[jira] [Created] (SOLR-14108) Package Manager: verify command should be optional

2019-12-18 Thread Ishan Chattopadhyaya (Jira)
Ishan Chattopadhyaya created SOLR-14108:
---

 Summary: Package Manager: verify command should be optional
 Key: SOLR-14108
 URL: https://issues.apache.org/jira/browse/SOLR-14108
 Project: Solr
  Issue Type: Improvement
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Ishan Chattopadhyaya


The command to verify a package after deployment should be made optional. It 
was originally intended to be that way, but got missed out in the 
implementation. 

The workaround for now is to have a condition in the verify command that always 
evaluates to true :-(



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-6678) jdk1.9.0-ea-b72 JVM failures

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-6678?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998913#comment-16998913
 ] 

Dawid Weiss commented on LUCENE-6678:
-

I just have. We won't go back to it.

> jdk1.9.0-ea-b72 JVM failures
> 
>
> Key: LUCENE-6678
> URL: https://issues.apache.org/jira/browse/LUCENE-6678
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Priority: Trivial
> Attachments: hs_err_pid7402.log, hs_err_pid7407.log, 
> hs_err_pid7408.log, hs_err_pid7608.log
>
>
> A placeholder for JDK1.9.0-ea-b72 failures.
> Linked issues:
> [8129961 : SIGSEGV when copying to survivor space]
> https://bugs.openjdk.java.net/browse/JDK-8129961



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-6678) jdk1.9.0-ea-b72 JVM failures

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-6678?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss resolved LUCENE-6678.
-
Resolution: Cannot Reproduce

> jdk1.9.0-ea-b72 JVM failures
> 
>
> Key: LUCENE-6678
> URL: https://issues.apache.org/jira/browse/LUCENE-6678
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Priority: Trivial
> Attachments: hs_err_pid7402.log, hs_err_pid7407.log, 
> hs_err_pid7408.log, hs_err_pid7608.log
>
>
> A placeholder for JDK1.9.0-ea-b72 failures.
> Linked issues:
> [8129961 : SIGSEGV when copying to survivor space]
> https://bugs.openjdk.java.net/browse/JDK-8129961



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13749) Implement support for joining across collections with multiple shards ( XCJF )

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13749?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998915#comment-16998915
 ] 

ASF subversion and git services commented on SOLR-13749:


Commit 46e5e1372870f6b46925a86ec7c0461c7cb888bb in lucene-solr's branch 
refs/heads/master from Gus Heck
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=46e5e13 ]

SOLR-13749  Cross collection join filter (XCJF)
Squashed commit of the following:  commit 
ffa68a8adb9c5dc16578ab26f731da247533c980


> Implement support for joining across collections with multiple shards ( XCJF )
> --
>
> Key: SOLR-13749
> URL: https://issues.apache.org/jira/browse/SOLR-13749
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Kevin Watters
>Assignee: Gus Heck
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> This ticket includes 2 query parsers.
> The first one is the "Cross collection join filter"  (XCJF) parser. This is 
> the "Cross-collection join filter" query parser. It can do a call out to a 
> remote collection to get a set of join keys to be used as a filter against 
> the local collection.
> The second one is the Hash Range query parser that you can specify a field 
> name and a hash range, the result is that only the documents that would have 
> hashed to that range will be returned.
> This query parser will do an intersection based on join keys between 2 
> collections.
> The local collection is the collection that you are searching against.
> The remote collection is the collection that contains the join keys that you 
> want to use as a filter.
> Each shard participating in the distributed request will execute a query 
> against the remote collection.  If the local collection is setup with the 
> compositeId router to be routed on the join key field, a hash range query is 
> applied to the remote collection query to only match the documents that 
> contain a potential match for the documents that are in the local shard/core. 
>  
>  
> Here's some vocab to help with the descriptions of the various parameters.
> ||Term||Description||
> |Local Collection|This is the main collection that is being queried.|
> |Remote Collection|This is the collection that the XCJFQuery will query to 
> resolve the join keys.|
> |XCJFQuery|The lucene query that executes a search to get back a set of join 
> keys from a remote collection|
> |HashRangeQuery|The lucene query that matches only the documents whose hash 
> code on a field falls within a specified range.|
>  
>  
> ||Param ||Required ||Description||
> |collection|Required|The name of the external Solr collection to be queried 
> to retrieve the set of join key values ( required )|
> |zkHost|Optional|The connection string to be used to connect to Zookeeper.  
> zkHost and solrUrl are both optional parameters, and at most one of them 
> should be specified.  
> If neither of zkHost or solrUrl are specified, the local Zookeeper cluster 
> will be used. ( optional )|
> |solrUrl|Optional|The URL of the external Solr node to be queried ( optional 
> )|
> |from|Required|The join key field name in the external collection ( required 
> )|
> |to|Required|The join key field name in the local collection|
> |v|See Note|The query to be executed against the external Solr collection to 
> retrieve the set of join key values.  
> Note:  The original query can be passed at the end of the string or as the 
> "v" parameter.  
> It's recommended to use query parameter substitution with the "v" parameter 
> to ensure no issues arise with the default query parsers.|
> |routed| |true / false.  If true, the XCJF query will use each shard's hash 
> range to determine the set of join keys to retrieve for that shard.
> This parameter improves the performance of the cross-collection join, but 
> it depends on the local collection being routed by the toField.  If this 
> parameter is not specified, 
> the XCJF query will try to determine the correct value automatically.|
> |ttl| |The length of time that an XCJF query in the cache will be considered 
> valid, in seconds.  Defaults to 3600 (one hour).  
> The XCJF query will not be aware of changes to the remote collection, so 
> if the remote collection is updated, cached XCJF queries may give inaccurate 
> results.  
> After the ttl period has expired, the XCJF query will re-execute the join 
> against the remote collection.|
> |_All others_| |Any normal Solr parameter can also be specified as a local 
> param.|
>  
> Example Solr Config.xml changes:
>  
>  {{<}}{{cache}} {{name}}{{=}}{{"hash_vin"}}
>  {{   }}{{class}}{{=}}{{"solr.LRUCache"}}
>  {{   }}{{size}}{{=}}{{"128"}}
>  {{   }}{{i

[jira] [Commented] (SOLR-14103) hadoop-minicluster dependency is not used anywhere?

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14103?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998917#comment-16998917
 ] 

Dawid Weiss commented on SOLR-14103:


I have explored it by running all tests... Ok, I didn't run nightlies or 
monsters.

Windows is my preferred work environment but that doesn't mean I'm using it for 
running tests (they're flaky) -- all tests pass on Linux without these 
dependencies (and since they've been missing from the gradle build since the 
beginning I'm guessing they were never needed).

Netty packages are imported from solrj and solr-core depends on it. 

I am applying this patch to master. Things need a shakeup to see what is 
actually used. Please ping me if something starts to fail because of this.


> hadoop-minicluster dependency is not used anywhere?
> ---
>
> Key: SOLR-14103
> URL: https://issues.apache.org/jira/browse/SOLR-14103
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Dawid Weiss
>Priority: Major
>
> Hmm... hadoop-minicluster is a dependency. Strangely I don't declare it in 
> Gradle build and it's just fine. Is this something required? Maybe we can get 
> rid of it on ant side as well?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14092) Deprecate BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 8.5

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14092?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998918#comment-16998918
 ] 

ASF subversion and git services commented on SOLR-14092:


Commit cc00e1dcef727653224c95072ea76a169bd9cbed in lucene-solr's branch 
refs/heads/branch_8x from Mikhail Khludnev
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=cc00e1d ]

SOLR-14092: Mark BlockJoinFacetComponent as deprecated.


> Deprecate BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 8.5
> --
>
> Key: SOLR-14092
> URL: https://issues.apache.org/jira/browse/SOLR-14092
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Mikhail Khludnev
>Assignee: Mikhail Khludnev
>Priority: Major
> Attachments: SOLR-14092.branch_8x.00.patch
>
>
> Please migrate to  SOLR-8998 and SOLR-9510



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-13749) Implement support for joining across collections with multiple shards ( XCJF )

2019-12-18 Thread Gus Heck (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13749?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gus Heck resolved SOLR-13749.
-
Fix Version/s: master (9.0)
   Resolution: Implemented

Committed to master with above tweak and a correction to unit tests that I 
found at the last minute, plus a little bit of wordsmithing in the docs. 
Possibly could be talked into porting it back to 8.5 if folks think it's worth 
the effort.

