[jira] [Updated] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
[ https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Jacek Kikiewicz updated SOLR-13974: --- Affects Version/s: 8.3.1 > Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error > -- > > Key: SOLR-13974 > URL: https://issues.apache.org/jira/browse/SOLR-13974 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: http2 >Affects Versions: 8.3, 8.3.1 >Reporter: Jacek Kikiewicz >Priority: Major > > We are running a solrcloud clusters with Solr 8.3 , from time to time during > data import we see following errors in solr log: > {code:java} > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error at > org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189) > at > org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096) > at > org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78) > at > org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198) > at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at > org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at > org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424) > at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610) > at > org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311) > at > org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602) > at > org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) > at > org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) > at > org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) > at > org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) > at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) > at > org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) > at > org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249) > at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) > at > org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220) > at > org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at org.eclipse.jetty.server.Server.handle(Server.java:505) at > org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at > org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) > at > org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) > at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at > org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126) > at > org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:366) > at > org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(
[GitHub] [lucene-solr] janhoy commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup
janhoy commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup URL: https://github.com/apache/lucene-solr/pull/1058#discussion_r354736229 ## File path: solr/core/src/java/org/apache/solr/core/CoreContainer.java ## @@ -897,6 +899,20 @@ private void reloadSecurityProperties() { initializeAuditloggerPlugin((Map) securityConfig.getData().get("auditlogging")); } + private void warnUsersIfSecurityDisabled() { +if (authenticationPlugin == null || authorizationPlugin == null) { + log.warn("Not all security plugins configured! authentication={} authorization={}. Solr is only as secure as " + + "you make it. Consider configuring authentication/authorization before exposing Solr to users internal or " + + "external. See https://lucene.apache.org/solr/guide/authentication-and-authorization-plugins.html for more info", Review comment: Point to securing-solr parent page instead? This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13972) Insecure Solr should generate startup warning
[ https://issues.apache.org/jira/browse/SOLR-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989584#comment-16989584 ] Jan Høydahl commented on SOLR-13972: Commented on the PR. Linking with SOLR-13985 since I think these two should be seen together. Should be no need to warn about SSL etc for localhost dev use? > Insecure Solr should generate startup warning > - > > Key: SOLR-13972 > URL: https://issues.apache.org/jira/browse/SOLR-13972 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Priority: Critical > Time Spent: 20m > Remaining Estimate: 0h > > Warning to the effect of, start Solr with: "solr auth enable -credentials > solr:foo -blockUnknown true” (or some other way to achieve the same effect) > if you want to expose this Solr instance directly to users. Maybe the link to > the ref guide discussing all this might be in good measure here. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer
[ https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989597#comment-16989597 ] Colvin Cowie commented on SOLR-13954: - (y) > Embedded ZooKeeper in Solr fails to load JettyAdminServer > - > > Key: SOLR-13954 > URL: https://issues.apache.org/jira/browse/SOLR-13954 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 8.2, 8.3 >Reporter: Colvin Cowie >Assignee: Jan Høydahl >Priority: Minor > Labels: ZooKeeper > Fix For: 8.4 > > Time Spent: 10m > Remaining Estimate: 0h > > Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ > results in a ClassNotFoundException / NoClassDefFoundError in the log as > below. The server still functions correctly (except JettyAdminServer won't > work obviously), but it _looks_ like a problem, and isn't good for a first > time user to see > {noformat} > 2019-11-21 17:25:14.292 INFO (main) [ ] o.a.s.c.SolrZkServer STARTING > EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983 > 2019-11-21 17:25:14.792 INFO (main) [ ] o.a.s.c.ZkContainer Zookeeper > client=localhost:9983 > 2019-11-21 > 17:25:18.833 WARN (Thread-13) [ ] o.a.z.s.a.AdminServerFactory > Unable to load jetty, not starting JettyAdminServer => > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191] > at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191] > at > org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43) > ~[?:?] > at > org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136) > ~[?:?] > at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) > ~[?:?] > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector > at > org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577) > ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610] > at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191] > ... 5 more > 2019-11-21 17:25:19.365 INFO (main) [ ] o.a.s.c.c.ConnectionManager > Waiting for client to connect to ZooKeeper > 2019-11-21 17:25:19.396 INFO (zkConnectionManagerCallback-7-thread-1) [ ] > o.a.s.c.c.ConnectionManager zkClient has connected > 2019-11-21 17:25:19.396 INFO (main) [ ] o.a.s.c.c.ConnectionManager Client > is connected to ZooKeeper{noformat} > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] janhoy merged pull request #1059: SOLR-13954: Embedded ZK in Solr now does not try to load JettyAdminServer
janhoy merged pull request #1059: SOLR-13954: Embedded ZK in Solr now does not try to load JettyAdminServer URL: https://github.com/apache/lucene-solr/pull/1059 This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer
[ https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989599#comment-16989599 ] ASF subversion and git services commented on SOLR-13954: Commit 7417fa1cf3a7875b76419793a38080059f52b1fc in lucene-solr's branch refs/heads/master from Jan Høydahl [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=7417fa1 ] SOLR-13954: Embedded ZooKeeper in Solr now does not try to load JettyAdminServer (#1059) > Embedded ZooKeeper in Solr fails to load JettyAdminServer > - > > Key: SOLR-13954 > URL: https://issues.apache.org/jira/browse/SOLR-13954 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 8.2, 8.3 >Reporter: Colvin Cowie >Assignee: Jan Høydahl >Priority: Minor > Labels: ZooKeeper > Fix For: 8.4 > > Time Spent: 20m > Remaining Estimate: 0h > > Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ > results in a ClassNotFoundException / NoClassDefFoundError in the log as > below. The server still functions correctly (except JettyAdminServer won't > work obviously), but it _looks_ like a problem, and isn't good for a first > time user to see > {noformat} > 2019-11-21 17:25:14.292 INFO (main) [ ] o.a.s.c.SolrZkServer STARTING > EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983 > 2019-11-21 17:25:14.792 INFO (main) [ ] o.a.s.c.ZkContainer Zookeeper > client=localhost:9983 > 2019-11-21 > 17:25:18.833 WARN (Thread-13) [ ] o.a.z.s.a.AdminServerFactory > Unable to load jetty, not starting JettyAdminServer => > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191] > at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191] > at > org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43) > ~[?:?] > at > org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136) > ~[?:?] > at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) > ~[?:?] > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector > at > org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577) > ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610] > at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191] > ... 5 more > 2019-11-21 17:25:19.365 INFO (main) [ ] o.a.s.c.c.ConnectionManager > Waiting for client to connect to ZooKeeper > 2019-11-21 17:25:19.396 INFO (zkConnectionManagerCallback-7-thread-1) [ ] > o.a.s.c.c.ConnectionManager zkClient has connected > 2019-11-21 17:25:19.396 INFO (main) [ ] o.a.s.c.c.ConnectionManager Client > is connected to ZooKeeper{noformat} > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer
[ https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989601#comment-16989601 ] ASF subversion and git services commented on SOLR-13954: Commit 912789bb933b18742c72c48b6018985fd53f69ce in lucene-solr's branch refs/heads/branch_8x from Jan Høydahl [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=912789b ] SOLR-13954: Embedded ZooKeeper in Solr now does not try to load JettyAdminServer (#1059) (cherry picked from commit 7417fa1cf3a7875b76419793a38080059f52b1fc) > Embedded ZooKeeper in Solr fails to load JettyAdminServer > - > > Key: SOLR-13954 > URL: https://issues.apache.org/jira/browse/SOLR-13954 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 8.2, 8.3 >Reporter: Colvin Cowie >Assignee: Jan Høydahl >Priority: Minor > Labels: ZooKeeper > Fix For: 8.4 > > Time Spent: 20m > Remaining Estimate: 0h > > Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ > results in a ClassNotFoundException / NoClassDefFoundError in the log as > below. The server still functions correctly (except JettyAdminServer won't > work obviously), but it _looks_ like a problem, and isn't good for a first > time user to see > {noformat} > 2019-11-21 17:25:14.292 INFO (main) [ ] o.a.s.c.SolrZkServer STARTING > EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983 > 2019-11-21 17:25:14.792 INFO (main) [ ] o.a.s.c.ZkContainer Zookeeper > client=localhost:9983 > 2019-11-21 > 17:25:18.833 WARN (Thread-13) [ ] o.a.z.s.a.AdminServerFactory > Unable to load jetty, not starting JettyAdminServer => > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191] > at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191] > at > org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43) > ~[?:?] > at > org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136) > ~[?:?] > at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) > ~[?:?] > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector > at > org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577) > ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610] > at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191] > ... 5 more > 2019-11-21 17:25:19.365 INFO (main) [ ] o.a.s.c.c.ConnectionManager > Waiting for client to connect to ZooKeeper > 2019-11-21 17:25:19.396 INFO (zkConnectionManagerCallback-7-thread-1) [ ] > o.a.s.c.c.ConnectionManager zkClient has connected > 2019-11-21 17:25:19.396 INFO (main) [ ] o.a.s.c.c.ConnectionManager Client > is connected to ZooKeeper{noformat} > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Resolved] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer
[ https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Jan Høydahl resolved SOLR-13954. Resolution: Fixed > Embedded ZooKeeper in Solr fails to load JettyAdminServer > - > > Key: SOLR-13954 > URL: https://issues.apache.org/jira/browse/SOLR-13954 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 8.2, 8.3 >Reporter: Colvin Cowie >Assignee: Jan Høydahl >Priority: Minor > Labels: ZooKeeper > Fix For: 8.4 > > Time Spent: 20m > Remaining Estimate: 0h > > Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ > results in a ClassNotFoundException / NoClassDefFoundError in the log as > below. The server still functions correctly (except JettyAdminServer won't > work obviously), but it _looks_ like a problem, and isn't good for a first > time user to see > {noformat} > 2019-11-21 17:25:14.292 INFO (main) [ ] o.a.s.c.SolrZkServer STARTING > EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983 > 2019-11-21 17:25:14.792 INFO (main) [ ] o.a.s.c.ZkContainer Zookeeper > client=localhost:9983 > 2019-11-21 > 17:25:18.833 WARN (Thread-13) [ ] o.a.z.s.a.AdminServerFactory > Unable to load jetty, not starting JettyAdminServer => > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191] > at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191] > at > org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43) > ~[?:?] > at > org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136) > ~[?:?] > at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) > ~[?:?] > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector > at > org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577) > ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610] > at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191] > ... 5 more > 2019-11-21 17:25:19.365 INFO (main) [ ] o.a.s.c.c.ConnectionManager > Waiting for client to connect to ZooKeeper > 2019-11-21 17:25:19.396 INFO (zkConnectionManagerCallback-7-thread-1) [ ] > o.a.s.c.c.ConnectionManager zkClient has connected > 2019-11-21 17:25:19.396 INFO (main) [ ] o.a.s.c.c.ConnectionManager Client > is connected to ZooKeeper{noformat} > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13987) fix admin UI to not rely on javascript eval()
[ https://issues.apache.org/jira/browse/SOLR-13987?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989605#comment-16989605 ] Jan Høydahl commented on SOLR-13987: Thanks Kevin. I remember having looked at some of this crazy angular CSP at some point, perhpas even tried a quick fix but ran out of time or something. I'm happy to try out whatever you end up with and perhaps help out - I've been around most of the UI earlier. > fix admin UI to not rely on javascript eval() > - > > Key: SOLR-13987 > URL: https://issues.apache.org/jira/browse/SOLR-13987 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Priority: Major > > Followup from SOLR-13982: currently any CSP is weak because it must allow > this eval: means arbitrary javascript can still be executed. > Let's fix the admin UI to not require eval so it can be disabled by the > browser. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Created] (SOLR-14023) tests.src.home points at ${user.dir}" for tests (?!)
