests/ runs.
>  * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid 
> it'll be difficult to run it sensibly because gradle doesn't offer cwd 
> separation for the forked test runners.
>  * if you diff solr packaged distribution against ant-created distribution 
> there are minor differences in library versions and some JARs are excluded/ 
> moved around. I didn't try to force these as everything seems to work (tests, 
> etc.) – perhaps these differences should  be fixed in the ant build instead.
>  * identify and port any other "check" utilities that may be called from ant. 
> (Mark's branch has some of this stuff already implemented)
>  * [EOE] identify and port various "regenerate" tasks from ant builds 
> (javacc, precompiled automata, etc.)
>  * fill in POM details in gradle/defaults-maven.gradle so that they reflect 
> the previous content better (dependencies aside).
>  * Add any IDE integration layers that should be added (I use IntelliJ and it 
> imports the project out of the box, without the need for any special tuning).
>  * *Clean up dependencies, especially for Solr*: any \{ transitive = false } 
> should just explicitly exclude whatever they don't need (and their 
> dependencies currently declared explicitly should be folded). Figure out 
> which scope to import a dependency to.
>  * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; 
> currently XSLT...)
>  * I didn't bother adding Solr dist/test-framework to packaging (who'd use it 
> from a binary distribution? 
>  
> *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and 
> Cao Mạnh Đạt but also applies lessons learned from those two efforts:
>  * *Do not try to do too many things at once*. If we deviate too far from 
> master, the branch will be hard to merge.
>  * *Do everything in baby-steps* and add small, independent build fragments 
> replacing the old ant infrastructure.
>  * *Try to engage people to run, test and contribute early*. It can't be a 
> one-man effort. The more people understand and can contribute to the build, 
> the more healthy it will be.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-

[jira] [Created] (LUCENE-9082) Upgrade Apache Ivy version to 2.5.0

2019-12-06 Thread Namgyu Kim (Jira)
Namgyu Kim created LUCENE-9082:
--

 Summary: Upgrade Apache Ivy version to 2.5.0
 Key: LUCENE-9082
 URL: https://issues.apache.org/jira/browse/LUCENE-9082
 Project: Lucene - Core
  Issue Type: Task
Reporter: Namgyu Kim
Assignee: Namgyu Kim
 Fix For: 8.x, master (9.0)


Not long ago, Apache Ivy 2.5.0 was released. (Oct 24, 2019)

Apache Ivy 2.5.0 can be worked with Java 7 or later.
([https://ant.apache.org/ivy/history/2.5.0/compatibility.html])
So there is no problem with our current Lucene version(8.x and 9.0).

This patch will be merged to +master+ and +branch_8x+ and +gradle-master+ 
branch.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] msokolov commented on issue #892: LUCENE-8972: Add ICUTransformCharFilter, to support pre-tokenizer ICU text transformation

2019-12-06 Thread GitBox
msokolov commented on issue #892: LUCENE-8972: Add ICUTransformCharFilter, to 
support pre-tokenizer ICU text transformation
URL: https://github.com/apache/lucene-solr/pull/892#issuecomment-562639099
 
 
   Hi @magibney, thanks for addressing my earlier comments and waiting so long 
for me to get back. Just a few more things I'd like to see changed before we 
commit. 
   
   The constructors for the char filter are package private, so this can only 
be created using the factory. I think this is a kind of unusual pattern, at 
least I checked a couple of other CharFilter classes and they do seem to be 
accessible, with public constructors. I know we have consumers of the analysis 
code that don't use the factory abstraction to create their analysis chains, so 
I think it would be good to support that here too. What do you think about (1) 
making both ICUTransformCharFilter constructors public, (2) moving modifyRules 
to that class so users will think of using it, and perhaps suggesting that it 
would be a good idea to do so for perf reasons in javadoc of this class, and 
(3) testing this in the unit tests?
   
   I rebased and ran precommit locally and it passed OK: I'm not sure why we 
got that failure above. 


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-11091) fix-or-suppress 18 'Resource leak' warnings in StreamExpressionToExpessionTest.java

2019-12-06 Thread Christine Poerschke (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-11091?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christine Poerschke resolved SOLR-11091.

Resolution: Duplicate

bq. I think SOLR-10809 already solved this.

Indeed. Thanks [~asalamon74] for noticing and mentioning that!

> fix-or-suppress 18 'Resource leak' warnings in 
> StreamExpressionToExpessionTest.java
> ---
>
> Key: SOLR-11091
> URL: https://issues.apache.org/jira/browse/SOLR-11091
> Project: Solr
>  Issue Type: Sub-task
>  Components: clients - java
>Reporter: Christine Poerschke
>Priority: Trivial
>
> {code}
>  [ecj-lint] 2. WARNING in 
> /Users/cpoerschke/lucene-solr/solr/solrj/src/test/org/apache/solr/client/solrj/io/stream/StreamExpressionToExpessionTest.java
>  (at line 77)
>  [ecj-lint] stream = new 
> CloudSolrStream(StreamExpressionParser.parse("search(collection1, q=*:*, 
> fl=\"id,a_s,a_i,a_f\", sort=\"a_f asc, a_i asc\", fq=\"a_s:one\", 
> fq=\"a_s:two\")"), factory);
>  [ecj-lint] 
> ^^^
>  [ecj-lint] Resource leak: 'stream' is never closed
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



  1   2   3   >