> Implement support for joining across collections with multiple shards ( XCJF )
> --
>
> Key: SOLR-13749
> URL: https://issues.apache.org/jira/browse/SOLR-13749
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Kevin Watters
>Assignee: Gus Heck
>Priority: Major
> Fix For: master (9.0)
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> This ticket includes 2 query parsers.
> The first one is the "Cross collection join filter"  (XCJF) parser. This is 
> the "Cross-collection join filter" query parser. It can do a call out to a 
> remote collection to get a set of join keys to be used as a filter against 
> the local collection.
> The second one is the Hash Range query parser that you can specify a field 
> name and a hash range, the result is that only the documents that would have 
> hashed to that range will be returned.
> This query parser will do an intersection based on join keys between 2 
> collections.
> The local collection is the collection that you are searching against.
> The remote collection is the collection that contains the join keys that you 
> want to use as a filter.
> Each shard participating in the distributed request will execute a query 
> against the remote collection.  If the local collection is setup with the 
> compositeId router to be routed on the join key field, a hash range query is 
> applied to the remote collection query to only match the documents that 
> contain a potential match for the documents that are in the local shard/core. 
>  
>  
> Here's some vocab to help with the descriptions of the various parameters.
> ||Term||Description||
> |Local Collection|This is the main collection that is being queried.|
> |Remote Collection|This is the collection that the XCJFQuery will query to 
> resolve the join keys.|
> |XCJFQuery|The lucene query that executes a search to get back a set of join 
> keys from a remote collection|
> |HashRangeQuery|The lucene query that matches only the documents whose hash 
> code on a field falls within a specified range.|
>  
>  
> ||Param ||Required ||Description||
> |collection|Required|The name of the external Solr collection to be queried 
> to retrieve the set of join key values ( required )|
> |zkHost|Optional|The connection string to be used to connect to Zookeeper.  
> zkHost and solrUrl are both optional parameters, and at most one of them 
> should be specified.  
> If neither of zkHost or solrUrl are specified, the local Zookeeper cluster 
> will be used. ( optional )|
> |solrUrl|Optional|The URL of the external Solr node to be queried ( optional 
> )|
> |from|Required|The join key field name in the external collection ( required 
> )|
> |to|Required|The join key field name in the local collection|
> |v|See Note|The query to be executed against the external Solr collection to 
> retrieve the set of join key values.  
> Note:  The original query can be passed at the end of the string or as the 
> "v" parameter.  
> It's recommended to use query parameter substitution with the "v" parameter 
> to ensure no issues arise with the default query parsers.|
> |routed| |true / false.  If true, the XCJF query will use each shard's hash 
> range to determine the set of join keys to retrieve for that shard.
> This parameter improves the performance of the cross-collection join, but 
> it depends on the local collection being routed by the toField.  If this 
> parameter is not specified, 
> the XCJF query will try to determine the correct value automatically.|
> |ttl| |The length of time that an XCJF query in the cache will be considered 
> valid, in seconds.  Defaults to 3600 (one hour).  
> The XCJF query will not be aware of changes to the remote collection, so 
> if the remote collection is updated, cached XCJF queries may give inaccurate 
> results.  
> After the ttl period has expired, the XCJF query will re-execute the join 
> against the remote collection.|
> |_All others_| |Any normal Solr parameter can also be specified as a local 
> param.|
>  
> Example Solr Config.xml changes:
>  
>  {{<}}{{cache}} {{name}}{{=}}{{"hash_vin"}}
>  {{   }}{{class}}{{=}}{{"solr.LRUCache"}}
>  {{   }}{{size}}{{=}}{{"128"}}
>  {{   }}{{initialSize}}{{=}}{{"0"}}
>  {{   }}{{regenerator}}{{=}}{{"sol

[jira] [Updated] (SOLR-14092) Deprecate BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 8.5

2019-12-18 Thread Mikhail Khludnev (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14092?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mikhail Khludnev updated SOLR-14092:

Fix Version/s: 8.5

> Deprecate BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 8.5
> --
>
> Key: SOLR-14092
> URL: https://issues.apache.org/jira/browse/SOLR-14092
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Mikhail Khludnev
>Assignee: Mikhail Khludnev
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14092.branch_8x.00.patch
>
>
> Please migrate to  SOLR-8998 and SOLR-9510



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14051) Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0

2019-12-18 Thread Mikhail Khludnev (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14051?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mikhail Khludnev updated SOLR-14051:

Fix Version/s: master (9.0)

> Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0
> ---
>
> Key: SOLR-14051
> URL: https://issues.apache.org/jira/browse/SOLR-14051
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Mikhail Khludnev
>Assignee: Mikhail Khludnev
>Priority: Major
> Fix For: master (9.0)
>
> Attachments: SOLR-14051.patch
>
>
> Please migrate to  SOLR-8998 and SOLR-9510



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14051) Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14051?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998922#comment-16998922
 ] 

ASF subversion and git services commented on SOLR-14051:


Commit b0e532b7f32c1822e93325ddcf43d772c7ae8073 in lucene-solr's branch 
refs/heads/master from Mikhail Khludnev
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=b0e532b ]

SOLR-14051: removing Block Join Facet Component in favor of 
uniqueBlock(\_root_).


> Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0
> ---
>
> Key: SOLR-14051
> URL: https://issues.apache.org/jira/browse/SOLR-14051
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Mikhail Khludnev
>Assignee: Mikhail Khludnev
>Priority: Major
> Attachments: SOLR-14051.patch
>
>
> Please migrate to  SOLR-8998 and SOLR-9510



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14103) hadoop-minicluster dependency is not used anywhere?

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14103?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998923#comment-16998923
 ] 

ASF subversion and git services commented on SOLR-14103:


Commit 71a5714e29b8d2636abc6aecffac39d30734a21f in lucene-solr's branch 
refs/heads/master from Dawid Weiss
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=71a5714 ]

SOLR-14103: remove extra unused dependencies (jersey-core, jersey-server, 
netty-all).


> hadoop-minicluster dependency is not used anywhere?
> ---
>
> Key: SOLR-14103
> URL: https://issues.apache.org/jira/browse/SOLR-14103
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Dawid Weiss
>Priority: Major
>
> Hmm... hadoop-minicluster is a dependency. Strangely I don't declare it in 
> Gradle build and it's just fine. Is this something required? Maybe we can get 
> rid of it on ant side as well?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14099) @LogLevel annotation not properly reseting after end of test (causes LoggingHandlerTest.testLogLevelHandlerOutput failures)

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14099?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998929#comment-16998929
 ] 

Dawid Weiss commented on SOLR-14099:


[~hossman] Chris - shouldn't this be moved into BeforeClass block?
{code}
+  /** 
+   * We don't want a hardocded assumption here because it may change based on 
how the user runs the test.
+   */
+  public static final Level DEFAULT_LOG_LEVEL = 
LogManager.getRootLogger().getLevel();
{code}
A static class initializer will be invoked once (per JVM) whereas a BeforeClass 
block runs before each test class (even if it's in a shared superclass).

Don't know what the intention is here but my gut feeling is that this should be 
moved inside the initialization block.



> @LogLevel annotation not properly reseting after end of test (causes 
> LoggingHandlerTest.testLogLevelHandlerOutput failures)
> ---
>
> Key: SOLR-14099
> URL: https://issues.apache.org/jira/browse/SOLR-14099
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Chris M. Hostetter
>Assignee: Chris M. Hostetter
>Priority: Major
> Fix For: master (9.0), 8.5
>
> Attachments: SOLR-14099.patch, SOLR-14099.patch, 
> SOLR-14099_test_workaround.patch
>
>
> We've seen a recent uptick in jenkins failures from 
> {{LoggingHandlerTest.testLogLevelHandlerOutput}} that indicate the @LogLevel 
> usage in other tests that have run earlier in the same JVM are _NOT_ properly 
> being reset when those tests complete.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-14103) hadoop-minicluster dependency is not used anywhere?

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14103?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss resolved SOLR-14103.

Fix Version/s: master (9.0)
 Assignee: Dawid Weiss
   Resolution: Fixed

> hadoop-minicluster dependency is not used anywhere?
> ---
>
> Key: SOLR-14103
> URL: https://issues.apache.org/jira/browse/SOLR-14103
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> Hmm... hadoop-minicluster is a dependency. Strangely I don't declare it in 
> Gradle build and it's just fine. Is this something required? Maybe we can get 
> rid of it on ant side as well?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-7566) BooleanQuery.Builder shouldn't clone added clauses

2019-12-18 Thread Adrien Grand (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-7566?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998936#comment-16998936
 ] 

Adrien Grand commented on LUCENE-7566:
--

Indeed, this was fixed as a side-effect of making queries immutable.

> BooleanQuery.Builder shouldn't clone added clauses
> --
>
> Key: LUCENE-7566
> URL: https://issues.apache.org/jira/browse/LUCENE-7566
> Project: Lucene - Core
>  Issue Type: Improvement
>Reporter: Yonik Seeley
>Priority: Trivial
>
> Minor GC improvement: There's no reason to clone BooleanClause in 
> BooleanQuery.Builder.add()



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998950#comment-16998950
 ] 

Dawid Weiss commented on SOLR-14054:


Why did you add commons-csv, Tim? I don't think it is required (it wasn't 
before and tests pass for me without it).

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14051) Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14051?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998956#comment-16998956
 ] 

ASF subversion and git services commented on SOLR-14051:


Commit b0e532b7f32c1822e93325ddcf43d772c7ae8073 in lucene-solr's branch 
refs/heads/gradle-master from Mikhail Khludnev
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=b0e532b ]

SOLR-14051: removing Block Join Facet Component in favor of 
uniqueBlock(\_root_).