Dawid Weiss created SOLR-14023: -- Summary: tests.src.home points at ${user.dir}" for tests (?!) Key: SOLR-14023 URL: https://issues.apache.org/jira/browse/SOLR-14023 Project: Solr Issue Type: Bug Security Level: Public (Default Security Level. Issues are Public) Reporter: Dawid Weiss The "tests.src.home" variable points at ${user.dir} in common-build.xml. This property is used as a fallback in ExternalPaths to locate Solr sources to resolve certain paths... All of the logic present in ExternalPaths is just wrong, really. It should be an explicit property pointing at an explicit location (ideally the output of a distribution assemble folder) which tests would then use. As it stands now the code scans upwards from user.dir... -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled
[ https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989623#comment-16989623 ] Jan Høydahl commented on SOLR-14014: {quote}Having the convenience of the admin UI has led us to neglect our APIs. {quote} That's a simplification and no excuse for designing bad APIs, but I get your point that you don't feel the pain of awkward APIs every day if you always just use the UI. But it is anyway not an argument to remove the UI. Remember where we came from with JSP and no APIs - the only way to do certain things was through inline Java code in those JSPs (yuck!). I support the idea of a way to disable Admin UI for those that do not use it anyway. I think too that something like {{-DenableAdminUI=false}} is a better value. Also there should be no reason to disable it by default. The presence of the UI is no threat in itself, it is in the moment an Admin person loads it and becomes victim of XSS, cliks a link etc that it can hurt the Solr server. My proposal is thus to educate the user through the AdminUI itself by adding a big fat INFO message on top of the dashboard that everyone will see. The message will be something like this: {noformat} IMPORTANT NOTICE This is the Solr Administrative interface. It is a HTML5 application running in your browser. It talks to the Apache Solr server using HTTP calls, just as any other client. The UI gives great power, and can open up new security threats such as XSS attacks, if you as an administrator is not very careful when using it. Please read our recommendations in the Reference Guide on what precautions to take. The most important are: * Require some form of authentication to Solr * Use a separate web browser for Solr, do not load other web sites in other tabs * Log out when you are done * Keep up to date on CVE vulnerabilities and keep Solr updated If you do not need the Admin UI, it can be disabled by starting Solr with the System property -DenableAdminUI=false. WARNING: Your Solr instance is not protected by Authentication. WARNING: Your Solr instance does not use SSL. WARNING: Your Solr instance allows config edit though REST API WARNING: There is a newer version of Solr available, consider upgrading [Learn more about securing Solr] [Dismiss. We'll set a cookie and not show this again]{noformat} This would probably be a better channel to reach out to Admins than both the Ref-guide, mailing list and the Web page combined :) > Allow Solr to start with Admin UI disabled > -- > > Key: SOLR-14014 > URL: https://issues.apache.org/jira/browse/SOLR-14014 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: Admin UI, security >Affects Versions: master (9.0), 8.3.1 >Reporter: Jason Gerlowski >Priority: Major > > Currently Solr always runs the Admin UI. With the history of XSS issues and > other security concerns that have been found in the Admin UI, Solr should > offer a mode where the Admin UI is disabled. Maybe, and this is a topic > that'll need some serious discussion, this should even be the default when > Solr starts. > NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even > with the Admin UI disabled, Solr will still be inherently unsafe without > firewall protection on a public network. > *Proposed design:* > A java system property called *headless* will be used as an internal flag for > starting Solr in headless mode. This property will default to true. A java > property can be used at startup to set this flag to false. > Here is an example: > {code:java} > bin/solr start -Dheadless=false {code} > A message will be added following startup describing the mode. > In headless mode the following message will be displayed: > "solr is running in headless mode. The admin console is unavailable. To to > turn off headless mode and allow the admin console use the following > parameter startup parameter: > -Dheadless=false > > In non-headless mode the following message will be displayed: > "solr is running with headless mode turned off. The admin console is > available in this mode. Disabling the Admin UI removes XSS and other attack > vectors" > If a user attempts to access the admin console while Solr is in headless mode > it Solr will return 401 unauthorized. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Dawid Weiss updated LUCENE-9077: Description: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * [dw] Port other settings and randomizations from common-build.xml * [dw] Configure security policy/ sandboxing for tests. * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid it'll be difficult to run it sensibly because gradle doesn't offer cwd separation for the forked test runners. * jar checksums, jar checksum computation and validation. This should be done without intermediate folders (directly on dependency sets). * add a :helpDeps explanation to how the dependency system works (palantir plugin, lockfile) and how to retrieve structured information about current dependencies of a given module (in a tree-like output). * if you diff solr packaged distribution against ant-created distribution there are minor differences in library versions and some JARs are excluded/ moved around. I didn't try to force these as everything seems to work (tests, etc.) – perhaps these differences should be fixed in the ant build instead. * identify and list precommit tasks so that they can be ported one by one. (Mark's branch has some of this stuff already implemented) * identify and port any other "check" utilities that may be called from ant. (Mark's branch has some of this stuff already implemented) * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, precompiled automata, etc.) * add rendering of javadocs (gradlew javadoc) and attaching them to maven publications. * fill in POM details in gradle/defaults-maven.gradle so that they reflect the previous content better (dependencies aside). * Add any IDE integration layers that should be added (I use IntelliJ and it imports the project out of the box, without the need for any special tuning). * *Clean up dependencies, especially for Solr*: any \{ transitive = false } should just explicitly exclude whatever they don't need (and their dependencies currently declared explicitly should be folded). Figure out which scope to import a dependency to. * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently XSLT...) * I didn't bother adding Solr dist/test-framework to packaging (who'd use it from a binary distribution? * ant build uses 'tempDir' system property: this is only used in a few places and is really irrelevant (should be just a regular temporary directory). *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and Cao Mạnh Đạt but also applies lessons learned from those two efforts: * *Do not try to do too many things at once*. If we deviate too far from master, the branch will be hard to merge. * *Do everything in baby-steps* and add small, independent build fragments replacing the old ant infrastructure. * *Try to engage people to run, test and contribute early*. It can't be a one-man effort. The more people understand and can contribute to the build, the more healthy it will be. was: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * [dw] Port other settings and randomizations from common-build.xml * [dw] Co
[jira] [Comment Edited] (SOLR-14014) Allow Solr to start with Admin UI disabled
[ https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989623#comment-16989623 ] Jan Høydahl edited comment on SOLR-14014 at 12/6/19 10:41 AM: -- {quote}Having the convenience of the admin UI has led us to neglect our APIs. {quote} That's a simplification and no excuse for designing bad APIs, but I get your point that you don't feel the pain of awkward APIs every day if you always just use the UI. But it is anyway not an argument to remove the UI. Remember where we came from with JSP and no APIs - the only way to do certain things was through inline Java code in those JSPs (yuck!). I support the idea of a way to disable Admin UI for those that do not use it anyway. I think too that something like {{-DenableAdminUI=false}} is a better value. Also there should be no reason to disable it by default. The presence of the UI is no threat in itself, it is in the moment an Admin person loads it and becomes victim of XSS, cliks a link etc that it can hurt the Solr server. My proposal is thus to educate the user through the AdminUI itself by adding a big fat INFO message on top of the dashboard that everyone will see on first use of the UI. The message will be something like this: {quote} *IMPORTANT NOTICE* This is the Solr Administrative interface. It is a HTML5 application running in your browser. It talks to the Apache Solr server using HTTP calls, just as any other client. The UI gives great power, and can open up new security threats such as XSS attacks, if you as an administrator is not very careful when using it. Please read our recommendations in the Reference Guide on what precautions to take. The most important are: * Require some form of authentication to Solr * Use a separate web browser for Solr, do not load other web sites in other tabs * Log out when you are done * Keep up to date on CVE vulnerabilities and keep Solr updated If you do not need the Admin UI, it can be disabled by starting Solr with the System property {{-DenableAdminUI=false}}. WARNING: Your Solr instance is not protected by Authentication. WARNING: Your Solr instance does not use SSL. WARNING: Your Solr instance allows config edit though REST API WARNING: There is a newer version of Solr available, consider upgrading [Learn more about securing Solr] [Dismiss. We'll set a cookie and not show this again]{quote} This would probably be a better channel to reach out to Admins than both the Ref-guide, mailing list and the Web page combined :) was (Author: janhoy): {quote}Having the convenience of the admin UI has led us to neglect our APIs. {quote} That's a simplification and no excuse for designing bad APIs, but I get your point that you don't feel the pain of awkward APIs every day if you always just use the UI. But it is anyway not an argument to remove the UI. Remember where we came from with JSP and no APIs - the only way to do certain things was through inline Java code in those JSPs (yuck!). I support the idea of a way to disable Admin UI for those that do not use it anyway. I think too that something like {{-DenableAdminUI=false}} is a better value. Also there should be no reason to disable it by default. The presence of the UI is no threat in itself, it is in the moment an Admin person loads it and becomes victim of XSS, cliks a link etc that it can hurt the Solr server. My proposal is thus to educate the user through the AdminUI itself by adding a big fat INFO message on top of the dashboard that everyone will see. The message will be something like this: {noformat} IMPORTANT NOTICE This is the Solr Administrative interface. It is a HTML5 application running in your browser. It talks to the Apache Solr server using HTTP calls, just as any other client. The UI gives great power, and can open up new security threats such as XSS attacks, if you as an administrator is not very careful when using it. Please read our recommendations in the Reference Guide on what precautions to take. The most important are: * Require some form of authentication to Solr * Use a separate web browser for Solr, do not load other web sites in other tabs * Log out when you are done * Keep up to date on CVE vulnerabilities and keep Solr updated If you do not need the Admin UI, it can be disabled by starting Solr with the System property -DenableAdminUI=false. WARNING: Your Solr instance is not protected by Authentication. WARNING: Your Solr instance does not use SSL. WARNING: Your Solr instance allows config edit though REST API WARNING: There is a newer version of Solr available, consider upgrading [Learn more about securing Solr] [Dismiss. We'll set a cookie and not show this again]{noformat} This would probably be a better channel to reach out to Admins than both the Ref-guide, mailing list and the Web page combined :) > Allo
[jira] [Commented] (SOLR-13985) bind to localhost by default
[ https://issues.apache.org/jira/browse/SOLR-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989630#comment-16989630 ] Jan Høydahl commented on SOLR-13985: [~uschindler] You almost had a patch ready to replace Jetty's start.jar with a solr.jar which moves all jetty xml configs into our own Java class instead. Is this a good time to pick it up again, would think that it would give us full control of what to bind to as well? I don't think it is as risky as it sounds like. We just do the Jetty init and servlet wirings from code instead of from xml. We already to this for our tests. > bind to localhost by default > > > Key: SOLR-13985 > URL: https://issues.apache.org/jira/browse/SOLR-13985 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Priority: Major > Attachments: SOLR-13985.patch > > > Currently solr binds to all interfaces by default. > The default should be safer, so that e.g. the user is not exposed to the > internet until they make an explicit step to do so. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-13985) bind to localhost by default
[ https://issues.apache.org/jira/browse/SOLR-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989630#comment-16989630 ] Jan Høydahl edited comment on SOLR-13985 at 12/6/19 10:54 AM: -- [~uschindler] You almost had a patch ready to replace Jetty's start.jar with a solr.jar which moves all jetty xml configs into our own Java class instead. Is this a good time to pick it up again, would think that it would give us full control of what to bind to as well? I don't think it is as risky as it sounds like. We just do the Jetty init and servlet wirings from code instead of from xml. We already to this for our tests. *EDIT*: Ok I just saw SOLR-13984 which is exactly about this was (Author: janhoy): [~uschindler] You almost had a patch ready to replace Jetty's start.jar with a solr.jar which moves all jetty xml configs into our own Java class instead. Is this a good time to pick it up again, would think that it would give us full control of what to bind to as well? I don't think it is as risky as it sounds like. We just do the Jetty init and servlet wirings from code instead of from xml. We already to this for our tests. > bind to localhost by default > > > Key: SOLR-13985 > URL: https://issues.apache.org/jira/browse/SOLR-13985 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Priority: Major > Attachments: SOLR-13985.patch > > > Currently solr binds to all interfaces by default. > The default should be safer, so that e.g. the user is not exposed to the > internet until they make an explicit step to do so. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
[ https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989645#comment-16989645 ] ASF subversion and git services commented on SOLR-13990: Commit 2387bb9d60ae44eeeb4fbcb2f2877f46be5303a0 in lucene-solr's branch refs/heads/gradle-master from Anshum Gupta [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=2387bb9 ] SOLR-13990: Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API (#1050) > Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API > --- > > Key: SOLR-13990 > URL: https://issues.apache.org/jira/browse/SOLR-13990 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Anshum Gupta >Assignee: Anshum Gupta >Priority: Major > Time Spent: 1h 10m > Remaining Estimate: 0h > > Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 > API. > About aalto-xml: > Aalto XML processor is an ultra-high performance next generation Stax XML > processor implementation, implementing both basic Stax API > ({{javax.xml.stream}}) and Stax2 API extension > ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13954) Embedded ZooKeeper in Solr fails to load JettyAdminServer
[ https://issues.apache.org/jira/browse/SOLR-13954?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989648#comment-16989648 ] ASF subversion and git services commented on SOLR-13954: Commit 7417fa1cf3a7875b76419793a38080059f52b1fc in lucene-solr's branch refs/heads/gradle-master from Jan Høydahl [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=7417fa1 ] SOLR-13954: Embedded ZooKeeper in Solr now does not try to load JettyAdminServer (#1059) > Embedded ZooKeeper in Solr fails to load JettyAdminServer > - > > Key: SOLR-13954 > URL: https://issues.apache.org/jira/browse/SOLR-13954 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 8.2, 8.3 >Reporter: Colvin Cowie >Assignee: Jan Høydahl >Priority: Minor > Labels: ZooKeeper > Fix For: 8.4 > > Time Spent: 20m > Remaining Estimate: 0h > > Running solr with the embedded zookeeper, e.g. when running _solr -e cloud_ > results in a ClassNotFoundException / NoClassDefFoundError in the log as > below. The server still functions correctly (except JettyAdminServer won't > work obviously), but it _looks_ like a problem, and isn't good for a first > time user to see > {noformat} > 2019-11-21 17:25:14.292 INFO (main) [ ] o.a.s.c.SolrZkServer STARTING > EMBEDDED STANDALONE ZOOKEEPER SERVER at port 9983 > 2019-11-21 17:25:14.792 INFO (main) [ ] o.a.s.c.ZkContainer Zookeeper > client=localhost:9983 > 2019-11-21 > 17:25:18.833 WARN (Thread-13) [ ] o.a.z.s.a.AdminServerFactory > Unable to load jetty, not starting JettyAdminServer => > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) > java.lang.NoClassDefFoundError: org/eclipse/jetty/server/Connector > at java.lang.Class.forName0(Native Method) ~[?:1.8.0_191] > at java.lang.Class.forName(Class.java:264) ~[?:1.8.0_191] > at > org.apache.zookeeper.server.admin.AdminServerFactory.createAdminServer(AdminServerFactory.java:43) > ~[?:?] > at > org.apache.zookeeper.server.ZooKeeperServerMain.runFromConfig(ZooKeeperServerMain.java:136) > ~[?:?] > at org.apache.solr.cloud.SolrZkServer$1.run(SolrZkServer.java:121) > ~[?:?] > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector > at > org.eclipse.jetty.webapp.WebAppClassLoader.loadClass(WebAppClassLoader.java:577) > ~[jetty-webapp-9.4.19.v20190610.jar:9.4.19.v20190610] > at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ~[?:1.8.0_191] > ... 5 more > 2019-11-21 17:25:19.365 INFO (main) [ ] o.a.s.c.c.ConnectionManager > Waiting for client to connect to ZooKeeper > 2019-11-21 17:25:19.396 INFO (zkConnectionManagerCallback-7-thread-1) [ ] > o.a.s.c.c.ConnectionManager zkClient has connected > 2019-11-21 17:25:19.396 INFO (main) [ ] o.a.s.c.c.ConnectionManager Client > is connected to ZooKeeper{noformat} > Caused by: java.lang.ClassNotFoundException: > org.eclipse.jetty.server.Connector -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13831) Support defining arbitrary autoscaling simulation scenarios