> Remove BlockJoinFacetComponent&BlockJoinDocSetFacetComponent in 9.0
> ---
>
> Key: SOLR-14051
> URL: https://issues.apache.org/jira/browse/SOLR-14051
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Mikhail Khludnev
>Assignee: Mikhail Khludnev
>Priority: Major
> Fix For: master (9.0)
>
> Attachments: SOLR-14051.patch
>
>
> Please migrate to  SOLR-8998 and SOLR-9510



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13749) Implement support for joining across collections with multiple shards ( XCJF )

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13749?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998955#comment-16998955
 ] 

ASF subversion and git services commented on SOLR-13749:


Commit 46e5e1372870f6b46925a86ec7c0461c7cb888bb in lucene-solr's branch 
refs/heads/gradle-master from Gus Heck
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=46e5e13 ]

SOLR-13749  Cross collection join filter (XCJF)
Squashed commit of the following:  commit 
ffa68a8adb9c5dc16578ab26f731da247533c980


> Implement support for joining across collections with multiple shards ( XCJF )
> --
>
> Key: SOLR-13749
> URL: https://issues.apache.org/jira/browse/SOLR-13749
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Kevin Watters
>Assignee: Gus Heck
>Priority: Major
> Fix For: master (9.0)
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> This ticket includes 2 query parsers.
> The first one is the "Cross collection join filter"  (XCJF) parser. This is 
> the "Cross-collection join filter" query parser. It can do a call out to a 
> remote collection to get a set of join keys to be used as a filter against 
> the local collection.
> The second one is the Hash Range query parser that you can specify a field 
> name and a hash range, the result is that only the documents that would have 
> hashed to that range will be returned.
> This query parser will do an intersection based on join keys between 2 
> collections.
> The local collection is the collection that you are searching against.
> The remote collection is the collection that contains the join keys that you 
> want to use as a filter.
> Each shard participating in the distributed request will execute a query 
> against the remote collection.  If the local collection is setup with the 
> compositeId router to be routed on the join key field, a hash range query is 
> applied to the remote collection query to only match the documents that 
> contain a potential match for the documents that are in the local shard/core. 
>  
>  
> Here's some vocab to help with the descriptions of the various parameters.
> ||Term||Description||
> |Local Collection|This is the main collection that is being queried.|
> |Remote Collection|This is the collection that the XCJFQuery will query to 
> resolve the join keys.|
> |XCJFQuery|The lucene query that executes a search to get back a set of join 
> keys from a remote collection|
> |HashRangeQuery|The lucene query that matches only the documents whose hash 
> code on a field falls within a specified range.|
>  
>  
> ||Param ||Required ||Description||
> |collection|Required|The name of the external Solr collection to be queried 
> to retrieve the set of join key values ( required )|
> |zkHost|Optional|The connection string to be used to connect to Zookeeper.  
> zkHost and solrUrl are both optional parameters, and at most one of them 
> should be specified.  
> If neither of zkHost or solrUrl are specified, the local Zookeeper cluster 
> will be used. ( optional )|
> |solrUrl|Optional|The URL of the external Solr node to be queried ( optional 
> )|
> |from|Required|The join key field name in the external collection ( required 
> )|
> |to|Required|The join key field name in the local collection|
> |v|See Note|The query to be executed against the external Solr collection to 
> retrieve the set of join key values.  
> Note:  The original query can be passed at the end of the string or as the 
> "v" parameter.  
> It's recommended to use query parameter substitution with the "v" parameter 
> to ensure no issues arise with the default query parsers.|
> |routed| |true / false.  If true, the XCJF query will use each shard's hash 
> range to determine the set of join keys to retrieve for that shard.
> This parameter improves the performance of the cross-collection join, but 
> it depends on the local collection being routed by the toField.  If this 
> parameter is not specified, 
> the XCJF query will try to determine the correct value automatically.|
> |ttl| |The length of time that an XCJF query in the cache will be considered 
> valid, in seconds.  Defaults to 3600 (one hour).  
> The XCJF query will not be aware of changes to the remote collection, so 
> if the remote collection is updated, cached XCJF queries may give inaccurate 
> results.  
> After the ttl period has expired, the XCJF query will re-execute the join 
> against the remote collection.|
> |_All others_| |Any normal Solr parameter can also be specified as a local 
> param.|
>  
> Example Solr Config.xml changes:
>  
>  {{<}}{{cache}} {{name}}{{=}}{{"hash_vin"}}
>  {{   }}{{class}}{{=}}{{"solr.LRUCache"}}
>  {{

[jira] [Commented] (SOLR-14103) hadoop-minicluster dependency is not used anywhere?

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14103?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998957#comment-16998957
 ] 

ASF subversion and git services commented on SOLR-14103:


Commit 71a5714e29b8d2636abc6aecffac39d30734a21f in lucene-solr's branch 
refs/heads/gradle-master from Dawid Weiss
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=71a5714 ]

SOLR-14103: remove extra unused dependencies (jersey-core, jersey-server, 
netty-all).


> hadoop-minicluster dependency is not used anywhere?
> ---
>
> Key: SOLR-14103
> URL: https://issues.apache.org/jira/browse/SOLR-14103
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Major
> Fix For: master (9.0)
>
>
> Hmm... hadoop-minicluster is a dependency. Strangely I don't declare it in 
> Gradle build and it's just fine. Is this something required? Maybe we can get 
> rid of it on ant side as well?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14099) @LogLevel annotation not properly reseting after end of test (causes LoggingHandlerTest.testLogLevelHandlerOutput failures)

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14099?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998954#comment-16998954
 ] 

ASF subversion and git services commented on SOLR-14099:


Commit cc4262a8ec37b2420e1d80a392c5e8019f43e24c in lucene-solr's branch 
refs/heads/gradle-master from Chris M. Hostetter
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=cc4262a ]

SOLR-14099: Fixed @LogLevel annotation in test-framework to correctly 'unset' 
Loggers after test


> @LogLevel annotation not properly reseting after end of test (causes 
> LoggingHandlerTest.testLogLevelHandlerOutput failures)
> ---
>
> Key: SOLR-14099
> URL: https://issues.apache.org/jira/browse/SOLR-14099
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Chris M. Hostetter
>Assignee: Chris M. Hostetter
>Priority: Major
> Fix For: master (9.0), 8.5
>
> Attachments: SOLR-14099.patch, SOLR-14099.patch, 
> SOLR-14099_test_workaround.patch
>
>
> We've seen a recent uptick in jenkins failures from 
> {{LoggingHandlerTest.testLogLevelHandlerOutput}} that indicate the @LogLevel 
> usage in other tests that have run earlier in the same JVM are _NOT_ properly 
> being reset when those tests complete.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998952#comment-16998952
 ] 

ASF subversion and git services commented on SOLR-14054:


Commit 279a391cf3b38354f94e721297b8bc6563b8c4ce in lucene-solr's branch 
refs/heads/gradle-master from Tim Allison
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=279a391 ]

SOLR-14054 -- upgrade to Tika 1.23 (and its dependencies) (#1092)

* SOLR-14054 -- upgrade to Tika 1.23 (and its dependencies)

* fix CHANGES.txt file


> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998953#comment-16998953
 ] 

ASF subversion and git services commented on SOLR-14054:


Commit 279a391cf3b38354f94e721297b8bc6563b8c4ce in lucene-solr's branch 
refs/heads/gradle-master from Tim Allison
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=279a391 ]

SOLR-14054 -- upgrade to Tika 1.23 (and its dependencies) (#1092)

* SOLR-14054 -- upgrade to Tika 1.23 (and its dependencies)

* fix CHANGES.txt file


> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998964#comment-16998964
 ] 

Jan Høydahl commented on SOLR-14106:


This proves that the upgrade to jetty 9.4.19 was premature and incomplete. I 
think the safest action would be to quickly after 8.4.0 release a 8.4.1 with 
the only change being a revert of SOLR-13541, i.e. go back to jetty 9.4.14. The 
revert applies cleanly and works here, need some full test suite runs of course.

And then the 8.5 release will upgrade to jetty 9.4.24 in one go, including 
fixing all the Server/Client stuff, replace deprecated methods etc.

Actually, the project should pay more attention to deprecation warnings. That 
would have caught this mess during development of SOLR-13541, because Jetty has 
been spitting out deprecation warnings ever since 8.2.0 which was a warning 
sign that the upgrade was not complete. I'll flag this on the dev list.

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Attachments: SOLR-14106.patch, deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14096) DistribPackageStore attempts to create filestore in read-only directory

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998969#comment-16998969
 ] 

Dawid Weiss commented on SOLR-14096:


bq. So long story short - SolrTestCaseJ4 TEST_HOME needs to be fixed.

+1.

> DistribPackageStore attempts to create filestore in read-only directory
> ---
>
> Key: SOLR-14096
> URL: https://issues.apache.org/jira/browse/SOLR-14096
> Project: Solr
>  Issue Type: Test
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Tests
>Reporter: Dawid Weiss
>Priority: Major
>
> I see this in the logs when running with security manager:
> {code}
> 1645805 WARN  (SUITE-LoggingHandlerTest-seed#[DEADBEEF]-worker) [ ] 
> o.a.s.f.DistribPackageStore Unable to create 
> [/home/dweiss/work-ssd/lucene-solr/solr/core/build/resources/test/solr/.filestore]
>  directory in SOLR_HOME 
> [/home/dweiss/work-ssd/lucene-solr/solr/core/build/resources/test/solr].  
> Features requiring this directory may fail.
>   => java.security.AccessControlException: access denied 
> ("java.io.FilePermission" 
> "/home/dweiss/work-ssd/lucene-solr/solr/core/build/resources/test/solr/.filestore"
>  "write")
>   at 
> java.base/java.security.AccessControlContext.checkPermission(AccessControlContext.java:472)
> java.security.AccessControlException: access denied ("java.io.FilePermission" 
> "/home/dweiss/work-ssd/lucene-solr/solr/core/build/resources/test/solr/.filestore"
>  "write")
>   at 
> java.security.AccessControlContext.checkPermission(AccessControlContext.java:472)
>  ~[?:?]
>   at 
> java.security.AccessController.checkPermission(AccessController.java:897) 
> ~[?:?]
>   at java.lang.SecurityManager.checkPermission(SecurityManager.java:322) 
> ~[?:?]
>   at java.lang.SecurityManager.checkWrite(SecurityManager.java:752) ~[?:?]
>   at java.io.File.mkdir(File.java:1323) ~[?:?]
>   at java.io.File.mkdirs(File.java:1355) ~[?:?]
>   at 
> org.apache.solr.filestore.DistribPackageStore.ensurePackageStoreDir(DistribPackageStore.java:476)
>  ~[main/:?]
>   at 
> org.apache.solr.filestore.DistribPackageStore.(DistribPackageStore.java:65)
>  ~[main/:?]
>   at 
> org.apache.solr.filestore.PackageStoreAPI.(PackageStoreAPI.java:78) 
> ~[main/:?]
>   at org.apache.solr.core.CoreContainer.load(CoreContainer.java:619) 
> ~[main/:?]
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14109) zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set

2019-12-18 Thread Jira
Jan Høydahl created SOLR-14109:
--

 Summary: zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set
 Key: SOLR-14109
 URL: https://issues.apache.org/jira/browse/SOLR-14109
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
  Components: scripts and tools
Reporter: Jan Høydahl


I noticed this when running {{zkcli.sh}} from solr's docker image. [The docker 
image sets the variable 
{{LOG4J_PROPS}}|https://github.com/docker-solr/docker-solr/blob/master/8.3/Dockerfile],
 causing the zkcli script to pick up and use that logger instead of the console 
logger. Problem with that is that Solr's log4j2 config relies on the 
{{solr.log.dir}} sysprop being set, which it is not when running this script.

So either fix the wrapper script to set {{solr.log.dir}} or, better, always log 
to stdout.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] janhoy opened a new pull request #1096: SOLR-14109 Always log to stdout from zkcli.sh

2019-12-18 Thread GitBox
janhoy opened a new pull request #1096: SOLR-14109 Always log to stdout from 
zkcli.sh
URL: https://github.com/apache/lucene-solr/pull/1096
 
 
   There should be no reason to log anywhere else. This fixes a problem with 
bogous logging when running the tool from Solr's Docker image.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14109) zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set

2019-12-18 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998982#comment-16998982
 ] 

Jan Høydahl commented on SOLR-14109:


Linking SOLR-9047 [~gchanan] since that is where the env var was introduced.

Since that we got a centralized stdout logger config, and I cannot see a reason 
for not always using that for a CLI tool like this.

> zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set
> 
>
> Key: SOLR-14109
> URL: https://issues.apache.org/jira/browse/SOLR-14109
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: scripts and tools
>Reporter: Jan Høydahl
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> I noticed this when running {{zkcli.sh}} from solr's docker image. [The 
> docker image sets the variable 
> {{LOG4J_PROPS}}|https://github.com/docker-solr/docker-solr/blob/master/8.3/Dockerfile],
>  causing the zkcli script to pick up and use that logger instead of the 
> console logger. Problem with that is that Solr's log4j2 config relies on the 
> {{solr.log.dir}} sysprop being set, which it is not when running this script.
> So either fix the wrapper script to set {{solr.log.dir}} or, better, always 
> log to stdout.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Assigned] (SOLR-14109) zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set

2019-12-18 Thread Jira


 [ 
https://issues.apache.org/jira/browse/SOLR-14109?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jan Høydahl reassigned SOLR-14109:
--

Assignee: Jan Høydahl

> zkcli.sh and zkcli.bat barfs when LOG4J_PROPS is set
> 
>
> Key: SOLR-14109
> URL: https://issues.apache.org/jira/browse/SOLR-14109
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: scripts and tools
>Reporter: Jan Høydahl
>Assignee: Jan Høydahl
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> I noticed this when running {{zkcli.sh}} from solr's docker image. [The 
> docker image sets the variable 
> {{LOG4J_PROPS}}|https://github.com/docker-solr/docker-solr/blob/master/8.3/Dockerfile],
>  causing the zkcli script to pick up and use that logger instead of the 
> console logger. Problem with that is that Solr's log4j2 config relies on the 
> {{solr.log.dir}} sysprop being set, which it is not when running this script.
> So either fix the wrapper script to set {{solr.log.dir}} or, better, always 
> log to stdout.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13749) Implement support for joining across collections with multiple shards ( XCJF )

2019-12-18 Thread Mikhail Khludnev (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13749?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998984#comment-16998984
 ] 

Mikhail Khludnev commented on SOLR-13749:
-

if there's 8.5 release, I'll vote for putting it there as well.

> Implement support for joining across collections with multiple shards ( XCJF )
> --
>
> Key: SOLR-13749
> URL: https://issues.apache.org/jira/browse/SOLR-13749
> Project: Solr
>  Issue Type: New Feature
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Kevin Watters
>Assignee: Gus Heck
>Priority: Major
> Fix For: master (9.0)
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> This ticket includes 2 query parsers.
> The first one is the "Cross collection join filter"  (XCJF) parser. This is 
> the "Cross-collection join filter" query parser. It can do a call out to a 
> remote collection to get a set of join keys to be used as a filter against 
> the local collection.
> The second one is the Hash Range query parser that you can specify a field 
> name and a hash range, the result is that only the documents that would have 
> hashed to that range will be returned.
> This query parser will do an intersection based on join keys between 2 
> collections.
> The local collection is the collection that you are searching against.
> The remote collection is the collection that contains the join keys that you 
> want to use as a filter.
> Each shard participating in the distributed request will execute a query 
> against the remote collection.  If the local collection is setup with the 
> compositeId router to be routed on the join key field, a hash range query is 
> applied to the remote collection query to only match the documents that 
> contain a potential match for the documents that are in the local shard/core. 
>  
>  
> Here's some vocab to help with the descriptions of the various parameters.
> ||Term||Description||
> |Local Collection|This is the main collection that is being queried.|
> |Remote Collection|This is the collection that the XCJFQuery will query to 
> resolve the join keys.|
> |XCJFQuery|The lucene query that executes a search to get back a set of join 
> keys from a remote collection|
> |HashRangeQuery|The lucene query that matches only the documents whose hash 
> code on a field falls within a specified range.|
>  
>  
> ||Param ||Required ||Description||
> |collection|Required|The name of the external Solr collection to be queried 
> to retrieve the set of join key values ( required )|
> |zkHost|Optional|The connection string to be used to connect to Zookeeper.  
> zkHost and solrUrl are both optional parameters, and at most one of them 
> should be specified.  
> If neither of zkHost or solrUrl are specified, the local Zookeeper cluster 
> will be used. ( optional )|
> |solrUrl|Optional|The URL of the external Solr node to be queried ( optional 
> )|
> |from|Required|The join key field name in the external collection ( required 
> )|
> |to|Required|The join key field name in the local collection|
> |v|See Note|The query to be executed against the external Solr collection to 
> retrieve the set of join key values.  
> Note:  The original query can be passed at the end of the string or as the 
> "v" parameter.  
> It's recommended to use query parameter substitution with the "v" parameter 
> to ensure no issues arise with the default query parsers.|
> |routed| |true / false.  If true, the XCJF query will use each shard's hash 
> range to determine the set of join keys to retrieve for that shard.
> This parameter improves the performance of the cross-collection join, but 
> it depends on the local collection being routed by the toField.  If this 
> parameter is not specified, 
> the XCJF query will try to determine the correct value automatically.|
> |ttl| |The length of time that an XCJF query in the cache will be considered 
> valid, in seconds.  Defaults to 3600 (one hour).  
> The XCJF query will not be aware of changes to the remote collection, so 
> if the remote collection is updated, cached XCJF queries may give inaccurate 
> results.  
> After the ttl period has expired, the XCJF query will re-execute the join 
> against the remote collection.|
> |_All others_| |Any normal Solr parameter can also be specified as a local 
> param.|
>  
> Example Solr Config.xml changes:
>  
>  {{<}}{{cache}} {{name}}{{=}}{{"hash_vin"}}
>  {{   }}{{class}}{{=}}{{"solr.LRUCache"}}
>  {{   }}{{size}}{{=}}{{"128"}}
>  {{   }}{{initialSize}}{{=}}{{"0"}}
>  {{   }}{{regenerator}}{{=}}{{"solr.NoOpRegenerator"}}{{/>}}
>   
>  {{<}}{{queryParser}} {{name}}{{=}}{{"xcjf"}} 
> {{class}}{{=}}{{"org.apache.solr.search.join.XCJFQueryParserPlugin"}}{{>}}
>  {{  }}{{<

[jira] [Commented] (SOLR-14105) Http2SolrClient SSL not working in branch_8x

2019-12-18 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14105?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16998986#comment-16998986
 ] 

Jan Høydahl commented on SOLR-14105:


Looked at the patch and seems like you cleaned up some of the mess :) Did not 
get a chance to test it yet.

In my opinion we should merge this with SOLR-14106 since I believe they are 
intertwined and will not be merged to 8.4.x but be released in 8.5. At least 
that's my suggestion that I commented in 14106.