[ https://issues.apache.org/jira/browse/SOLR-13831?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989646#comment-16989646 ] ASF subversion and git services commented on SOLR-13831: Commit d2b01ef28f918e2f3575081c206203be49889501 in lucene-solr's branch refs/heads/gradle-master from Andrzej Bialecki [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=d2b01ef ] SOLR-13831: Context property _loop_iter_ should be a string in order to support variable expansion. > Support defining arbitrary autoscaling simulation scenarios > --- > > Key: SOLR-13831 > URL: https://issues.apache.org/jira/browse/SOLR-13831 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Andrzej Bialecki >Assignee: Andrzej Bialecki >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-13831.patch, SOLR-13831.patch > > > In many cases where the {{bin/solr autoscaling}} tool is used it would be > very useful to be able to specify a concrete scenario to play out, eg: > * load a snapshot (or create a simulated cluster of N nodes) > * calculate suggestions > * apply suggestions > * kill one or more nodes > * loop N times > * make some arbitrary SolrRequest-s > * save snapshot > * etc... > > This could be expressed as a very simple DSL that can be loaded from a text > file, with the following format: > {code:java} > # comments > // or comments > create_cluster numNodes=5 // inline comment > solr_request > /admin/collections?action=CREATE&name=testCollection&numShards=2&replicationFactor=2 > loop_start iterations=10 > calculate_suggestions > apply_suggestions > loop_end > save_snapshot path=/foo{code} > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14020) move hadoop hacks out of lucene TestSecurityManager into a solr one
[ https://issues.apache.org/jira/browse/SOLR-14020?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989647#comment-16989647 ] ASF subversion and git services commented on SOLR-14020: Commit 33ca971d2b5af1ee674752dd3fb76ce512299bb2 in lucene-solr's branch refs/heads/gradle-master from Robert Muir [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=33ca971 ] SOLR-14020: move hadoop hacks out of lucene TestSecurityManager into a solr one > move hadoop hacks out of lucene TestSecurityManager into a solr one > --- > > Key: SOLR-14020 > URL: https://issues.apache.org/jira/browse/SOLR-14020 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Priority: Major > Attachments: SOLR-14020.patch > > > The hadoop hacks here have a heavy toll: because we have to override some > methods like checkRead, it inserts non-jdk stack frame and breaks a lot of > JDK doPriv calls. So for example, it means permissions must be added to stuff > like /dev/random or windows fonts or all kinds of other nonsense. > This is a price only solr should pay, not lucene. Lets split the stuff out. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests
[ https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andrzej Bialecki updated SOLR-13979: Attachment: SOLR-13979.patch > Expose separate metrics for distributed and non-distributed requests > > > Key: SOLR-13979 > URL: https://issues.apache.org/jira/browse/SOLR-13979 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: metrics >Reporter: Shalin Shekhar Mangar >Assignee: Andrzej Bialecki >Priority: Major > Fix For: master (9.0), 8.4 > > Attachments: SOLR-13979.patch > > > Currently we expose metrics such as count, rate and latency on a per handler > level however for search requests there is no distinction made for distrib vs > non-distrib requests. This means that there is no way to find the count, rate > or latency of only user-sent queries. > I propose that we expose distrib vs non-distrib metrics separately. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests
[ https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989695#comment-16989695 ] Andrzej Bialecki commented on SOLR-13979: - This patch adds a set of separate "requestTimes" and "totalTime" metrics for distributed and local requests, based on the value of {{distrib}} parameter (defaults to true when in ZK mode). These metrics are added to all handlers that inherit from {{RequestHandlerBase}}. This may be probably a bit too many, we could've added it to {{SearchHandler}} only, but on the other hand there are other handlers where this info comes useful, it also ensures that these metrics are also available in other custom handlers that inherit from this class. > Expose separate metrics for distributed and non-distributed requests > > > Key: SOLR-13979 > URL: https://issues.apache.org/jira/browse/SOLR-13979 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: metrics >Reporter: Shalin Shekhar Mangar >Assignee: Andrzej Bialecki >Priority: Major > Fix For: master (9.0), 8.4 > > Attachments: SOLR-13979.patch > > > Currently we expose metrics such as count, rate and latency on a per handler > level however for search requests there is no distinction made for distrib vs > non-distrib requests. This means that there is no way to find the count, rate > or latency of only user-sent queries. > I propose that we expose distrib vs non-distrib metrics separately. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
[ https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989705#comment-16989705 ] Dawid Weiss edited comment on SOLR-13990 at 12/6/19 12:32 PM: -- Hadoop requires woodstock. Tests don't pass. ant test -Dtestcase=TestHdfsUpdateLog -Dtests.disableHdfs=false was (Author: dweiss): Hadoop requires woodstock. Tests don't pass. > Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API > --- > > Key: SOLR-13990 > URL: https://issues.apache.org/jira/browse/SOLR-13990 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Anshum Gupta >Assignee: Anshum Gupta >Priority: Major > Time Spent: 1h 10m > Remaining Estimate: 0h > > Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 > API. > About aalto-xml: > Aalto XML processor is an ultra-high performance next generation Stax XML > processor implementation, implementing both basic Stax API > ({{javax.xml.stream}}) and Stax2 API extension > ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
[ https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989705#comment-16989705 ] Dawid Weiss commented on SOLR-13990: Hadoop requires woodstock. Tests don't pass. > Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API > --- > > Key: SOLR-13990 > URL: https://issues.apache.org/jira/browse/SOLR-13990 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Anshum Gupta >Assignee: Anshum Gupta >Priority: Major > Time Spent: 1h 10m > Remaining Estimate: 0h > > Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 > API. > About aalto-xml: > Aalto XML processor is an ultra-high performance next generation Stax XML > processor implementation, implementing both basic Stax API > ({{javax.xml.stream}}) and Stax2 API extension > ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Dawid Weiss updated LUCENE-9077: Description: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * (/) Port other settings and randomizations from common-build.xml * [dw] Configure security policy/ sandboxing for tests. * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid it'll be difficult to run it sensibly because gradle doesn't offer cwd separation for the forked test runners. * jar checksums, jar checksum computation and validation. This should be done without intermediate folders (directly on dependency sets). * add a :helpDeps explanation to how the dependency system works (palantir plugin, lockfile) and how to retrieve structured information about current dependencies of a given module (in a tree-like output). * if you diff solr packaged distribution against ant-created distribution there are minor differences in library versions and some JARs are excluded/ moved around. I didn't try to force these as everything seems to work (tests, etc.) – perhaps these differences should be fixed in the ant build instead. * identify and list precommit tasks so that they can be ported one by one. (Mark's branch has some of this stuff already implemented) * identify and port any other "check" utilities that may be called from ant. (Mark's branch has some of this stuff already implemented) * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, precompiled automata, etc.) * add rendering of javadocs (gradlew javadoc) and attaching them to maven publications. * fill in POM details in gradle/defaults-maven.gradle so that they reflect the previous content better (dependencies aside). * Add any IDE integration layers that should be added (I use IntelliJ and it imports the project out of the box, without the need for any special tuning). * *Clean up dependencies, especially for Solr*: any \{ transitive = false } should just explicitly exclude whatever they don't need (and their dependencies currently declared explicitly should be folded). Figure out which scope to import a dependency to. * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently XSLT...) * I didn't bother adding Solr dist/test-framework to packaging (who'd use it from a binary distribution? * ant build uses 'tempDir' system property: this is only used in a few places and is really irrelevant (should be just a regular temporary directory). *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and Cao Mạnh Đạt but also applies lessons learned from those two efforts: * *Do not try to do too many things at once*. If we deviate too far from master, the branch will be hard to merge. * *Do everything in baby-steps* and add small, independent build fragments replacing the old ant infrastructure. * *Try to engage people to run, test and contribute early*. It can't be a one-man effort. The more people understand and can contribute to the build, the more healthy it will be. was: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * [dw] Port other settings and randomizations from common-build.xml * [dw] Con
[jira] [Updated] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Dawid Weiss updated LUCENE-9077: Description: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * (/) Port other settings and randomizations from common-build.xml * [dw] Configure security policy/ sandboxing for tests. * Full test's console output on failure? * jar checksums, jar checksum computation and validation. This should be done without intermediate folders (directly on dependency sets). * add a :helpDeps explanation to how the dependency system works (palantir plugin, lockfile) and how to retrieve structured information about current dependencies of a given module (in a tree-like output). * identify and list precommit tasks so that they can be ported one by one. (Mark's branch has some of this stuff already implemented) * Of lesser importance: * add rendering of javadocs (gradlew javadoc) and attaching them to maven publications. * Repro-line for failed tests/ runs. * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid it'll be difficult to run it sensibly because gradle doesn't offer cwd separation for the forked test runners. * if you diff solr packaged distribution against ant-created distribution there are minor differences in library versions and some JARs are excluded/ moved around. I didn't try to force these as everything seems to work (tests, etc.) – perhaps these differences should be fixed in the ant build instead. * identify and port any other "check" utilities that may be called from ant. (Mark's branch has some of this stuff already implemented) * [EOE] identify and port various "regenerate" tasks from ant builds (javacc, precompiled automata, etc.) * fill in POM details in gradle/defaults-maven.gradle so that they reflect the previous content better (dependencies aside). * Add any IDE integration layers that should be added (I use IntelliJ and it imports the project out of the box, without the need for any special tuning). * *Clean up dependencies, especially for Solr*: any \{ transitive = false } should just explicitly exclude whatever they don't need (and their dependencies currently declared explicitly should be folded). Figure out which scope to import a dependency to. * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; currently XSLT...) * I didn't bother adding Solr dist/test-framework to packaging (who'd use it from a binary distribution? *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and Cao Mạnh Đạt but also applies lessons learned from those two efforts: * *Do not try to do too many things at once*. If we deviate too far from master, the branch will be hard to merge. * *Do everything in baby-steps* and add small, independent build fragments replacing the old ant infrastructure. * *Try to engage people to run, test and contribute early*. It can't be a one-man effort. The more people understand and can contribute to the build, the more healthy it will be. was: This task focuses on providing gradle-based build equivalent for Lucene and Solr (on master branch). See notes below on why this respin is needed. The code lives on *gradle-master* branch. It is kept with sync with *master*. Try running the following to see an overview of helper guides concerning typical workflow, testing and ant-migration helpers: gradlew :help A list of items that needs to be added or requires work. If you'd like to work on any of these, please add your name to the list. Once you have a patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. * (/) Apply forbiddenAPIs * (/) Generate hardware-aware gradle defaults for parallelism (count of workers and test JVMs). * (/) Fail the build if --tests filter is applied and no tests execute during the entire build (this allows for an empty set of filtered tests at single project level). * (/) Port other settings and randomizations from common-build.xml * [dw] Configure security policy/ sandboxing for tests.
[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989726#comment-16989726 ] Joel Bernstein commented on SOLR-14021: --- There appears to be growing consensus among committers that it's time to start removing features so committers can have a manageable system to maintain. HDFS has come up a number of times as needing to be removed. The HDFS tests have not been maintained over years and fail frequently. We need to start removing features that no one cares about enough to even maintain the tests. > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Created] (SOLR-14024) Invalid html generated by changes2html.pl
Andras Salamon created SOLR-14024: - Summary: Invalid html generated by changes2html.pl Key: SOLR-14024 URL: https://issues.apache.org/jira/browse/SOLR-14024 Project: Solr Issue Type: Bug Security Level: Public (Default Security Level. Issues are Public) Reporter: Andras Salamon I've validated the Changes.html file generated by the [changes2html.pl|https://github.com/apache/lucene-solr/blob/master/lucene/site/changes/changes2html.pl] file, and https://validator.w3.org/ listed hundreds of errors. The script should validate a valid HTML. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] asalamon74 opened a new pull request #1060: SOLR-14024: Invalid html generated by changes2html.pl
asalamon74 opened a new pull request #1060: SOLR-14024: Invalid html generated by changes2html.pl URL: https://github.com/apache/lucene-solr/pull/1060 # Description changes2html.pl generates invalid html # Solution Fix it to generate a valid html. # Tests Created the html and tested it using https://validator.w3.org/ # Checklist Please review the following and check all that apply: - [x] I have reviewed the guidelines for [How to Contribute](https://wiki.apache.org/solr/HowToContribute) and my code conforms to the standards described there to the best of my ability. - [x] I have created a Jira issue and added the issue ID to my pull request title. - [x] I am authorized to contribute this code to the ASF and have removed any code I do not have a license to distribute. - [x] I have given Solr maintainers [access](https://help.github.com/en/articles/allowing-changes-to-a-pull-request-branch-created-from-a-fork) to contribute to my PR branch. (optional but recommended) - [x] I have developed this patch against the `master` branch. - [x] I have run `ant precommit` and the appropriate test suite. - [ ] I have added tests for my changes. - [ ] I have added documentation for the [Ref Guide](https://github.com/apache/lucene-solr/tree/master/solr/solr-ref-guide) (for Solr changes only). This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] gerlowskija commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup
gerlowskija commented on a change in pull request #1058: SOLR-13972: Warn about insecure settings on startup URL: https://github.com/apache/lucene-solr/pull/1058#discussion_r354818496 ## File path: solr/core/src/java/org/apache/solr/core/CoreContainer.java ## @@ -897,6 +899,20 @@ private void reloadSecurityProperties() { initializeAuditloggerPlugin((Map) securityConfig.getData().get("auditlogging")); } + private void warnUsersIfSecurityDisabled() { +if (authenticationPlugin == null || authorizationPlugin == null) { + log.warn("Not all security plugins configured! authentication={} authorization={}. Solr is only as secure as " + + "you make it. Consider configuring authentication/authorization before exposing Solr to users internal or " + + "external. See https://lucene.apache.org/solr/guide/authentication-and-authorization-plugins.html for more info", Review comment: Sure. This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989726#comment-16989726 ] Joel Bernstein edited comment on SOLR-14021 at 12/6/19 1:00 PM: There appears to be growing consensus among committers that it's time to start removing features so committers can have a manageable system to maintain. HDFS has come up a number of times as needing to be removed. The HDFS tests have not been maintained over the years and fail frequently. We need to start removing features that no one cares about enough to even maintain the tests. was (Author: joel.bernstein): There appears to be growing consensus among committers that it's time to start removing features so committers can have a manageable system to maintain. HDFS has come up a number of times as needing to be removed. The HDFS tests have not been maintained over years and fail frequently. We need to start removing features that no one cares about enough to even maintain the tests. > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] gerlowskija edited a comment on issue #1058: SOLR-13972: Warn about insecure settings on startup
gerlowskija edited a comment on issue #1058: SOLR-13972: Warn about insecure settings on startup URL: https://github.com/apache/lucene-solr/pull/1058#issuecomment-562564527 > I hoped we had a way to only log such warning if Solr is bound to a public network. I'd rather keep that sort of logic out of it. I can imagine situations where Solr is nominally bound to "localhost", but is actually exposed more broadly because of traffic forwarding, iptables rules, etc. (I'm not the strongest network guy - if someone wants to argue with me that this isn't possible and we can always rely that localhost-binding == no-need-for-auth I'm happy to be corrected.) This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] gerlowskija commented on issue #1058: SOLR-13972: Warn about insecure settings on startup
gerlowskija commented on issue #1058: SOLR-13972: Warn about insecure settings on startup URL: https://github.com/apache/lucene-solr/pull/1058#issuecomment-562564527 > I hoped we had a way to only log such warning if Solr is bound to a public network. I'd rather keep that sort of logic out of it. I can imagine situations where Solr is nominally bound to "localhost", but is actually exposed more broadly because of traffic forwarding, iptables rules, etc. (I'm not the strongest network guy - if someone wants to argue with me that this isn't possible and we can always rely that localhost-binding == no-need-for-auth I'm happy to be corrected.) This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989742#comment-16989742 ] Joel Bernstein commented on SOLR-14021: --- I think anything that either is associated with a failing test or has no test should be removed. If there are parts of HDFS support that have working tests and there is consensus about letting them remain, then it makes sense to keep those parts. > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Joel Bernstein updated SOLR-14021: -- Description: This ticket will remove HDFS support from the Solr project. There appears to be growing consensus among committers that it's time to start removing features so committers can have a manageable system to maintain. HDFS has come up a number of times as needing to be removed. The HDFS tests have not been maintained over the years and fail frequently. We need to start removing features that no one cares about enough to even maintain the tests. was:This ticket will remove HDFS support from the Solr project. > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. > There appears to be growing consensus among committers that it's time to > start removing features so committers can have a manageable system to > maintain. HDFS has come up a number of times as needing to be removed. The > HDFS tests have not been maintained over the years and fail frequently. We > need to start removing features that no one cares about enough to even > maintain the tests. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Issue Comment Deleted] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Joel Bernstein updated SOLR-14021: -- Comment: was deleted (was: There appears to be growing consensus among committers that it's time to start removing features so committers can have a manageable system to maintain. HDFS has come up a number of times as needing to be removed. The HDFS tests have not been maintained over the years and fail frequently. We need to start removing features that no one cares about enough to even maintain the tests.) > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. > There appears to be growing consensus among committers that it's time to > start removing features so committers can have a manageable system to > maintain. HDFS has come up a number of times as needing to be removed. The > HDFS tests have not been maintained over the years and fail frequently. We > need to start removing features that no one cares about enough to even > maintain the tests. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14021) Remove HDFS support from Solr
[ https://issues.apache.org/jira/browse/SOLR-14021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989753#comment-16989753 ] Erick Erickson commented on SOLR-14021: --- For backups etc., maybe this Jira might be relevant? It looks like a major effort though. > Remove HDFS support from Solr > - > > Key: SOLR-14021 > URL: https://issues.apache.org/jira/browse/SOLR-14021 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: hdfs >Reporter: Joel Bernstein >Priority: Major > > This ticket will remove HDFS support from the Solr project. > There appears to be growing consensus among committers that it's time to > start removing features so committers can have a manageable system to > maintain. HDFS has come up a number of times as needing to be removed. The > HDFS tests have not been maintained over the years and fail frequently. We > need to start removing features that no one cares about enough to even > maintain the tests. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled
[ https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989758#comment-16989758 ] Jason Gerlowski commented on SOLR-14014: bq. I don't like it; I liken it to removing useful features just because of the possibility of bugs. I don't think that comparison is accurate. The proposal here isn't to rip out the Admin UI, it's just to add a feature flag for it. No one's suggesting removing features. We should 100% fix the problems we know about in the Admin UI, and this shouldn't replace that work. I'd like to think that work will prevent all future UI vulnerabilities but we've been wrong so many times recently that it seems prudent to give our users a safety net just in case. Other thoughts. 1. Don't feel strongly about the name. +1 to {{enableAdminUI}} if people like that. 2. I don't feel strongly about whether the UI is enabled/disabled by default. A smarter option (maybe?) would be to have this ticket set the default to "disabled" and make changing the default back to "enabled" be a part of SOLR-13987. That way the UI being enabled (by default) would be contingent on fixing the XSS exploit paths. But again, I think the important thing is getting a feature flag in, I think the default is secondary. > Allow Solr to start with Admin UI disabled > -- > > Key: SOLR-14014 > URL: https://issues.apache.org/jira/browse/SOLR-14014 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: Admin UI, security >Affects Versions: master (9.0), 8.3.1 >Reporter: Jason Gerlowski >Priority: Major > > Currently Solr always runs the Admin UI. With the history of XSS issues and > other security concerns that have been found in the Admin UI, Solr should > offer a mode where the Admin UI is disabled. Maybe, and this is a topic > that'll need some serious discussion, this should even be the default when > Solr starts. > NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even > with the Admin UI disabled, Solr will still be inherently unsafe without > firewall protection on a public network. > *Proposed design:* > A java system property called *headless* will be used as an internal flag for > starting Solr in headless mode. This property will default to true. A java > property can be used at startup to set this flag to false. > Here is an example: > {code:java} > bin/solr start -Dheadless=false {code} > A message will be added following startup describing the mode. > In headless mode the following message will be displayed: > "solr is running in headless mode. The admin console is unavailable. To to > turn off headless mode and allow the admin console use the following > parameter startup parameter: > -Dheadless=false > > In non-headless mode the following message will be displayed: > "solr is running with headless mode turned off. The admin console is > available in this mode. Disabling the Admin UI removes XSS and other attack > vectors" > If a user attempts to access the admin console while Solr is in headless mode > it Solr will return 401 unauthorized. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-14014) Allow Solr to start with Admin UI disabled
[ https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989758#comment-16989758 ] Jason Gerlowski edited comment on SOLR-14014 at 12/6/19 1:35 PM: - bq. I don't like it; I liken it to removing useful features just because of the possibility of bugs. I don't think that comparison is accurate. The proposal here isn't to rip out the Admin UI, it's just to add a feature flag for it. No one's suggesting removing features. We should 100% fix the problems we know about in the Admin UI, and this shouldn't replace that work. I'd like to think that work will prevent all future UI vulnerabilities but we've been wrong so many times recently that it seems prudent to give our users a safety net just in case. Other thoughts. 1. Don't feel strongly about the name. +1 to {{enableAdminUI}} if people like that. 2. I don't feel strongly about whether the UI is enabled/disabled by default. A smarter option (maybe?) would be to have this ticket set the default to "disabled" and make changing the default back to "enabled" be a part of SOLR-13987. That way the UI being enabled (by default) would be contingent on fixing the XSS exploit paths. But again, I think the important thing is getting a feature flag in, I think the default is secondary. 3. +1 to Jan's warnings and documentation suggestions. was (Author: gerlowskija): bq. I don't like it; I liken it to removing useful features just because of the possibility of bugs. I don't think that comparison is accurate. The proposal here isn't to rip out the Admin UI, it's just to add a feature flag for it. No one's suggesting removing features. We should 100% fix the problems we know about in the Admin UI, and this shouldn't replace that work. I'd like to think that work will prevent all future UI vulnerabilities but we've been wrong so many times recently that it seems prudent to give our users a safety net just in case. Other thoughts. 1. Don't feel strongly about the name. +1 to {{enableAdminUI}} if people like that. 2. I don't feel strongly about whether the UI is enabled/disabled by default. A smarter option (maybe?) would be to have this ticket set the default to "disabled" and make changing the default back to "enabled" be a part of SOLR-13987. That way the UI being enabled (by default) would be contingent on fixing the XSS exploit paths. But again, I think the important thing is getting a feature flag in, I think the default is secondary. > Allow Solr to start with Admin UI disabled > -- > > Key: SOLR-14014 > URL: https://issues.apache.org/jira/browse/SOLR-14014 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: Admin UI, security >Affects Versions: master (9.0), 8.3.1 >Reporter: Jason Gerlowski >Priority: Major > > Currently Solr always runs the Admin UI. With the history of XSS issues and > other security concerns that have been found in the Admin UI, Solr should > offer a mode where the Admin UI is disabled. Maybe, and this is a topic > that'll need some serious discussion, this should even be the default when > Solr starts. > NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even > with the Admin UI disabled, Solr will still be inherently unsafe without > firewall protection on a public network. > *Proposed design:* > A java system property called *headless* will be used as an internal flag for > starting Solr in headless mode. This property will default to true. A java > property can be used at startup to set this flag to false. > Here is an example: > {code:java} > bin/solr start -Dheadless=false {code} > A message will be added following startup describing the mode. > In headless mode the following message will be displayed: > "solr is running in headless mode. The admin console is unavailable. To to > turn off headless mode and allow the admin console use the following > parameter startup parameter: > -Dheadless=false > > In non-headless mode the following message will be displayed: > "solr is running with headless mode turned off. The admin console is > available in this mode. Disabling the Admin UI removes XSS and other attack > vectors" > If a user attempts to access the admin console while Solr is in headless mode > it Solr will return 401 unauthorized. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Created] (SOLR-14026) Upgrade Jetty to 9.4.24.v20191120
Erick Erickson created SOLR-14026: - Summary: Upgrade Jetty to 9.4.24.v20191120 Key: SOLR-14026 URL: https://issues.apache.org/jira/browse/SOLR-14026 Project: Solr Issue Type: Improvement Security Level: Public (Default Security Level. Issues are Public) Reporter: Erick Erickson Assignee: Erick Erickson Prompted by the linked JIRA. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
[ https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989762#comment-16989762 ] Erick Erickson commented on SOLR-13974: --- We should make the Jetty upgrade its own Jira for tracking purposes. > Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error > -- > > Key: SOLR-13974 > URL: https://issues.apache.org/jira/browse/SOLR-13974 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: http2 >Affects Versions: 8.3, 8.3.1 >Reporter: Jacek Kikiewicz >Priority: Major > > We are running a solrcloud clusters with Solr 8.3 , from time to time during > data import we see following errors in solr log: > {code:java} > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error at > org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189) > at > org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096) > at > org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78) > at > org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198) > at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at > org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at > org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424) > at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610) > at > org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311) > at > org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602) > at > org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) > at > org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) > at > org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) > at > org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) > at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) > at > org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) > at > org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249) > at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) > at > org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220) > at > org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at org.eclipse.jetty.server.Server.handle(Server.java:505) at > org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at > org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) > at > org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) > at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at > org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126) > at > org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(
[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
[ https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989764#comment-16989764 ] Erick Erickson commented on SOLR-13974: --- This'll be awkward to test. [~jaceq] If we upgraded jetty, would you be able/willing to test before we release the next version of Solr? > Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error > -- > > Key: SOLR-13974 > URL: https://issues.apache.org/jira/browse/SOLR-13974 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: http2 >Affects Versions: 8.3, 8.3.1 >Reporter: Jacek Kikiewicz >Priority: Major > > We are running a solrcloud clusters with Solr 8.3 , from time to time during > data import we see following errors in solr log: > {code:java} > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error at > org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189) > at > org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096) > at > org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78) > at > org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198) > at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at > org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at > org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424) > at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610) > at > org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311) > at > org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602) > at > org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) > at > org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) > at > org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) > at > org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) > at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) > at > org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) > at > org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249) > at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) > at > org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220) > at > org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at org.eclipse.jetty.server.Server.handle(Server.java:505) at > org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at > org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) > at > org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) > at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at > org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126) > at > org
[jira] [Created] (SOLR-14027) Zookeeper Status Page does not work with SSL Enabled Zookeeper
Ryan Rockenbaugh created SOLR-14027: --- Summary: Zookeeper Status Page does not work with SSL Enabled Zookeeper Key: SOLR-14027 URL: https://issues.apache.org/jira/browse/SOLR-14027 Project: Solr Issue Type: Bug Security Level: Public (Default Security Level. Issues are Public) Components: Admin UI Affects Versions: 8.3.1, 8.3, 8.2 Reporter: Ryan Rockenbaugh In class org.apache.solr.handler.admin.ZookeeperStatusHandler, method getZkRawResponse uses a standard java.net.Socket to communicate with Zookeeper and get the status. This does not work for SSL-Enabled zookeeper communication. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection
gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection URL: https://github.com/apache/lucene-solr/pull/1015#issuecomment-562586282 > Current apis do not allow modifying a configset if it is not associated with a collection/core For cases where a configset is created, modified and then used this is necessary If you're uploading and modifying the configset before it's ever used, why wouldn't you just make your edits locally before uploading the configset? Is there a particular use-case I'm missing here? This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection
gerlowskija commented on issue #1015: SOLR-13936 : expose endpoint to support changing schema without collection URL: https://github.com/apache/lucene-solr/pull/1015#issuecomment-562591284 Two other comments/concerns: 1. This PR adds a new API for modifying configsets, but AFAICT it doesn't deprecate the old configset API. We aren't going to want to maintain two APIs going forward, are we? If we really want/need this new API we should deprecate the old one. 2. There's no documentation for the new API at all. This should be covered _somewhere_ in the ref guide. This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection
[ https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989818#comment-16989818 ] Jason Gerlowski commented on SOLR-13936: I put a similar comment on your PR, but I'm not sure I see the use case for this API. If you want the ability to upload a config and then modify it before it's ever used, couldn't you just do the edits locally and upload the configset the way you actually intend to use it? I'm not against the new API necessarily. I just wonder whether it's worth the increased API surface area without a clear use case. > Schema/Config endpoints to modify configset with no core/collection > --- > > Key: SOLR-13936 > URL: https://issues.apache.org/jira/browse/SOLR-13936 > Project: Solr > Issue Type: New Feature > Security Level: Public(Default Security Level. Issues are Public) > Components: config-api >Reporter: Apoorv Bhawsar >Priority: Minor > Time Spent: 1h 20m > Remaining Estimate: 0h > > All schema/config configurations should work even in cases where a collection > is not associated with them > This jira will involve > 1. Refactoring existing handler/manager to work without {{SolrCore}} > 2. Adding {{/api/cluster}} endpoints to support such modifications > Endpoints - > * {{/api/cluster/configset/\{name}/schema}} > * {{/ap/cluster/configset/\{name}/config}} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection
[ https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989818#comment-16989818 ] Jason Gerlowski edited comment on SOLR-13936 at 12/6/19 2:32 PM: - I put a similar comment on your PR, but I'm not sure I see the use case for this API. If you want the ability to upload a config and then modify it before it's ever used, couldn't you just do the edits locally and upload the configset the way you actually intend to use it? I'm not against the new API necessarily. I just wonder whether it's worth the increased API surface area since I don't understand the use case yet. was (Author: gerlowskija): I put a similar comment on your PR, but I'm not sure I see the use case for this API. If you want the ability to upload a config and then modify it before it's ever used, couldn't you just do the edits locally and upload the configset the way you actually intend to use it? I'm not against the new API necessarily. I just wonder whether it's worth the increased API surface area without a clear use case. > Schema/Config endpoints to modify configset with no core/collection > --- > > Key: SOLR-13936 > URL: https://issues.apache.org/jira/browse/SOLR-13936 > Project: Solr > Issue Type: New Feature > Security Level: Public(Default Security Level. Issues are Public) > Components: config-api >Reporter: Apoorv Bhawsar >Priority: Minor > Time Spent: 1h 20m > Remaining Estimate: 0h > > All schema/config configurations should work even in cases where a collection > is not associated with them > This jira will involve > 1. Refactoring existing handler/manager to work without {{SolrCore}} > 2. Adding {{/api/cluster}} endpoints to support such modifications > Endpoints - > * {{/api/cluster/configset/\{name}/schema}} > * {{/ap/cluster/configset/\{name}/config}} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data
[ https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989832#comment-16989832 ] Jason Gerlowski commented on SOLR-13942: I echo some of Anshum and Jan's concerns here. Good ZooKeeper clients abound. We ship one in the current Solr distribution, and we provide support for some ZK commands in {{bin/solr}} itself. I don't see the use case to add API surface area to provide yet-another way to access ZooKeeper. ZooKeeper access is only intended for administrators, and there are plenty of other tools that allow them to do that just fine right now. > /api/cluster/zk/* to fetch raw ZK data > -- > > Key: SOLR-13942 > URL: https://issues.apache.org/jira/browse/SOLR-13942 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Noble Paul >Priority: Major > > If the requested path is a node with children show the list of child nodes > and their meta data -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data
[ https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989836#comment-16989836 ] Erick Erickson edited comment on SOLR-13942 at 12/6/19 2:49 PM: How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at the functionality, just askin'. I also loathe having a zillion ways to do things that we then have to support. I realize that this won't need you to drop into a terminal and be able to execute bin/solr, but is that enough of a benefit? was (Author: erickerickson): How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at the functionality, just askin'. I also loathe having a zillion ways to do things that we then have to support. > /api/cluster/zk/* to fetch raw ZK data > -- > > Key: SOLR-13942 > URL: https://issues.apache.org/jira/browse/SOLR-13942 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Noble Paul >Priority: Major > > If the requested path is a node with children show the list of child nodes > and their meta data -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14001: Attachment: SOLR-14001.patch > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680) > at javax.security.auth.login.LoginContext.login(LoginContext.java:587) > at > org.apache.hadoop.security.UserGroupInform
[jira] [Assigned] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden reassigned SOLR-14001: --- Assignee: Kevin Risden > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680) > at javax.security.auth.login.LoginContext.login(LoginContext.java:587) > at > org.apache.hadoop.security.UserGroupInfor
[jira] [Commented] (SOLR-13942) /api/cluster/zk/* to fetch raw ZK data
[ https://issues.apache.org/jira/browse/SOLR-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989836#comment-16989836 ] Erick Erickson commented on SOLR-13942: --- How does this improve "bin/solr zk blah blah blah"? I admit I haven't looked at the functionality, just askin'. I also loathe having a zillion ways to do things that we then have to support. > /api/cluster/zk/* to fetch raw ZK data > -- > > Key: SOLR-13942 > URL: https://issues.apache.org/jira/browse/SOLR-13942 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Noble Paul >Priority: Major > > If the requested path is a node with children show the list of child nodes > and their meta data -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989838#comment-16989838 ] ASF subversion and git services commented on SOLR-14001: Commit dad933b933058c9eb39687d50b068552bd8f511a in lucene-solr's branch refs/heads/master from Kevin Risden [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=dad933b ] SOLR-14001: fix HdfsBackupRepositoryTest on windows Signed-off-by: Kevin Risden > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginConte
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989839#comment-16989839 ] ASF subversion and git services commented on SOLR-14001: Commit 81e99697d7f2f55607880f132084e8f9b479b3f7 in lucene-solr's branch refs/heads/branch_8x from Kevin Risden [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=81e9969 ] SOLR-14001: fix HdfsBackupRepositoryTest on windows Signed-off-by: Kevin Risden > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginCo
[jira] [Created] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest
Kevin Risden created SOLR-14028: --- Summary: Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest Key: SOLR-14028 URL: https://issues.apache.org/jira/browse/SOLR-14028 Project: Solr Issue Type: Test Security Level: Public (Default Security Level. Issues are Public) Components: Tests Reporter: Kevin Risden -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989844#comment-16989844 ] Kevin Risden commented on SOLR-14001: - Most of the 32 failures were due to too much logging. There are 2 tests that look to be failing but aren't HdfsBackupRepositoryTest. Created SOLR-14028 to follow up. > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security
[jira] [Resolved] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden resolved SOLR-14001. - Resolution: Fixed > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680) > at javax.security.auth.login.LoginContext.login(LoginContext.java:587) > at > org.apache.hadoop.security.UserGroupInformation$Had
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Attachment: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml > Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest > - > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml > > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989858#comment-16989858 ] Kevin Risden commented on SOLR-14028: - The weird part about this test is that C:\Users\vagrant\repos\apache\lucene-solr\solr and subdirs should already have read permissions: {code:java} access denied ("java.io.FilePermission" "C:\Users\vagrant\repos\apache\lucene-solr\solr\example\exampledocs\*.xml" "read") access denied ("java.io.FilePermission" "C:\Users\vagrant\repos\apache\lucene-solr\solr\build\solr-core\test\J0\temp\solr.util.TestSolrCLIRunExample_C3E6CF976F89E34-001\tempDir-005\failExecuteScript" "execute") ant test -Dtestcase=TestSolrCLIRunExample -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 {code} > Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest > - > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml > > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Summary: Fix test permissions for TestSolrCLIRunExample (was: Fix test permissions for TestSolrCLIRunExample and ActionThrottleTest) > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > tests-failures.txt > > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Attachment: tests-failures.txt > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > tests-failures.txt > > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Description: This was found while looking at SOLR-14001. It fails on Windows: {code:java} ant test -Dtestcase=TestSolrCLIRunExample -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 {code} > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14026) Upgrade Jetty to 9.4.24.v20191120
[ https://issues.apache.org/jira/browse/SOLR-14026?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989861#comment-16989861 ] Erick Erickson commented on SOLR-14026: --- What do people think about committing this Real Soon Now (like today or this weekend?) assuming tests pass? > Upgrade Jetty to 9.4.24.v20191120 > - > > Key: SOLR-14026 > URL: https://issues.apache.org/jira/browse/SOLR-14026 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Erick Erickson >Assignee: Erick Erickson >Priority: Major > > Prompted by the linked JIRA. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14013) javabin performance regressions
[ https://issues.apache.org/jira/browse/SOLR-14013?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989860#comment-16989860 ] Yonik Seeley commented on SOLR-14013: - Just an update... I tried speeding things up by skipping most of the above, and it did get faster, but it's still much slower. Still digging... > javabin performance regressions > --- > > Key: SOLR-14013 > URL: https://issues.apache.org/jira/browse/SOLR-14013 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Affects Versions: 7.7 >Reporter: Yonik Seeley >Assignee: Yonik Seeley >Priority: Major > Attachments: test.json > > > As noted by [~rrockenbaugh] in SOLR-13963, javabin also recently became > orders of magnitude slower in certain cases since v7.7. The cases identified > so far include large numbers of values in a field. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989862#comment-16989862 ] Kevin Risden commented on SOLR-14028: - [~rmuir] any ideas here? {code:java} {code} and from https://github.com/apache/lucene-solr/blob/master/lucene/tools/junit4/solr-tests.policy#L24 {code:java} permission java.io.FilePermission "${common-solr.dir}${/}-", "read"; {code} So idk why the following error would be reported: {code:java} access denied ("java.io.FilePermission" "C:\Users\vagrant\repos\apache\lucene-solr\solr\example\exampledocs\*.xml" "read") {code} > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989863#comment-16989863 ] Dawid Weiss commented on SOLR-14001: Kevin how do you run those hdfs tests on windows so that they don't fail with some weird native lib link error? > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
[jira] [Commented] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989866#comment-16989866 ] Dawid Weiss commented on LUCENE-9077: - I got lucene tests to run under security manager. But gradle test runner is really sensitive to "-Djava.security.debug=access,failure" (read: it's broken because it tries to capture the process output and falls into an endless loop). Makes debugging really, really hard. [https://github.com/gradle/gradle/issues/11609] > Gradle build > > > Key: LUCENE-9077 > URL: https://issues.apache.org/jira/browse/LUCENE-9077 > Project: Lucene - Core > Issue Type: Task >Reporter: Dawid Weiss >Assignee: Dawid Weiss >Priority: Major > Fix For: master (9.0) > > > This task focuses on providing gradle-based build equivalent for Lucene and > Solr (on master branch). See notes below on why this respin is needed. > The code lives on *gradle-master* branch. It is kept with sync with *master*. > Try running the following to see an overview of helper guides concerning > typical workflow, testing and ant-migration helpers: > gradlew :help > A list of items that needs to be added or requires work. If you'd like to > work on any of these, please add your name to the list. Once you have a > patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. > * (/) Apply forbiddenAPIs > * (/) Generate hardware-aware gradle defaults for parallelism (count of > workers and test JVMs). > * (/) Fail the build if --tests filter is applied and no tests execute > during the entire build (this allows for an empty set of filtered tests at > single project level). > * (/) Port other settings and randomizations from common-build.xml > * [dw] Configure security policy/ sandboxing for tests. > * Full test's console output on failure? > * jar checksums, jar checksum computation and validation. This should be > done without intermediate folders (directly on dependency sets). > * add a :helpDeps explanation to how the dependency system works (palantir > plugin, lockfile) and how to retrieve structured information about current > dependencies of a given module (in a tree-like output). > * identify and list precommit tasks so that they can be ported one by one. > (Mark's branch has some of this stuff already implemented) > * > Of lesser importance: > * add rendering of javadocs (gradlew javadoc) and attaching them to maven > publications. > * Repro-line for failed tests/ runs. > * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid > it'll be difficult to run it sensibly because gradle doesn't offer cwd > separation for the forked test runners. > * if you diff solr packaged distribution against ant-created distribution > there are minor differences in library versions and some JARs are excluded/ > moved around. I didn't try to force these as everything seems to work (tests, > etc.) – perhaps these differences should be fixed in the ant build instead. > * identify and port any other "check" utilities that may be called from ant. > (Mark's branch has some of this stuff already implemented) > * [EOE] identify and port various "regenerate" tasks from ant builds > (javacc, precompiled automata, etc.) > * fill in POM details in gradle/defaults-maven.gradle so that they reflect > the previous content better (dependencies aside). > * Add any IDE integration layers that should be added (I use IntelliJ and it > imports the project out of the box, without the need for any special tuning). > * *Clean up dependencies, especially for Solr*: any \{ transitive = false } > should just explicitly exclude whatever they don't need (and their > dependencies currently declared explicitly should be folded). Figure out > which scope to import a dependency to. > * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; > currently XSLT...) > * I didn't bother adding Solr dist/test-framework to packaging (who'd use it > from a binary distribution? > > *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and > Cao Mạnh Đạt but also applies lessons learned from those two efforts: > * *Do not try to do too many things at once*. If we deviate too far from > master, the branch will be hard to merge. > * *Do everything in baby-steps* and add small, independent build fragments > replacing the old ant infrastructure. > * *Try to engage people to run, test and contribute early*. It can't be a > one-man effort. The more people understand and can contribute to the build, > the more healthy it will be. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For a
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Attachment: security_debug-tests-failures.txt.zip > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989867#comment-16989867 ] Kevin Risden commented on SOLR-14028: - Here is the security debug run: {code:java} ant test -Dtestcase=TestSolrCLIRunExample -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 -D'args="-Djava.security.debug=access,failure"' {code} [^security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip] [^security_debug-tests-failures.txt.zip] > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989869#comment-16989869 ] Kevin Risden commented on SOLR-14001: - The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It just tries to load some configurations. So it is different than any of the other HDFS tests that actually run a real cluster. > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native
[jira] [Updated] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kevin Risden updated SOLR-14028: Attachment: security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13933) Cluster mode Stress test suite