> Http2SolrClient SSL not working in branch_8x
> 
>
> Key: SOLR-14105
> URL: https://issues.apache.org/jira/browse/SOLR-14105
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14105.patch
>
>
> In branch_8x we upgraded to Jetty 9.4.24. This causes the following 
> exceptions when attempting to start server with SSL:
> {noformat}
> 2019-12-17 14:46:16.646 ERROR (main) [   ] o.a.s.c.SolrCore 
> null:org.apache.solr.common.SolrException: Error instantiating 
> shardHandlerFactory class [HttpShardHandlerFactory]: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
>   at org.apache.solr.core.CoreContainer.load(CoreContainer.java:633)
> ...
> Caused by: java.lang.RuntimeException: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:224)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.(Http2SolrClient.java:154)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:833)
>   at 
> org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
>   ... 50 more
> Caused by: java.lang.UnsupportedOperationException: X509ExtendedKeyManager 
> only supported on Server
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>  {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread Robert Muir (Jira)
Robert Muir created SOLR-14110:
--

 Summary: sandbox javax.script usage in tests
 Key: SOLR-14110
 URL: https://issues.apache.org/jira/browse/SOLR-14110
 Project: Solr
  Issue Type: Task
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Robert Muir


Similar to SOLR-13993 we should sandbox the use of javax.script if security 
manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread Robert Muir (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Muir updated SOLR-14110:
---
Attachment: SOLR-14110.patch

> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13984) Solr should run inside a SecurityManager

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13984?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999017#comment-16999017
 ] 

ASF subversion and git services commented on SOLR-13984:


Commit 7fbb3d5ff4315e35fd6b6c5cb9cda96bf76ac61f in lucene-solr's branch 
refs/heads/jira/SOLR-13984 from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=7fbb3d5 ]

SOLR-13984: link to the jdk documentation for more info


> Solr should run inside a SecurityManager
> 
>
> Key: SOLR-13984
> URL: https://issues.apache.org/jira/browse/SOLR-13984
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Ishan Chattopadhyaya
>Priority: Major
>  Time Spent: 2.5h
>  Remaining Estimate: 0h
>
> To reduce the effect of attacks, esp. RCE, Solr should run inside a 
> SecurityManager.
> Quoting Uwe here:
> {quote}
> The correct way to fix all issues we have seen the last time is very simple: 
> LET'S RUN SOLR INSIDE A SECURITY MANAGER IN PRODUCTION (like in tests). 
> Elasticsearch is doing this, so please please let's do this instead. But this 
> requires to finally get rid of the webapplication and start.jar and add our 
> own bootstrapping (like in tests) that configure Jetty and Security Manager 
> from our own org.apache.solr.bootstrap.Main.java (or similar).
> {quote}
> https://jira.apache.org/jira/browse/SOLR-12316?focusedCommentId=16465038&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-16465038



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (LUCENE-9099) Correctly handle repeats in ordered and unordered intervals

2019-12-18 Thread Alan Woodward (Jira)
Alan Woodward created LUCENE-9099:
-

 Summary: Correctly handle repeats in ordered and unordered 
intervals
 Key: LUCENE-9099
 URL: https://issues.apache.org/jira/browse/LUCENE-9099
 Project: Lucene - Core
  Issue Type: Improvement
Reporter: Alan Woodward
Assignee: Alan Woodward


If you have repeating intervals in an ordered or unordered interval source, you 
currently get somewhat confusing behaviour:

* ORDERED(a, a, b) will return an extra interval over just `a b` if it first 
matches `a a b`, meaning that you can get incorrect results if used in a 
CONTAINING filter - CONTAINING(ORDERED(x, y), ORDERED(a, a, b)) will match on 
the document `a x a b y`
* UNORDERED(a, a) will match on documents that just containg a single `a`.

It is possible to deal with the unordered case when building sources by 
rewriting duplicates to nested ORDERED clauses, so that UNORDERED(a, b, c, a, 
b) becomes UNORDERED(ORDERED(a, a), ORDERED(b, b), c), but this then breaks 
MAXGAPS filtering.

We should try and fix this within intervals themselves.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] romseygeek opened a new pull request #1097: LUCENE-9099: Correctly handle repeats in ORDERED and UNORDERED intervals

2019-12-18 Thread GitBox
romseygeek opened a new pull request #1097: LUCENE-9099: Correctly handle 
repeats in ORDERED and UNORDERED intervals
URL: https://github.com/apache/lucene-solr/pull/1097
 
 
   If you have repeating intervals in an ordered or unordered interval source, 
you currently get somewhat confusing behaviour:
   
   * `ORDERED(a, a, b)` will return an extra interval over just `a b` if it 
first matches `a a b`, meaning that you can get incorrect results if used in a 
`CONTAINING` filter - `CONTAINING(ORDERED(x, y), ORDERED(a, a, b))` will match 
on the document `a x a b y`
   * `UNORDERED(a, a)` will match on documents that just containg a single `a`.
   
   This commit adds a `RepeatingIntervalsSource` that correctly handles repeats 
within ordered and unordered sources.  It also changes the way that gaps are 
calculated within ordered and unordered sources, by using a new `width()` 
method on `IntervalIterator`.  The default implementation just returns `end() - 
start() + 1`, but `RepeatingIntervalsSource` instead returns the sum of the 
widths of its child iterators.  This preserves `maxgaps` filtering on ordered 
and unordered sources that contain repeats.
   
   In order to correctly handle matches in this scenario, 
`IntervalsSource#matches` now always returns an explicit 
`IntervalsMatchesIterator` rather than a plain `MatchesIterator`, which adds 
`gaps()` and `width()` methods so that submatches can be combined in the same 
way that subiterators are.  Extra checks have been added to `checkIntervals()` 
to ensure that the same intervals are returned by both iterator and matches, 
and a fix to `DisjunctionIntervalIterator#matches()` is also included - 
`DisjunctionIntervalIterator` minimizes its intervals, while 
`MatchesUtils.disjunction` does not, so there was a discrepancy between the two 
methods.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999027#comment-16999027
 ] 

Kevin Risden commented on SOLR-14110:
-

+1 lgtm

> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Tim Allison (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999033#comment-16999033
 ] 

Tim Allison commented on SOLR-14054:


[~dweiss], commons-csv is used in Tika's in TextAndCSVParser, which is new 
since 1.19.1.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Tim Allison (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999034#comment-16999034
 ] 

Tim Allison commented on SOLR-14054:


[~hossman]...ugh.  Worked locally.  Will take a look.  Sorry and thank you.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999059#comment-16999059
 ] 

ASF subversion and git services commented on SOLR-14110:


Commit 612cba38cab168a41392506cda6ebfe03a9af916 in lucene-solr's branch 
refs/heads/master from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=612cba3 ]

SOLR-14110: sandbox javax.script usage in tests


> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999069#comment-16999069
 ] 

Dawid Weiss commented on SOLR-14054:


[~tallison] but do we need it? I mean: we don't need to support each and every 
parser Tika comes with... And if we do then shouldn't this be somehow reflected 
in tests (they pass without commons-csv for me).

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-12711) Count dominating child field values

2019-12-18 Thread Mikhail Khludnev (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-12711?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mikhail Khludnev resolved SOLR-12711.
-
Resolution: Won't Fix

> Count dominating child field values
> ---
>
> Key: SOLR-12711
> URL: https://issues.apache.org/jira/browse/SOLR-12711
> Project: Solr
>  Issue Type: New Feature
>  Components: Facet Module
>Reporter: Mikhail Khludnev
>Priority: Major
>
> h2. Context
> {{uniqueBlock(_root_)}} which was introduced in SOLR-8998 allows to count 
> child field facet grouping hits by parents, ie hitting every parent only once.
> h2. Problem
> How to count only dominating child field value. ie if a product has 5 Red 
> skus and 2 Blue, it contributes {{Red(1)}}, {{Blue(0)}}
> h2. Suggestion
> Introduce {{dominatingBlock(_root_)}} which aggregate hits per parent, 
> chooses the dominating one and incs only it.
> h2. Further Work
> Judge dominating value not by number of child hits, but by the given function 
> value. Like pick the most popular, best selling, random child field value as 
> dominating.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-12478) make JSON.facet aware of timeAllowed

2019-12-18 Thread Mikhail Khludnev (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-12478?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mikhail Khludnev resolved SOLR-12478.
-
Resolution: Duplicate

> make JSON.facet aware of timeAllowed 
> -
>
> Key: SOLR-12478
> URL: https://issues.apache.org/jira/browse/SOLR-12478
> Project: Solr
>  Issue Type: Improvement
>  Components: Facet Module
>Reporter: Mikhail Khludnev
>Priority: Major
>
>  It make sense to prevent heavy facets from spinning infinitely by checking 
> [timeout|https://lucene.apache.org/solr/guide/7_3/common-query-parameters.html#timeallowed-parameter].
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-13778) Windows JDK SSL Test Failure trend: SSLException: Software caused connection abort: recv failed

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13778?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss updated SOLR-13778:
---
Attachment: recv-multiple-2019-12-18.zip
Status: Open  (was: Open)

The recv issue is happening even on tests that passed... It just depends on 
where it happens and how it's wrapped up (in SSLException or SocketException). 
I attach a few logs from a single run on Windows -- all of these logs have 
"recv failed" in them; only TestCloudSearcherWarming actually failed.

The context of these failures is not clear to me. [~hossman] - could you take a 
look at these logs (grep for "recv failed" and look at a few lines of prior 
context) and tell if it's expected that these sockets are closed? I mean -- is 
the server really dropping those connections?

> Windows JDK SSL Test Failure trend: SSLException: Software caused connection 
> abort: recv failed
> ---
>
> Key: SOLR-13778
> URL: https://issues.apache.org/jira/browse/SOLR-13778
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Chris M. Hostetter
>Priority: Major
> Attachments: dumps-LegacyCloud.zip, logs-2019-12-12-1.zip, 
> recv-multiple-2019-12-18.zip
>
>
> Now that Uwe's jenkins build has been correctly reporting it's build results 
> for my [automated 
> reports|http://fucit.org/solr-jenkins-reports/failure-report.html] to pick 
> up, I've noticed a pattern of failures that indicate a definite problem with 
> using SSL on Windows (even with java 11.0.4
>  )
>  The symptommatic stack traces all contain...
> {noformat}
> ...
>[junit4]> Caused by: javax.net.ssl.SSLException: Software caused 
> connection abort: recv failed
>[junit4]>at 
> java.base/sun.security.ssl.Alert.createSSLException(Alert.java:127)
> ...
>[junit4]> Caused by: java.net.SocketException: Software caused 
> connection abort: recv failed
>[junit4]>at 
> java.base/java.net.SocketInputStream.socketRead0(Native Method)
> ...
> {noformat}
> I suspect this may be related to 
> [https://bugs.openjdk.java.net/browse/JDK-8209333] but i have no concrete 
> evidence to back this up.
> I'll post some details of my analysis in comments...



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999115#comment-16999115
 ] 

ASF subversion and git services commented on SOLR-14110:


Commit 53a82aedcb4c62ac8b2573e7caa6104ce7db8229 in lucene-solr's branch 
refs/heads/branch_8x from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=53a82ae ]

SOLR-14110: sandbox javax.script usage in tests


> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread Robert Muir (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Muir resolved SOLR-14110.

Fix Version/s: 8.5
 Assignee: Robert Muir
   Resolution: Fixed

> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Robert Muir
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13190) Fuzzy search treated as server error instead of client error when terms are too complex

2019-12-18 Thread Andy Webb (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13190?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999118#comment-16999118
 ] 

Andy Webb commented on SOLR-13190:
--

Thanks Mike!

I've tried adding a {{maxQueryLength}} option to {{Direct(Solr)SpellChecker}} 
which can be set to prevent long terms being spellchecked - it's a simple 
change, largely a cut-and-paste of the {{minQueryLength}}, and as far as I can 
see this would prevent us seeing the exceptions. It could default to 0, i.e. 
"no limit", to maintain the existing default behaviour unless it's deliberately 
set. Would this be a reasonable change to make to Lucene/Solr or do you think 
there might be a better approach?

> Fuzzy search treated as server error instead of client error when terms are 
> too complex
> ---
>
> Key: SOLR-13190
> URL: https://issues.apache.org/jira/browse/SOLR-13190
> Project: Solr
>  Issue Type: Bug
>  Components: search
>Affects Versions: master (9.0)
>Reporter: Mike Drob
>Assignee: Mike Drob
>Priority: Major
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We've seen a fuzzy search end up breaking the automaton and getting reported 
> as a server error. This usage should be improved by
> 1) reporting as a client error, because it's similar to something like too 
> many boolean clauses queries in how an operator should deal with it
> 2) report what field is causing the error, since that currently must be 
> deduced from adjacent query logs and can be difficult if there are multiple 
> terms in the search
> This trigger was added to defend against adversarial regex but somehow hits 
> fuzzy terms as well, I don't understand enough about the automaton mechanisms 
> to really know how to approach a fix there, but improving the operability is 
> a good first step.
> relevant stack trace:
> {noformat}
> org.apache.lucene.util.automaton.TooComplexToDeterminizeException: 
> Determinizing automaton with 13632 states and 21348 transitions would result 
> in more than 1 states.
>   at 
> org.apache.lucene.util.automaton.Operations.determinize(Operations.java:746)
>   at 
> org.apache.lucene.util.automaton.RunAutomaton.(RunAutomaton.java:69)
>   at 
> org.apache.lucene.util.automaton.ByteRunAutomaton.(ByteRunAutomaton.java:32)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:247)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:133)
>   at 
> org.apache.lucene.search.FuzzyTermsEnum.(FuzzyTermsEnum.java:143)
>   at org.apache.lucene.search.FuzzyQuery.getTermsEnum(FuzzyQuery.java:154)
>   at 
> org.apache.lucene.search.MultiTermQuery$RewriteMethod.getTermsEnum(MultiTermQuery.java:78)
>   at 
> org.apache.lucene.search.TermCollectingRewrite.collectTerms(TermCollectingRewrite.java:58)
>   at 
> org.apache.lucene.search.TopTermsRewrite.rewrite(TopTermsRewrite.java:67)
>   at 
> org.apache.lucene.search.MultiTermQuery.rewrite(MultiTermQuery.java:310)
>   at 
> org.apache.lucene.search.IndexSearcher.rewrite(IndexSearcher.java:667)
>   at org.apache.lucene.search.IndexSearcher.search(IndexSearcher.java:442)
>   at 
> org.apache.solr.search.SolrIndexSearcher.buildAndRunCollectorChain(SolrIndexSearcher.java:200)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListNC(SolrIndexSearcher.java:1604)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListC(SolrIndexSearcher.java:1420)
>   at 
> org.apache.solr.search.SolrIndexSearcher.search(SolrIndexSearcher.java:567)
>   at 
> org.apache.solr.handler.component.QueryComponent.doProcessUngroupedSearch(QueryComponent.java:1435)
>   at 
> org.apache.solr.handler.component.QueryComponent.process(QueryComponent.java:374)
>   at 
> org.apache.solr.handler.component.SearchHandler.handleRequestBody(SearchHandler.java:298)
>   at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:199)
>   at org.apache.solr.core.SolrCore.execute(SolrCore.java:2559)
> {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14105) Http2SolrClient SSL not working in branch_8x

2019-12-18 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14105?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999123#comment-16999123
 ] 

Kevin Risden commented on SOLR-14105:
-

Yea agreed on merging.

> Http2SolrClient SSL not working in branch_8x
> 
>
> Key: SOLR-14105
> URL: https://issues.apache.org/jira/browse/SOLR-14105
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14105.patch
>
>
> In branch_8x we upgraded to Jetty 9.4.24. This causes the following 
> exceptions when attempting to start server with SSL:
> {noformat}
> 2019-12-17 14:46:16.646 ERROR (main) [   ] o.a.s.c.SolrCore 
> null:org.apache.solr.common.SolrException: Error instantiating 
> shardHandlerFactory class [HttpShardHandlerFactory]: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
>   at org.apache.solr.core.CoreContainer.load(CoreContainer.java:633)
> ...
> Caused by: java.lang.RuntimeException: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:224)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.(Http2SolrClient.java:154)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:833)
>   at 
> org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
>   ... 50 more
> Caused by: java.lang.UnsupportedOperationException: X509ExtendedKeyManager 
> only supported on Server
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>  {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (SOLR-14105) Http2SolrClient SSL not working in branch_8x

2019-12-18 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14105?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden resolved SOLR-14105.
-
Fix Version/s: (was: 8.5)
   Resolution: Duplicate

> Http2SolrClient SSL not working in branch_8x
> 
>
> Key: SOLR-14105
> URL: https://issues.apache.org/jira/browse/SOLR-14105
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
> Attachments: SOLR-14105.patch
>
>
> In branch_8x we upgraded to Jetty 9.4.24. This causes the following 
> exceptions when attempting to start server with SSL:
> {noformat}
> 2019-12-17 14:46:16.646 ERROR (main) [   ] o.a.s.c.SolrCore 
> null:org.apache.solr.common.SolrException: Error instantiating 
> shardHandlerFactory class [HttpShardHandlerFactory]: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
>   at org.apache.solr.core.CoreContainer.load(CoreContainer.java:633)
> ...
> Caused by: java.lang.RuntimeException: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:224)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.(Http2SolrClient.java:154)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:833)
>   at 
> org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
>   ... 50 more
> Caused by: java.lang.UnsupportedOperationException: X509ExtendedKeyManager 
> only supported on Server
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>  {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14106:

Fix Version/s: 8.5

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Fix For: 8.5
>
> Attachments: SOLR-14106.patch, deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14105) Http2SolrClient SSL not working in branch_8x

2019-12-18 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14105?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999124#comment-16999124
 ] 

Kevin Risden commented on SOLR-14105:
-

Going to fix this all in SOLR-14106 

> Http2SolrClient SSL not working in branch_8x
> 
>
> Key: SOLR-14105
> URL: https://issues.apache.org/jira/browse/SOLR-14105
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14105.patch
>
>
> In branch_8x we upgraded to Jetty 9.4.24. This causes the following 
> exceptions when attempting to start server with SSL:
> {noformat}
> 2019-12-17 14:46:16.646 ERROR (main) [   ] o.a.s.c.SolrCore 
> null:org.apache.solr.common.SolrException: Error instantiating 
> shardHandlerFactory class [HttpShardHandlerFactory]: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
>   at org.apache.solr.core.CoreContainer.load(CoreContainer.java:633)
> ...
> Caused by: java.lang.RuntimeException: 
> java.lang.UnsupportedOperationException: X509ExtendedKeyManager only 
> supported on Server
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:224)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient.(Http2SolrClient.java:154)
>   at 
> org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:833)
>   at 
> org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
>   at 
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
>   ... 50 more
> Caused by: java.lang.UnsupportedOperationException: X509ExtendedKeyManager 
> only supported on Server
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
>   at 
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>  {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14106:

Affects Version/s: 8.4

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Fix For: 8.5
>
> Attachments: SOLR-14106.patch, deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8677) JVM SIGSEGV in Node::in

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8677?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-8677.
-
Resolution: Resolved

I think we can resolve given this is 1 yr old, on JDK 9, and no clear repro is 
cited