[ https://issues.apache.org/jira/browse/SOLR-13933?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989873#comment-16989873 ] Jason Gerlowski commented on SOLR-13933: bq. This suite should run nightly, Is part of this JIRA finding some place for this suite to run? Is it going to be able to run on the Apache Jenkins, or is it too heavy of a test for that to be feasible (you mention 100s of nodes)? bq. I've evaluated sundial, argo, etc. JMeter's embdedded mode also came close. Ditched all of them, as the configurations were very ugly. So, consequently, building this from scratch I'm not familiar with any of those except JMeter, and I can't recommend anything better if JMeter didn't get the job done for you. Hopefully you can avoid building it from scratch though. Ugly configuration seems preferable to a bunch of additional code to maintain. But you're the one with the context, so of course it's your best judgement. > Cluster mode Stress test suite > --- > > Key: SOLR-13933 > URL: https://issues.apache.org/jira/browse/SOLR-13933 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Assignee: Ishan Chattopadhyaya >Priority: Major > > We need a stress test harness based on 10s or 100s of nodes, 1000s of > collection API operations, overseer operations etc. This suite should run > nightly, publish results publicly, so as to help with: > # Uncover stability problems > # Benchmarking (timings, resource metrics etc.) on collection operations > # Indexing/querying performance > # Validate the accuracy of potential improvements > References: > SOLR-10317 > https://github.com/lucidworks/solr-scale-tk > https://github.com/shalinmangar/solr-perf-tools > Lucene benchmarks -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989872#comment-16989872 ] Robert Muir commented on SOLR-14028: Kevin, maybe the problem is the bogus way that I construct the common-solr.dir in the junit4 task of lucene/common-build.xml? Maybe, Probably, it does not work on windows at all. Note: its not related to the common-solr.dir you quoted from the solr build files. > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989869#comment-16989869 ] Kevin Risden edited comment on SOLR-14001 at 12/6/19 3:18 PM: -- The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It just tries to load some configurations. So it is different than any of the other HDFS tests that actually run a real cluster. Most of the HDFS tests have an assume not windows based on the following: * https://github.com/apache/lucene-solr/blob/master/solr/common-build.xml#L164 * https://github.com/apache/lucene-solr/blob/master/solr/core/src/test/org/apache/solr/cloud/hdfs/HdfsTestUtil.java HdfsBackupRepositoryTest doesn't use HdfsTestUtil since it isn't spinning up a cluster. was (Author: risdenk): The HdfsBackupRepositoryTest doesn't actually run an integration cluster. It just tries to load some configurations. So it is different than any of the other HDFS tests that actually run a real cluster. > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.a
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989876#comment-16989876 ] Robert Muir commented on SOLR-14028: also sometimes it helps to run the test with {{-Dargs="-Djava.security.debug=policy"}} in cases like this, where you think there may be some issue with the final resulting policy (after expansion and stuff). It will print what it looks like after the variable substitution and stuff. > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989879#comment-16989879 ] Kevin Risden commented on SOLR-14028: - Ok cool thanks I'll check it out. > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
[ https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989881#comment-16989881 ] Dawid Weiss commented on SOLR-13990: This failure is also related to this issue: {code:java} org.apache.solr.handler.dataimport.TestXPathEntityProcessor > testMultiValued FAILED org.apache.solr.handler.dataimport.DataImportHandlerException: Parsing failed for xml, url:testdata.xml rows processed:0 at __randomizedtesting.SeedInfo.seed([CE4E371EC10BBB2F:1A6E532C0FC9FB67]:0) at org.apache.solr.handler.dataimport.DataImportHandlerException.wrapAndThrow(DataImportHandlerException.java:69) at org.apache.solr.handler.dataimport.XPathEntityProcessor.initQuery(XPathEntityProcessor.java:331) at org.apache.solr.handler.dataimport.XPathEntityProcessor.fetchNextRow(XPathEntityProcessor.java:232) at org.apache.solr.handler.dataimport.XPathEntityProcessor.nextRow(XPathEntityProcessor.java:212) at org.apache.solr.handler.dataimport.TestXPathEntityProcessor.testMultiValued(TestXPathEntityProcessor.java:84) Caused by: java.lang.RuntimeException: com.fasterxml.aalto.WFCException: General entity reference (ü) encountered in entity expanding mode: operation not (yet) implemented at [row,col {unknown-source}]: [5,32] at org.apache.solr.handler.dataimport.XPathRecordReader.streamRecords(XPathRecordReader.java:183) at org.apache.solr.handler.dataimport.XPathEntityProcessor.initQuery(XPathEntityProcessor.java:326) ... 3 moreCaused by: com.fasterxml.aalto.WFCException: General entity reference (ü) encountered in entity expanding mode: operation not (yet) implemented at [row,col {unknown-source}]: [5,32] at com.fasterxml.aalto.in.XmlScanner.reportInputProblem(XmlScanner.java:1333) at com.fasterxml.aalto.in.ReaderScanner.handleEntityInText(ReaderScanner.java:1256) at com.fasterxml.aalto.in.ReaderScanner.nextFromTree(ReaderScanner.java:304) at com.fasterxml.aalto.stax.StreamReaderImpl.next(StreamReaderImpl.java:760) at org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:277) at org.apache.solr.handler.dataimport.XPathRecordReader$Node.handleStartElement(XPathRecordReader.java:342) at org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:306) at org.apache.solr.handler.dataimport.XPathRecordReader$Node.handleStartElement(XPathRecordReader.java:342) at org.apache.solr.handler.dataimport.XPathRecordReader$Node.parse(XPathRecordReader.java:306) at org.apache.solr.handler.dataimport.XPathRecordReader.streamRecords(XPathRecordReader.java:180) ... 4 more {code} > Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API > --- > > Key: SOLR-13990 > URL: https://issues.apache.org/jira/browse/SOLR-13990 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Anshum Gupta >Assignee: Anshum Gupta >Priority: Major > Time Spent: 1h 10m > Remaining Estimate: 0h > > Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 > API. > About aalto-xml: > Aalto XML processor is an ultra-high performance next generation Stax XML > processor implementation, implementing both basic Stax API > ({{javax.xml.stream}}) and Stax2 API extension > ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13990) Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API
[ https://issues.apache.org/jira/browse/SOLR-13990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989883#comment-16989883 ] Dawid Weiss commented on SOLR-13990: [~anshum] Could you revert this patch until it passes tests? Thanks. > Switch out woodstox-core-asl with aalto-xml and upgrade woodstox stax-2 API > --- > > Key: SOLR-13990 > URL: https://issues.apache.org/jira/browse/SOLR-13990 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Anshum Gupta >Assignee: Anshum Gupta >Priority: Major > Time Spent: 1h 10m > Remaining Estimate: 0h > > Switched out woodstox-core-asl with aalto-xml and upgrade woodstax stax-2 > API. > About aalto-xml: > Aalto XML processor is an ultra-high performance next generation Stax XML > processor implementation, implementing both basic Stax API > ({{javax.xml.stream}}) and Stax2 API extension > ({{org.codehaus.woodstox.stax2}}). In addition, it also implements SAX2 API. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14003) Refactor code to avoid reading state of replica from the data object
[ https://issues.apache.org/jira/browse/SOLR-14003?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989885#comment-16989885 ] Jason Gerlowski commented on SOLR-14003: I don't have any problems with this change necessarily, but it's hard to judge without any context. Can you explain the rationale here please?Is there something wrong with the existing getState() and isActive() methods in themselves? Is it part of a larger change you're working towards? etc. > Refactor code to avoid reading state of replica from the data object > -- > > Key: SOLR-14003 > URL: https://issues.apache.org/jira/browse/SOLR-14003 > Project: Solr > Issue Type: Sub-task > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Noble Paul >Priority: Major > > Deprecate > * {{Replica#getState()}} > * {{Replica#isActive()}} > Use an implementation of {{ReplicaStateProvider}} to fetch the state > {code:java} > /**An implementation that fetches the state of each replica in a collection > * and it also provides the leader of shards > * > */ > public interface ReplicaStateProvider { > Replica.State getState(Replica replica); > Replica getLeader(Slice slice); > boolean isActive(Replica replica); > } > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989887#comment-16989887 ] ASF subversion and git services commented on LUCENE-9077: - Commit 9ec8a86d69a8044a010f01894863eb4066f9d21b in lucene-solr's branch refs/heads/master from Dawid Weiss [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=9ec8a86 ] LUCENE-9077: Add support for running under gradle test runner. > Gradle build > > > Key: LUCENE-9077 > URL: https://issues.apache.org/jira/browse/LUCENE-9077 > Project: Lucene - Core > Issue Type: Task >Reporter: Dawid Weiss >Assignee: Dawid Weiss >Priority: Major > Fix For: master (9.0) > > > This task focuses on providing gradle-based build equivalent for Lucene and > Solr (on master branch). See notes below on why this respin is needed. > The code lives on *gradle-master* branch. It is kept with sync with *master*. > Try running the following to see an overview of helper guides concerning > typical workflow, testing and ant-migration helpers: > gradlew :help > A list of items that needs to be added or requires work. If you'd like to > work on any of these, please add your name to the list. Once you have a > patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. > * (/) Apply forbiddenAPIs > * (/) Generate hardware-aware gradle defaults for parallelism (count of > workers and test JVMs). > * (/) Fail the build if --tests filter is applied and no tests execute > during the entire build (this allows for an empty set of filtered tests at > single project level). > * (/) Port other settings and randomizations from common-build.xml > * [dw] Configure security policy/ sandboxing for tests. > * Full test's console output on failure? > * jar checksums, jar checksum computation and validation. This should be > done without intermediate folders (directly on dependency sets). > * add a :helpDeps explanation to how the dependency system works (palantir > plugin, lockfile) and how to retrieve structured information about current > dependencies of a given module (in a tree-like output). > * identify and list precommit tasks so that they can be ported one by one. > (Mark's branch has some of this stuff already implemented) > * > Of lesser importance: > * add rendering of javadocs (gradlew javadoc) and attaching them to maven > publications. > * Repro-line for failed tests/ runs. > * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid > it'll be difficult to run it sensibly because gradle doesn't offer cwd > separation for the forked test runners. > * if you diff solr packaged distribution against ant-created distribution > there are minor differences in library versions and some JARs are excluded/ > moved around. I didn't try to force these as everything seems to work (tests, > etc.) – perhaps these differences should be fixed in the ant build instead. > * identify and port any other "check" utilities that may be called from ant. > (Mark's branch has some of this stuff already implemented) > * [EOE] identify and port various "regenerate" tasks from ant builds > (javacc, precompiled automata, etc.) > * fill in POM details in gradle/defaults-maven.gradle so that they reflect > the previous content better (dependencies aside). > * Add any IDE integration layers that should be added (I use IntelliJ and it > imports the project out of the box, without the need for any special tuning). > * *Clean up dependencies, especially for Solr*: any \{ transitive = false } > should just explicitly exclude whatever they don't need (and their > dependencies currently declared explicitly should be folded). Figure out > which scope to import a dependency to. > * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; > currently XSLT...) > * I didn't bother adding Solr dist/test-framework to packaging (who'd use it > from a binary distribution? > > *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and > Cao Mạnh Đạt but also applies lessons learned from those two efforts: > * *Do not try to do too many things at once*. If we deviate too far from > master, the branch will be hard to merge. > * *Do everything in baby-steps* and add small, independent build fragments > replacing the old ant infrastructure. > * *Try to engage people to run, test and contribute early*. It can't be a > one-man effort. The more people understand and can contribute to the build, > the more healthy it will be. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lu
[jira] [Commented] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
[ https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989888#comment-16989888 ] Jacek Kikiewicz commented on SOLR-13974: Hi [~erickerickson] Sure, I am happy to test as much as I can. > Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error > -- > > Key: SOLR-13974 > URL: https://issues.apache.org/jira/browse/SOLR-13974 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: http2 >Affects Versions: 8.3, 8.3.1 >Reporter: Jacek Kikiewicz >Priority: Major > > We are running a solrcloud clusters with Solr 8.3 , from time to time during > data import we see following errors in solr log: > {code:java} > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error at > org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189) > at > org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096) > at > org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78) > at > org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198) > at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at > org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at > org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424) > at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610) > at > org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311) > at > org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602) > at > org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) > at > org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) > at > org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) > at > org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) > at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) > at > org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) > at > org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249) > at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) > at > org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220) > at > org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at org.eclipse.jetty.server.Server.handle(Server.java:505) at > org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at > org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) > at > org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) > at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at > org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126) > at > org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.r
[jira] [Commented] (SOLR-13979) Expose separate metrics for distributed and non-distributed requests
[ https://issues.apache.org/jira/browse/SOLR-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989889#comment-16989889 ] Christine Poerschke commented on SOLR-13979: Differentiation of timings for user-sent vs. within-Solr queries sounds a familiar scenario. +1 to provide separate metrics. How about also mentioning the differentiation in the reference guide, maybe in the [https://lucene.apache.org/solr/guide/8_3/performance-statistics-reference.html#commonly-used-stats-for-request-handlers] section and/or elsewhere too? > Expose separate metrics for distributed and non-distributed requests > > > Key: SOLR-13979 > URL: https://issues.apache.org/jira/browse/SOLR-13979 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: metrics >Reporter: Shalin Shekhar Mangar >Assignee: Andrzej Bialecki >Priority: Major > Fix For: master (9.0), 8.4 > > Attachments: SOLR-13979.patch > > > Currently we expose metrics such as count, rate and latency on a per handler > level however for search requests there is no distinction made for distrib vs > non-distrib requests. This means that there is no way to find the count, rate > or latency of only user-sent queries. > I propose that we expose distrib vs non-distrib metrics separately. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Comment Edited] (SOLR-13974) Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error