> JVM SIGSEGV in Node::in
> ---
>
> Key: LUCENE-8677
> URL: https://issues.apache.org/jira/browse/LUCENE-8677
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Dawid Weiss
>Priority: Minor
>  Labels: jvm
>
> Jenkins:
> https://builds.apache.org/job/Lucene-Solr-SmokeRelease-8.x/15
> {code}
>[junit4] # A fatal error has been detected by the Java Runtime Environment:
>[junit4] #
>[junit4] #  SIGSEGV (0xb) at pc=0x000105bee9d8, pid=85292, tid=18179
>[junit4] #
>[junit4] # JRE version: Java(TM) SE Runtime Environment (9.0+181) (build 
> 9+181)
>[junit4] # Java VM: Java HotSpot(TM) 64-Bit Server VM (9+181, mixed mode, 
> tiered, concurrent mark sweep gc, bsd-amd64)
>[junit4] # Problematic frame:
>[junit4] # [thread 208539 also had an error]
>[junit4] V  [libjvm.dylib+0x4f49d8]  Node::in(unsigned int) const+0x18
>[junit4] #
>[junit4] # No core dump will be written. Core dumps have been disabled. To 
> enable core dumping, try "ulimit -c unlimited" before starting Java again
>[junit4] #
>[junit4] # An error report file with more information is saved as:
>[junit4] # 
> /Users/jenkins/workspace/Lucene-Solr-master-MacOSX/solr/build/solr-core/test/J0/hs_err_pid85292.log
>[junit4] # [ timer expired, abort... ]
> {code}
> No hs_err or replay log on the jenkins page though.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999125#comment-16999125
 ] 

Kevin Risden commented on SOLR-14106:
-

Closed SOLR-14105 and will fix them both here since they are intertwined. Will 
upload a new patch/PR shortly.

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Fix For: 8.5
>
> Attachments: SOLR-14106.patch, deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14111) Revert SOLR-13541 which breaks SSL client auth

2019-12-18 Thread Jira
Jan Høydahl created SOLR-14111:
--

 Summary: Revert SOLR-13541 which breaks SSL client auth
 Key: SOLR-14111
 URL: https://issues.apache.org/jira/browse/SOLR-14111
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
Reporter: Jan Høydahl
Assignee: Jan Høydahl
 Fix For: 8.4.1


Propose to revert SOLR-13541 which was the commit introducing the regression. 
This means rolling back to Jetty 9.4.14, in branch_8_4 only. Then release a 
bugfix version 8.4.1 with this fix.

The full fix of this issue will come in SOLR-14105 and SOLR-14106 in 8.5.0 but 
is more involved, requires further upgrade of Jetty beyond 9.4.19 and is thus 
not suitable for a bugfix release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated SOLR-14106:

Attachment: SOLR-14106.patch

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Fix For: 8.5
>
> Attachments: SOLR-14106.patch, SOLR-14106.patch, 
> deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8448) Slowdown of nested boolean queries after LUCENE-8060

2019-12-18 Thread Tommaso Teofili (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8448?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999130#comment-16999130
 ] 

Tommaso Teofili commented on LUCENE-8448:
-

I get the same issue as [~dweiss], in a BQ with *many* {{SHOULD}} clauses, I 
get a serious slowdown (~10x)  if I run the same code with 7.6.0 vs 8.3.1 [1] 
(~200ms vs ~2s).

[1] : 
https://github.com/tteofili/Anserini-embeddings/blob/nnsearch/src/main/java/io/anserini/embeddings/nn/fw/FakeWordsRunner.java

> Slowdown of nested boolean queries after LUCENE-8060
> 
>
> Key: LUCENE-8448
> URL: https://issues.apache.org/jira/browse/LUCENE-8448
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Adrien Grand
>Priority: Minor
> Fix For: 8.0
>
> Attachments: LUCENE-8448.patch, LUCENE-8448.patch
>
>
> Mike's nightly benchmarks revealed that disabling hit counts slowed down 
> nested boolean queries 
> http://people.apache.org/~mikemccand/lucenebench/AndHighOrMedMed.html 
> http://people.apache.org/~mikemccand/lucenebench/AndMedOrHighHigh.html.
> We are probably not propagating max scores and/or blocks efficiently.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14111) Revert SOLR-13541 which breaks SSL client auth

2019-12-18 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14111?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999131#comment-16999131
 ] 

Jan Høydahl commented on SOLR-14111:


This Jira intends to fix the bug for branch_8_4 through reverting the bad 
Jetty, while SOLR-14106 fixes the same bug on branch_8x and master through 
upgrading Jetty and fixing related Solr code.

> Revert SOLR-13541 which breaks SSL client auth
> --
>
> Key: SOLR-14111
> URL: https://issues.apache.org/jira/browse/SOLR-14111
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Jan Høydahl
>Assignee: Jan Høydahl
>Priority: Major
> Fix For: 8.4.1
>
>
> Propose to revert SOLR-13541 which was the commit introducing the regression. 
> This means rolling back to Jetty 9.4.14, in branch_8_4 only. Then release a 
> bugfix version 8.4.1 with this fix.
> The full fix of this issue will come in SOLR-14105 and SOLR-14106 in 8.5.0 
> but is more involved, requires further upgrade of Jetty beyond 9.4.19 and is 
> thus not suitable for a bugfix release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Assigned] (LUCENE-8677) JVM SIGSEGV in Node::in

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8677?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss reassigned LUCENE-8677:
---

Assignee: Dawid Weiss

> JVM SIGSEGV in Node::in
> ---
>
> Key: LUCENE-8677
> URL: https://issues.apache.org/jira/browse/LUCENE-8677
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Minor
>  Labels: jvm
>
> Jenkins:
> https://builds.apache.org/job/Lucene-Solr-SmokeRelease-8.x/15
> {code}
>[junit4] # A fatal error has been detected by the Java Runtime Environment:
>[junit4] #
>[junit4] #  SIGSEGV (0xb) at pc=0x000105bee9d8, pid=85292, tid=18179
>[junit4] #
>[junit4] # JRE version: Java(TM) SE Runtime Environment (9.0+181) (build 
> 9+181)
>[junit4] # Java VM: Java HotSpot(TM) 64-Bit Server VM (9+181, mixed mode, 
> tiered, concurrent mark sweep gc, bsd-amd64)
>[junit4] # Problematic frame:
>[junit4] # [thread 208539 also had an error]
>[junit4] V  [libjvm.dylib+0x4f49d8]  Node::in(unsigned int) const+0x18
>[junit4] #
>[junit4] # No core dump will be written. Core dumps have been disabled. To 
> enable core dumping, try "ulimit -c unlimited" before starting Java again
>[junit4] #
>[junit4] # An error report file with more information is saved as:
>[junit4] # 
> /Users/jenkins/workspace/Lucene-Solr-master-MacOSX/solr/build/solr-core/test/J0/hs_err_pid85292.log
>[junit4] # [ timer expired, abort... ]
> {code}
> No hs_err or replay log on the jenkins page though.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14106) SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0

2019-12-18 Thread Kevin Risden (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14106?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999132#comment-16999132
 ] 

Kevin Risden commented on SOLR-14106:
-

Uploaded new version of the patch and pushed update to PR.

> SSL with SOLR_SSL_NEED_CLIENT_AUTH not working since v8.2.0
> ---
>
> Key: SOLR-14106
> URL: https://issues.apache.org/jira/browse/SOLR-14106
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Kevin Risden
>Priority: Major
>  Labels: jetty, ssl
> Fix For: 8.5
>
> Attachments: SOLR-14106.patch, SOLR-14106.patch, 
> deprecation-warning.patch
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> For a client we use SSL certificate authentication with Solr through the 
> {{SOLR_SSL_NEED_CLIENT_AUTH=true}} setting. The client must then prove 
> through a local pem file that it has the correct client certificate.
> This works well until Solr 8.1.1, but fails with Solr 8.2 and also 8.3.1. 
> There has been a Jetty upgrade from from jetty-9.4.14 to jetty-9.4.19 and I 
> see some deprecation warnings in the log of 8.3.1:
> {noformat}
> o.e.j.x.XmlConfiguration Deprecated method public void 
> org.eclipse.jetty.util.ssl.SslContextFactory.setWantClientAuth(boolean) in 
> file:///opt/solr-8.3.1/server/etc/jetty-ssl.xml
> {noformat}
> I have made a simple reproduction script using Docker to reproduce first the 
> 8.1.1 behaviour that succeeds, then 8.3.1 which fails:
> {code}
> wget https://www.dropbox.com/s/fkjcez1i5anh42i/tls.tgz
> tar -xvzf tls.tgz
> cd tls
> ./repro.sh
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8677) JVM SIGSEGV in Node::in

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8677?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999134#comment-16999134
 ] 

Dawid Weiss commented on LUCENE-8677:
-

Thanks Mike.