[ https://issues.apache.org/jira/browse/SOLR-13974?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989888#comment-16989888 ] Jacek Kikiewicz edited comment on SOLR-13974 at 12/6/19 3:32 PM: - Hi [~erickerickson] Sure, I am happy to test as much as I can. was (Author: jaceq): Hi [~erickerickson] Sure, I am happy to test as much as I can. > Solr 8.3 http2 client errors: java.io.IOException: cancel_stream_error > -- > > Key: SOLR-13974 > URL: https://issues.apache.org/jira/browse/SOLR-13974 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: http2 >Affects Versions: 8.3, 8.3.1 >Reporter: Jacek Kikiewicz >Priority: Major > > We are running a solrcloud clusters with Solr 8.3 , from time to time during > data import we see following errors in solr log: > {code:java} > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error > java.io.IOException: cancel_stream_error at > org.apache.solr.update.processor.DistributedZkUpdateProcessor.doDistribFinish(DistributedZkUpdateProcessor.java:1189) > at > org.apache.solr.update.processor.DistributedUpdateProcessor.finish(DistributedUpdateProcessor.java:1096) > at > org.apache.solr.handler.ContentStreamHandlerBase.handleRequestBody(ContentStreamHandlerBase.java:78) > at > org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:198) > at org.apache.solr.core.SolrCore.execute(SolrCore.java:2576) at > org.apache.solr.servlet.HttpSolrCall.execute(HttpSolrCall.java:803) at > org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:582) at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:424) > at > org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:351) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610) > at > org.eclipse.jetty.servlets.CrossOriginFilter.handle(CrossOriginFilter.java:311) > at > org.eclipse.jetty.servlets.CrossOriginFilter.doFilter(CrossOriginFilter.java:265) > at > org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602) > at > org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540) at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) > at > org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) > at > org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1711) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) > at > org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1347) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) > at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480) > at > org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1678) > at > org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) > at > org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1249) > at > org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) > at > org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220) > at > org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at > org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:335) > at > org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) > at org.eclipse.jetty.server.Server.handle(Server.java:505) at > org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370) at > org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267) > at > org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) > at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at > org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310) > at > org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168) > at > org.eclipse.jetty.util.t
[jira] [Commented] (SOLR-14028) Fix test permissions for TestSolrCLIRunExample
[ https://issues.apache.org/jira/browse/SOLR-14028?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989893#comment-16989893 ] Robert Muir commented on SOLR-14028: Here's the specific sketchy line that i did (sorry): https://github.com/apache/lucene-solr/blob/c4126ef858b9bac167f51b3c08d51dc28404ced9/lucene/common-build.xml#L1097 It would be my prime suspect at least. > Fix test permissions for TestSolrCLIRunExample > -- > > Key: SOLR-14028 > URL: https://issues.apache.org/jira/browse/SOLR-14028 > Project: Solr > Issue Type: Test > Security Level: Public(Default Security Level. Issues are Public) > Components: Tests >Reporter: Kevin Risden >Priority: Major > Attachments: TEST-org.apache.solr.util.TestSolrCLIRunExample.xml, > security_debug-TEST-org.apache.solr.util.TestSolrCLIRunExample.xml.zip, > security_debug-tests-failures.txt.zip, tests-failures.txt > > > This was found while looking at SOLR-14001. It fails on Windows: > {code:java} > ant test -Dtestcase=TestSolrCLIRunExample > -Dtests.method=testTechproductsExample -Dtests.seed=8E1D2F05CF2F7CAF > -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=ms-SG > -Dtests.timezone=Europe/Paris -Dtests.asserts=true -Dtests.file.encoding=UTF-8 > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-13936) Schema/Config endpoints to modify configset with no core/collection
[ https://issues.apache.org/jira/browse/SOLR-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989897#comment-16989897 ] Ishan Chattopadhyaya commented on SOLR-13936: - Need for hand editing configset should be eliminated. This is one step towards that goal. Today, starting from default configset you can add fields, components etc only after creating a collection. This jira will help in doing so even before creating a collection so that user can edit one configset and create many collections that have the changes. > Schema/Config endpoints to modify configset with no core/collection > --- > > Key: SOLR-13936 > URL: https://issues.apache.org/jira/browse/SOLR-13936 > Project: Solr > Issue Type: New Feature > Security Level: Public(Default Security Level. Issues are Public) > Components: config-api >Reporter: Apoorv Bhawsar >Priority: Minor > Time Spent: 1h 20m > Remaining Estimate: 0h > > All schema/config configurations should work even in cases where a collection > is not associated with them > This jira will involve > 1. Refactoring existing handler/manager to work without {{SolrCore}} > 2. Adding {{/api/cluster}} endpoints to support such modifications > Endpoints - > * {{/api/cluster/configset/\{name}/schema}} > * {{/ap/cluster/configset/\{name}/config}} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989899#comment-16989899 ] Robert Muir commented on LUCENE-9077: - Dawid, can we also add the runner to the "SolrSecurityManager"? I'm sorry we have to do it in two places: for now the checkExit logic is duped because subclassing would just make things even more complex at the moment (sorry). I had to do this in SOLR-14020 so that solr problems didn't interfere with lucene issues. > Gradle build > > > Key: LUCENE-9077 > URL: https://issues.apache.org/jira/browse/LUCENE-9077 > Project: Lucene - Core > Issue Type: Task >Reporter: Dawid Weiss >Assignee: Dawid Weiss >Priority: Major > Fix For: master (9.0) > > > This task focuses on providing gradle-based build equivalent for Lucene and > Solr (on master branch). See notes below on why this respin is needed. > The code lives on *gradle-master* branch. It is kept with sync with *master*. > Try running the following to see an overview of helper guides concerning > typical workflow, testing and ant-migration helpers: > gradlew :help > A list of items that needs to be added or requires work. If you'd like to > work on any of these, please add your name to the list. Once you have a > patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. > * (/) Apply forbiddenAPIs > * (/) Generate hardware-aware gradle defaults for parallelism (count of > workers and test JVMs). > * (/) Fail the build if --tests filter is applied and no tests execute > during the entire build (this allows for an empty set of filtered tests at > single project level). > * (/) Port other settings and randomizations from common-build.xml > * [dw] Configure security policy/ sandboxing for tests. > * Full test's console output on failure? > * jar checksums, jar checksum computation and validation. This should be > done without intermediate folders (directly on dependency sets). > * add a :helpDeps explanation to how the dependency system works (palantir > plugin, lockfile) and how to retrieve structured information about current > dependencies of a given module (in a tree-like output). > * identify and list precommit tasks so that they can be ported one by one. > (Mark's branch has some of this stuff already implemented) > * > Of lesser importance: > * add rendering of javadocs (gradlew javadoc) and attaching them to maven > publications. > * Repro-line for failed tests/ runs. > * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid > it'll be difficult to run it sensibly because gradle doesn't offer cwd > separation for the forked test runners. > * if you diff solr packaged distribution against ant-created distribution > there are minor differences in library versions and some JARs are excluded/ > moved around. I didn't try to force these as everything seems to work (tests, > etc.) – perhaps these differences should be fixed in the ant build instead. > * identify and port any other "check" utilities that may be called from ant. > (Mark's branch has some of this stuff already implemented) > * [EOE] identify and port various "regenerate" tasks from ant builds > (javacc, precompiled automata, etc.) > * fill in POM details in gradle/defaults-maven.gradle so that they reflect > the previous content better (dependencies aside). > * Add any IDE integration layers that should be added (I use IntelliJ and it > imports the project out of the box, without the need for any special tuning). > * *Clean up dependencies, especially for Solr*: any \{ transitive = false } > should just explicitly exclude whatever they don't need (and their > dependencies currently declared explicitly should be folded). Figure out > which scope to import a dependency to. > * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; > currently XSLT...) > * I didn't bother adding Solr dist/test-framework to packaging (who'd use it > from a binary distribution? > > *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and > Cao Mạnh Đạt but also applies lessons learned from those two efforts: > * *Do not try to do too many things at once*. If we deviate too far from > master, the branch will be hard to merge. > * *Do everything in baby-steps* and add small, independent build fragments > replacing the old ant infrastructure. > * *Try to engage people to run, test and contribute early*. It can't be a > one-man effort. The more people understand and can contribute to the build, > the more healthy it will be. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For add
[jira] [Created] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect
Alessandro Benedetti created SOLR-14029: --- Summary: Documentation for the handleSelect and QT is partially incorrect Key: SOLR-14029 URL: https://issues.apache.org/jira/browse/SOLR-14029 Project: Solr Issue Type: Bug Security Level: Public (Default Security Level. Issues are Public) Components: documentation Affects Versions: 8.3.1 Reporter: Alessandro Benedetti In this documentation page: https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html we find this sentence: "The first configurable item is the handleSelect attribute on the *A value of "true" will route query requests to the parser defined with the qt value.*" This bit is incorrect, it should be: *A value of "true" will route query requests to the parser defined with the qt value if the /select request handler is not defined. * It seems a trivial change but it gave me quite an headache to verify that qt is ignored almost all the times. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Updated] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect
[ https://issues.apache.org/jira/browse/SOLR-14029?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Alessandro Benedetti updated SOLR-14029: Description: In this documentation page: https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html we find this sentence: "The first configurable item is the handleSelect attribute on the *A value of "true" will route query requests to the parser defined with the qt value.*" This bit is incorrect, it should be: *A value of "true" will route query requests to the parser defined with the qt value if the /select request handler is not defined. * It seems a trivial change but it gave me quite an headache to verify that qt is ignored almost all the times. More info in: [https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html] was: In this documentation page: https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html we find this sentence: "The first configurable item is the handleSelect attribute on the *A value of "true" will route query requests to the parser defined with the qt value.*" This bit is incorrect, it should be: *A value of "true" will route query requests to the parser defined with the qt value if the /select request handler is not defined. * It seems a trivial change but it gave me quite an headache to verify that qt is ignored almost all the times. > Documentation for the handleSelect and QT is partially incorrect > > > Key: SOLR-14029 > URL: https://issues.apache.org/jira/browse/SOLR-14029 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: documentation >Affects Versions: 8.3.1 >Reporter: Alessandro Benedetti >Priority: Major > > In this documentation page: > https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html > we find this sentence: > "The first configurable item is the handleSelect attribute on the > > *A value of "true" will route query requests to the parser defined with the > qt value.*" > This bit is incorrect, it should be: > *A value of "true" will route query requests to the parser defined with the > qt value if the /select request handler is not defined. > * > It seems a trivial change but it gave me quite an headache to verify that qt > is ignored almost all the times. > More info in: > [https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html] -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14003) Refactor code to avoid reading state of replica from the data object
[ https://issues.apache.org/jira/browse/SOLR-14003?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989900#comment-16989900 ] Ishan Chattopadhyaya commented on SOLR-14003: - It is a precursor to SOLR-13951. Obtaining accurate state for a replica shouldn't be available without a replica state provider. Today, that logic can be wired into a concrete class of the provider using same logic. In SOLR-13951, the provider can supply that state optimistically (cached). > Refactor code to avoid reading state of replica from the data object > -- > > Key: SOLR-14003 > URL: https://issues.apache.org/jira/browse/SOLR-14003 > Project: Solr > Issue Type: Sub-task > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Noble Paul >Priority: Major > > Deprecate > * {{Replica#getState()}} > * {{Replica#isActive()}} > Use an implementation of {{ReplicaStateProvider}} to fetch the state > {code:java} > /**An implementation that fetches the state of each replica in a collection > * and it also provides the leader of shards > * > */ > public interface ReplicaStateProvider { > Replica.State getState(Replica replica); > Replica getLeader(Slice slice); > boolean isActive(Replica replica); > } > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989903#comment-16989903 ] Robert Muir commented on LUCENE-9077: - {quote} I got lucene tests to run under security manager. But gradle test runner is really sensitive to "-Djava.security.debug=access,failure" (read: it's broken because it tries to capture the process output and falls into an endless loop). Makes debugging really, really hard. https://github.com/gradle/gradle/issues/11609 {quote} As a workaround, maybe there is some way we could use the existing junit4 runner with the gradle build to debug such things. Because junit4 already solved the hard problem. I don't know how messy that would be, but if its even possible then it is better than nothing. > Gradle build > > > Key: LUCENE-9077 > URL: https://issues.apache.org/jira/browse/LUCENE-9077 > Project: Lucene - Core > Issue Type: Task >Reporter: Dawid Weiss >Assignee: Dawid Weiss >Priority: Major > Fix For: master (9.0) > > > This task focuses on providing gradle-based build equivalent for Lucene and > Solr (on master branch). See notes below on why this respin is needed. > The code lives on *gradle-master* branch. It is kept with sync with *master*. > Try running the following to see an overview of helper guides concerning > typical workflow, testing and ant-migration helpers: > gradlew :help > A list of items that needs to be added or requires work. If you'd like to > work on any of these, please add your name to the list. Once you have a > patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. > * (/) Apply forbiddenAPIs > * (/) Generate hardware-aware gradle defaults for parallelism (count of > workers and test JVMs). > * (/) Fail the build if --tests filter is applied and no tests execute > during the entire build (this allows for an empty set of filtered tests at > single project level). > * (/) Port other settings and randomizations from common-build.xml > * [dw] Configure security policy/ sandboxing for tests. > * Full test's console output on failure? > * jar checksums, jar checksum computation and validation. This should be > done without intermediate folders (directly on dependency sets). > * add a :helpDeps explanation to how the dependency system works (palantir > plugin, lockfile) and how to retrieve structured information about current > dependencies of a given module (in a tree-like output). > * identify and list precommit tasks so that they can be ported one by one. > (Mark's branch has some of this stuff already implemented) > * > Of lesser importance: > * add rendering of javadocs (gradlew javadoc) and attaching them to maven > publications. > * Repro-line for failed tests/ runs. > * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid > it'll be difficult to run it sensibly because gradle doesn't offer cwd > separation for the forked test runners. > * if you diff solr packaged distribution against ant-created distribution > there are minor differences in library versions and some JARs are excluded/ > moved around. I didn't try to force these as everything seems to work (tests, > etc.) – perhaps these differences should be fixed in the ant build instead. > * identify and port any other "check" utilities that may be called from ant. > (Mark's branch has some of this stuff already implemented) > * [EOE] identify and port various "regenerate" tasks from ant builds > (javacc, precompiled automata, etc.) > * fill in POM details in gradle/defaults-maven.gradle so that they reflect > the previous content better (dependencies aside). > * Add any IDE integration layers that should be added (I use IntelliJ and it > imports the project out of the box, without the need for any special tuning). > * *Clean up dependencies, especially for Solr*: any \{ transitive = false } > should just explicitly exclude whatever they don't need (and their > dependencies currently declared explicitly should be folded). Figure out > which scope to import a dependency to. > * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; > currently XSLT...) > * I didn't bother adding Solr dist/test-framework to packaging (who'd use it > from a binary distribution? > > *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and > Cao Mạnh Đạt but also applies lessons learned from those two efforts: > * *Do not try to do too many things at once*. If we deviate too far from > master, the branch will be hard to merge. > * *Do everything in baby-steps* and add small, independent build fragments > replacing the old ant infrastructure. > * *Try to engage people to run, test and contribute early*. It can't be a > one-man effort. The more
[jira] [Commented] (SOLR-14014) Allow Solr to start with Admin UI disabled
[ https://issues.apache.org/jira/browse/SOLR-14014?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989906#comment-16989906 ] Christine Poerschke commented on SOLR-14014: {quote}... Don't feel strongly about the name. ... I don't feel strongly about whether the UI is enabled/disabled by default. ... {quote} Both {{-DenableAdminUI=...}} and {{-DdisableAdminUI=...}} names seem clear to me: * If the name was {{enableAdminUI}} then I would expect a Solr instance (that supports the flag) to have the admin UI disabled if started without the flag i.e. an explicit {{-DenableAdminUI=true}} would seem necessary to turn the admin UI on. * If the name was {{disableAdminUI}} then I would expect a Solr instance (that supports the flag) to have the admin UI enabled if started without the flag i.e. an explicit {{-DdisableAdminUI=true}} would seem necessary to turn the admin UI off. Such expectations are a bit subjective though of course. Given that existing Solr instance behaviour is to have the admin UI enabled by default I'd have a small preference for an opt-out style flag name like {{disableAdminUI}} or {{withoutAdminUI}} over an opt-in flag name like {{enableAdminUI}} or {{withAdminUI}}. > Allow Solr to start with Admin UI disabled > -- > > Key: SOLR-14014 > URL: https://issues.apache.org/jira/browse/SOLR-14014 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Components: Admin UI, security >Affects Versions: master (9.0), 8.3.1 >Reporter: Jason Gerlowski >Priority: Major > > Currently Solr always runs the Admin UI. With the history of XSS issues and > other security concerns that have been found in the Admin UI, Solr should > offer a mode where the Admin UI is disabled. Maybe, and this is a topic > that'll need some serious discussion, this should even be the default when > Solr starts. > NOTE: Disabling the Admin UI removes XSS and other attack vectors. But even > with the Admin UI disabled, Solr will still be inherently unsafe without > firewall protection on a public network. > *Proposed design:* > A java system property called *headless* will be used as an internal flag for > starting Solr in headless mode. This property will default to true. A java > property can be used at startup to set this flag to false. > Here is an example: > {code:java} > bin/solr start -Dheadless=false {code} > A message will be added following startup describing the mode. > In headless mode the following message will be displayed: > "solr is running in headless mode. The admin console is unavailable. To to > turn off headless mode and allow the admin console use the following > parameter startup parameter: > -Dheadless=false > > In non-headless mode the following message will be displayed: > "solr is running with headless mode turned off. The admin console is > available in this mode. Disabling the Admin UI removes XSS and other attack > vectors" > If a user attempts to access the admin console while Solr is in headless mode > it Solr will return 401 unauthorized. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] alessandrobenedetti opened a new pull request #1061: [SOLR-14029] Documentation updated
alessandrobenedetti opened a new pull request #1061: [SOLR-14029] Documentation updated URL: https://github.com/apache/lucene-solr/pull/1061 # Description Incorrect documentation for handleSelect and qt param. # Solution Short documentation update # Tests N.A. # Checklist Please review the following and check all that apply: - [ Y] I have reviewed the guidelines for [How to Contribute](https://wiki.apache.org/solr/HowToContribute) and my code conforms to the standards described there to the best of my ability. - [ Y] I have created a Jira issue and added the issue ID to my pull request title. - [ Y] I am authorized to contribute this code to the ASF and have removed any code I do not have a license to distribute. - [Y ] I have given Solr maintainers [access](https://help.github.com/en/articles/allowing-changes-to-a-pull-request-branch-created-from-a-fork) to contribute to my PR branch. (optional but recommended) - [Y ] I have developed this patch against the `master` branch. - [ Y] I have run `ant precommit` and the appropriate test suite. - [ Y] I have added tests for my changes. - [ Y ] I have added documentation for the [Ref Guide](https://github.com/apache/lucene-solr/tree/master/solr/solr-ref-guide) (for Solr changes only). This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14029) Documentation for the handleSelect and QT is partially incorrect
[ https://issues.apache.org/jira/browse/SOLR-14029?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989908#comment-16989908 ] Alessandro Benedetti commented on SOLR-14029: - Tentative adjustment of the documentation is in the Pull Request. Feel free to elaborate more if necessary. > Documentation for the handleSelect and QT is partially incorrect > > > Key: SOLR-14029 > URL: https://issues.apache.org/jira/browse/SOLR-14029 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Components: documentation >Affects Versions: 8.3.1 >Reporter: Alessandro Benedetti >Priority: Major > Time Spent: 10m > Remaining Estimate: 0h > > In this documentation page: > https://lucene.apache.org/solr/guide/8_3/requestdispatcher-in-solrconfig.html > we find this sentence: > "The first configurable item is the handleSelect attribute on the > > *A value of "true" will route query requests to the parser defined with the > qt value.*" > This bit is incorrect, it should be: > *A value of "true" will route query requests to the parser defined with the > qt value if the /select request handler is not defined. > * > It seems a trivial change but it gave me quite an headache to verify that qt > is ignored almost all the times. > More info in: > [https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html|https://sease.io/2019/12/the-request-handlers-jungle-handleselect-and-qt-parameter.html] -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Closed] (SOLR-12682) add/replace custom Streaming Expressions documentation
[ https://issues.apache.org/jira/browse/SOLR-12682?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Christine Poerschke closed SOLR-12682. -- > add/replace custom Streaming Expressions documentation > -- > > Key: SOLR-12682 > URL: https://issues.apache.org/jira/browse/SOLR-12682 > Project: Solr > Issue Type: Task > Components: streaming expressions >Reporter: Christine Poerschke >Priority: Minor > Attachments: SOLR-12682.patch > > > (draft proposed patch to follow) -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Resolved] (SOLR-12682) add/replace custom Streaming Expressions documentation
[ https://issues.apache.org/jira/browse/SOLR-12682?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Christine Poerschke resolved SOLR-12682. Resolution: Duplicate > add/replace custom Streaming Expressions documentation > -- > > Key: SOLR-12682 > URL: https://issues.apache.org/jira/browse/SOLR-12682 > Project: Solr > Issue Type: Task > Components: streaming expressions >Reporter: Christine Poerschke >Priority: Minor > Attachments: SOLR-12682.patch > > > (draft proposed patch to follow) -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989914#comment-16989914 ] Robert Muir commented on SOLR-14001: Thank you again for digging into this! > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:680) > at java.security.AccessController.doPrivileged(Native Method) > at > javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680) > at javax.security.auth.login.LoginContext.login(LoginContext.java
[jira] [Commented] (SOLR-14001) fix HdfsBackupRepositoryTest on windows
[ https://issues.apache.org/jira/browse/SOLR-14001?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989917#comment-16989917 ] ASF subversion and git services commented on SOLR-14001: Commit dad933b933058c9eb39687d50b068552bd8f511a in lucene-solr's branch refs/heads/gradle-master from Kevin Risden [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=dad933b ] SOLR-14001: fix HdfsBackupRepositoryTest on windows Signed-off-by: Kevin Risden > fix HdfsBackupRepositoryTest on windows > --- > > Key: SOLR-14001 > URL: https://issues.apache.org/jira/browse/SOLR-14001 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Robert Muir >Assignee: Kevin Risden >Priority: Major > Fix For: 8.4 > > Attachments: SOLR-14001.patch, tests-failures.txt, win-test-output.zip > > > Its a missing permission, but the exception gets swallowed so jenkins logs > aren't enough :( > I mentioned this was likely to happen with SOLR-13991 changes. > It needs different loadLibrary permission on windows (IIRC). I will spin up a > windows VM and run the test with -Djava.security.debug and fix it: > {noformat} > org.apache.solr.common.SolrException: > org.apache.hadoop.security.KerberosAuthException: failure to login: > javax.security.auth.login.LoginException: Security Exception > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:91) > at > org.apache.solr.core.backup.repository.HdfsBackupRepositoryTest.testCopyBufferDefaultSize(HdfsBackupRepositoryTest.java:92) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) > at > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at > org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) > at > org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) > at > org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) > at > org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) > at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) > at > org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) > at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) > at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) > at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) > at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) > at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) > at org.junit.runners.ParentRunner.run(ParentRunner.java:363) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.execute(SlaveMain.java:269) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMain.main(SlaveMain.java:394) > at > com.carrotsearch.ant.tasks.junit4.slave.SlaveMainSafe.main(SlaveMainSafe.java:13) > Caused by: org.apache.hadoop.security.KerberosAuthException: failure to > login: javax.security.auth.login.LoginException: Security Exception > at > org.apache.hadoop.security.UserGroupInformation.doSubjectLogin(UserGroupInformation.java:1847) > at > org.apache.hadoop.security.UserGroupInformation.createLoginUser(UserGroupInformation.java:710) > at > org.apache.hadoop.security.UserGroupInformation.getLoginUser(UserGroupInformation.java:660) > at > org.apache.hadoop.security.UserGroupInformation.getCurrentUser(UserGroupInformation.java:571) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:322) > at org.apache.hadoop.hdfs.DFSClient.(DFSClient.java:289) > at > org.apache.hadoop.hdfs.DistributedFileSystem.initialize(DistributedFileSystem.java:176) > at > org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:3303) > at org.apache.hadoop.fs.FileSystem.get(FileSystem.java:476) > at > org.apache.solr.core.backup.repository.HdfsBackupRepository.init(HdfsBackupRepository.java:89) > ... 21 more > Caused by: javax.security.auth.login.LoginException: Security Exception > at javax.security.auth.login.LoginContext.invoke(LoginContext.java:840) > at > javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) > at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) > at javax.security.auth.login.Log
[jira] [Commented] (LUCENE-9077) Gradle build
[ https://issues.apache.org/jira/browse/LUCENE-9077?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16989918#comment-16989918 ] ASF subversion and git services commented on LUCENE-9077: - Commit 9ec8a86d69a8044a010f01894863eb4066f9d21b in lucene-solr's branch refs/heads/gradle-master from Dawid Weiss [ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=9ec8a86 ] LUCENE-9077: Add support for running under gradle test runner. > Gradle build > > > Key: LUCENE-9077 > URL: https://issues.apache.org/jira/browse/LUCENE-9077 > Project: Lucene - Core > Issue Type: Task >Reporter: Dawid Weiss >Assignee: Dawid Weiss >Priority: Major > Fix For: master (9.0) > > > This task focuses on providing gradle-based build equivalent for Lucene and > Solr (on master branch). See notes below on why this respin is needed. > The code lives on *gradle-master* branch. It is kept with sync with *master*. > Try running the following to see an overview of helper guides concerning > typical workflow, testing and ant-migration helpers: > gradlew :help > A list of items that needs to be added or requires work. If you'd like to > work on any of these, please add your name to the list. Once you have a > patch/ pull request let me (dweiss) know - I'll try to coordinate the merges. > * (/) Apply forbiddenAPIs > * (/) Generate hardware-aware gradle defaults for parallelism (count of > workers and test JVMs). > * (/) Fail the build if --tests filter is applied and no tests execute > during the entire build (this allows for an empty set of filtered tests at > single project level). > * (/) Port other settings and randomizations from common-build.xml > * [dw] Configure security policy/ sandboxing for tests. > * Full test's console output on failure? > * jar checksums, jar checksum computation and validation. This should be > done without intermediate folders (directly on dependency sets). > * add a :helpDeps explanation to how the dependency system works (palantir > plugin, lockfile) and how to retrieve structured information about current > dependencies of a given module (in a tree-like output). > * identify and list precommit tasks so that they can be ported one by one. > (Mark's branch has some of this stuff already implemented) > * > Of lesser importance: > * add rendering of javadocs (gradlew javadoc) and attaching them to maven > publications. > * Repro-line for failed tests/ runs. > * Add test 'beasting' (rerunning the same suite multiple times). I'm afraid > it'll be difficult to run it sensibly because gradle doesn't offer cwd > separation for the forked test runners. > * if you diff solr packaged distribution against ant-created distribution > there are minor differences in library versions and some JARs are excluded/ > moved around. I didn't try to force these as everything seems to work (tests, > etc.) – perhaps these differences should be fixed in the ant build instead. > * identify and port any other "check" utilities that may be called from ant. > (Mark's branch has some of this stuff already implemented) > * [EOE] identify and port various "regenerate" tasks from ant builds > (javacc, precompiled automata, etc.) > * fill in POM details in gradle/defaults-maven.gradle so that they reflect > the previous content better (dependencies aside). > * Add any IDE integration layers that should be added (I use IntelliJ and it > imports the project out of the box, without the need for any special tuning). > * *Clean up dependencies, especially for Solr*: any \{ transitive = false } > should just explicitly exclude whatever they don't need (and their > dependencies currently declared explicitly should be folded). Figure out > which scope to import a dependency to. > * Add Solr packaging for docs/* (see TODO in packaging/build.gradle; > currently XSLT...) > * I didn't bother adding Solr dist/test-framework to packaging (who'd use it > from a binary distribution? > > *{color:#ff}Note:{color}* this builds on the work done by Mark Miller and > Cao Mạnh Đạt but also applies lessons learned from those two efforts: > * *Do not try to do too many things at once*. If we deviate too far from > master, the branch will be hard to merge. > * *Do everything in baby-steps* and add small, independent build fragments > replacing the old ant infrastructure. > * *Try to engage people to run, test and contribute early*. It can't be a > one-man effort. The more people understand and can contribute to the build, > the more healthy it will be. > -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-
[jira] [Created] (LUCENE-9082) Upgrade Apache Ivy version to 2.5.0
Namgyu Kim created LUCENE-9082: -- Summary: Upgrade Apache Ivy version to 2.5.0 Key: LUCENE-9082 URL: https://issues.apache.org/jira/browse/LUCENE-9082 Project: Lucene - Core Issue Type: Task Reporter: Namgyu Kim Assignee: Namgyu Kim Fix For: 8.x, master (9.0) Not long ago, Apache Ivy 2.5.0 was released. (Oct 24, 2019) Apache Ivy 2.5.0 can be worked with Java 7 or later. ([https://ant.apache.org/ivy/history/2.5.0/compatibility.html]) So there is no problem with our current Lucene version(8.x and 9.0). This patch will be merged to +master+ and +branch_8x+ and +gradle-master+ branch. -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[GitHub] [lucene-solr] msokolov commented on issue #892: LUCENE-8972: Add ICUTransformCharFilter, to support pre-tokenizer ICU text transformation
msokolov commented on issue #892: LUCENE-8972: Add ICUTransformCharFilter, to support pre-tokenizer ICU text transformation URL: https://github.com/apache/lucene-solr/pull/892#issuecomment-562639099 Hi @magibney, thanks for addressing my earlier comments and waiting so long for me to get back. Just a few more things I'd like to see changed before we commit. The constructors for the char filter are package private, so this can only be created using the factory. I think this is a kind of unusual pattern, at least I checked a couple of other CharFilter classes and they do seem to be accessible, with public constructors. I know we have consumers of the analysis code that don't use the factory abstraction to create their analysis chains, so I think it would be good to support that here too. What do you think about (1) making both ICUTransformCharFilter constructors public, (2) moving modifyRules to that class so users will think of using it, and perhaps suggesting that it would be a good idea to do so for perf reasons in javadoc of this class, and (3) testing this in the unit tests? I rebased and ran precommit locally and it passed OK: I'm not sure why we got that failure above. This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org
[jira] [Resolved] (SOLR-11091) fix-or-suppress 18 'Resource leak' warnings in StreamExpressionToExpessionTest.java
[ https://issues.apache.org/jira/browse/SOLR-11091?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Christine Poerschke resolved SOLR-11091. Resolution: Duplicate bq. I think SOLR-10809 already solved this. Indeed. Thanks [~asalamon74] for noticing and mentioning that! > fix-or-suppress 18 'Resource leak' warnings in > StreamExpressionToExpessionTest.java > --- > > Key: SOLR-11091 > URL: https://issues.apache.org/jira/browse/SOLR-11091 > Project: Solr > Issue Type: Sub-task > Components: clients - java >Reporter: Christine Poerschke >Priority: Trivial > > {code} > [ecj-lint] 2. WARNING in > /Users/cpoerschke/lucene-solr/solr/solrj/src/test/org/apache/solr/client/solrj/io/stream/StreamExpressionToExpessionTest.java > (at line 77) > [ecj-lint] stream = new > CloudSolrStream(StreamExpressionParser.parse("search(collection1, q=*:*, > fl=\"id,a_s,a_i,a_f\", sort=\"a_f asc, a_i asc\", fq=\"a_s:one\", > fq=\"a_s:two\")"), factory); > [ecj-lint] > ^^^ > [ecj-lint] Resource leak: 'stream' is never closed > {code} -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org