> JVM SIGSEGV in Node::in
> ---
>
> Key: LUCENE-8677
> URL: https://issues.apache.org/jira/browse/LUCENE-8677
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Minor
>  Labels: jvm
>
> Jenkins:
> https://builds.apache.org/job/Lucene-Solr-SmokeRelease-8.x/15
> {code}
>[junit4] # A fatal error has been detected by the Java Runtime Environment:
>[junit4] #
>[junit4] #  SIGSEGV (0xb) at pc=0x000105bee9d8, pid=85292, tid=18179
>[junit4] #
>[junit4] # JRE version: Java(TM) SE Runtime Environment (9.0+181) (build 
> 9+181)
>[junit4] # Java VM: Java HotSpot(TM) 64-Bit Server VM (9+181, mixed mode, 
> tiered, concurrent mark sweep gc, bsd-amd64)
>[junit4] # Problematic frame:
>[junit4] # [thread 208539 also had an error]
>[junit4] V  [libjvm.dylib+0x4f49d8]  Node::in(unsigned int) const+0x18
>[junit4] #
>[junit4] # No core dump will be written. Core dumps have been disabled. To 
> enable core dumping, try "ulimit -c unlimited" before starting Java again
>[junit4] #
>[junit4] # An error report file with more information is saved as:
>[junit4] # 
> /Users/jenkins/workspace/Lucene-Solr-master-MacOSX/solr/build/solr-core/test/J0/hs_err_pid85292.log
>[junit4] # [ timer expired, abort... ]
> {code}
> No hs_err or replay log on the jenkins page though.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Reopened] (LUCENE-8677) JVM SIGSEGV in Node::in

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8677?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss reopened LUCENE-8677:
-

> JVM SIGSEGV in Node::in
> ---
>
> Key: LUCENE-8677
> URL: https://issues.apache.org/jira/browse/LUCENE-8677
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Minor
>  Labels: jvm
>
> Jenkins:
> https://builds.apache.org/job/Lucene-Solr-SmokeRelease-8.x/15
> {code}
>[junit4] # A fatal error has been detected by the Java Runtime Environment:
>[junit4] #
>[junit4] #  SIGSEGV (0xb) at pc=0x000105bee9d8, pid=85292, tid=18179
>[junit4] #
>[junit4] # JRE version: Java(TM) SE Runtime Environment (9.0+181) (build 
> 9+181)
>[junit4] # Java VM: Java HotSpot(TM) 64-Bit Server VM (9+181, mixed mode, 
> tiered, concurrent mark sweep gc, bsd-amd64)
>[junit4] # Problematic frame:
>[junit4] # [thread 208539 also had an error]
>[junit4] V  [libjvm.dylib+0x4f49d8]  Node::in(unsigned int) const+0x18
>[junit4] #
>[junit4] # No core dump will be written. Core dumps have been disabled. To 
> enable core dumping, try "ulimit -c unlimited" before starting Java again
>[junit4] #
>[junit4] # An error report file with more information is saved as:
>[junit4] # 
> /Users/jenkins/workspace/Lucene-Solr-master-MacOSX/solr/build/solr-core/test/J0/hs_err_pid85292.log
>[junit4] # [ timer expired, abort... ]
> {code}
> No hs_err or replay log on the jenkins page though.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8677) JVM SIGSEGV in Node::in

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8677?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss resolved LUCENE-8677.
-
Resolution: Cannot Reproduce

> JVM SIGSEGV in Node::in
> ---
>
> Key: LUCENE-8677
> URL: https://issues.apache.org/jira/browse/LUCENE-8677
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Dawid Weiss
>Assignee: Dawid Weiss
>Priority: Minor
>  Labels: jvm
>
> Jenkins:
> https://builds.apache.org/job/Lucene-Solr-SmokeRelease-8.x/15
> {code}
>[junit4] # A fatal error has been detected by the Java Runtime Environment:
>[junit4] #
>[junit4] #  SIGSEGV (0xb) at pc=0x000105bee9d8, pid=85292, tid=18179
>[junit4] #
>[junit4] # JRE version: Java(TM) SE Runtime Environment (9.0+181) (build 
> 9+181)
>[junit4] # Java VM: Java HotSpot(TM) 64-Bit Server VM (9+181, mixed mode, 
> tiered, concurrent mark sweep gc, bsd-amd64)
>[junit4] # Problematic frame:
>[junit4] # [thread 208539 also had an error]
>[junit4] V  [libjvm.dylib+0x4f49d8]  Node::in(unsigned int) const+0x18
>[junit4] #
>[junit4] # No core dump will be written. Core dumps have been disabled. To 
> enable core dumping, try "ulimit -c unlimited" before starting Java again
>[junit4] #
>[junit4] # An error report file with more information is saved as:
>[junit4] # 
> /Users/jenkins/workspace/Lucene-Solr-master-MacOSX/solr/build/solr-core/test/J0/hs_err_pid85292.log
>[junit4] # [ timer expired, abort... ]
> {code}
> No hs_err or replay log on the jenkins page though.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13190) Fuzzy search treated as server error instead of client error when terms are too complex

2019-12-18 Thread Andy Webb (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13190?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999118#comment-16999118
 ] 

Andy Webb edited comment on SOLR-13190 at 12/18/19 1:11 PM:


Thanks Mike!

I've [tried 
adding|https://github.com/apache/lucene-solr/compare/master...andywebb1975:maxQueryLength]
 a {{maxQueryLength}} option to {{Direct(Solr)SpellChecker}} which can be set 
to prevent long terms being spellchecked - it's a simple change, largely a 
cut-and-paste of the {{minQueryLength}}, and as far as I can see this would 
prevent us seeing the exceptions. It could default to 0, i.e. "no limit", to 
maintain the existing default behaviour unless it's deliberately set. Would 
this be a reasonable change to make to Lucene/Solr or do you think there might 
be a better approach?


was (Author: andywebb1975):
Thanks Mike!

I've tried adding a {{maxQueryLength}} option to {{Direct(Solr)SpellChecker}} 
which can be set to prevent long terms being spellchecked - it's a simple 
change, largely a cut-and-paste of the {{minQueryLength}}, and as far as I can 
see this would prevent us seeing the exceptions. It could default to 0, i.e. 
"no limit", to maintain the existing default behaviour unless it's deliberately 
set. Would this be a reasonable change to make to Lucene/Solr or do you think 
there might be a better approach?

> Fuzzy search treated as server error instead of client error when terms are 
> too complex
> ---
>
> Key: SOLR-13190
> URL: https://issues.apache.org/jira/browse/SOLR-13190
> Project: Solr
>  Issue Type: Bug
>  Components: search
>Affects Versions: master (9.0)
>Reporter: Mike Drob
>Assignee: Mike Drob
>Priority: Major
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We've seen a fuzzy search end up breaking the automaton and getting reported 
> as a server error. This usage should be improved by
> 1) reporting as a client error, because it's similar to something like too 
> many boolean clauses queries in how an operator should deal with it
> 2) report what field is causing the error, since that currently must be 
> deduced from adjacent query logs and can be difficult if there are multiple 
> terms in the search
> This trigger was added to defend against adversarial regex but somehow hits 
> fuzzy terms as well, I don't understand enough about the automaton mechanisms 
> to really know how to approach a fix there, but improving the operability is 
> a good first step.
> relevant stack trace:
> {noformat}
> org.apache.lucene.util.automaton.TooComplexToDeterminizeException: 
> Determinizing automaton with 13632 states and 21348 transitions would result 
> in more than 1 states.
>   at 
> org.apache.lucene.util.automaton.Operations.determinize(Operations.java:746)
>   at 
> org.apache.lucene.util.automaton.RunAutomaton.(RunAutomaton.java:69)
>   at 
> org.apache.lucene.util.automaton.ByteRunAutomaton.(ByteRunAutomaton.java:32)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:247)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:133)
>   at 
> org.apache.lucene.search.FuzzyTermsEnum.(FuzzyTermsEnum.java:143)
>   at org.apache.lucene.search.FuzzyQuery.getTermsEnum(FuzzyQuery.java:154)
>   at 
> org.apache.lucene.search.MultiTermQuery$RewriteMethod.getTermsEnum(MultiTermQuery.java:78)
>   at 
> org.apache.lucene.search.TermCollectingRewrite.collectTerms(TermCollectingRewrite.java:58)
>   at 
> org.apache.lucene.search.TopTermsRewrite.rewrite(TopTermsRewrite.java:67)
>   at 
> org.apache.lucene.search.MultiTermQuery.rewrite(MultiTermQuery.java:310)
>   at 
> org.apache.lucene.search.IndexSearcher.rewrite(IndexSearcher.java:667)
>   at org.apache.lucene.search.IndexSearcher.search(IndexSearcher.java:442)
>   at 
> org.apache.solr.search.SolrIndexSearcher.buildAndRunCollectorChain(SolrIndexSearcher.java:200)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListNC(SolrIndexSearcher.java:1604)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListC(SolrIndexSearcher.java:1420)
>   at 
> org.apache.solr.search.SolrIndexSearcher.search(SolrIndexSearcher.java:567)
>   at 
> org.apache.solr.handler.component.QueryComponent.doProcessUngroupedSearch(QueryComponent.java:1435)
>   at 
> org.apache.solr.handler.component.QueryComponent.process(QueryComponent.java:374)
>   at 
> org.apache.solr.handler.component.SearchHandler.handleRequestBody(SearchHandler.java:298)
>   at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:199)
>   at org.apache.solr.core.SolrCore.execute(SolrCore.java:2559)
> {nof

[jira] [Resolved] (LUCENE-8617) FSDirectory tries to create MMapDirectory on non default file system

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8617?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-8617.
-
Resolution: Won't Fix

Won't fix since we are not proceeding, and the OP asked to close

> FSDirectory tries to create MMapDirectory on non default file system
> 
>
> Key: LUCENE-8617
> URL: https://issues.apache.org/jira/browse/LUCENE-8617
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: core/store
>Affects Versions: 5.0
>Reporter: Philippe Marschall
>Priority: Major
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> {{org.apache.lucene.store.FSDirectory.open(Path, LockFactory)}} and 
> {{org.apache.lucene.store.FSDirectory.open(Path)}} always assume the path is 
> created on the default file system. If the path is not on the default file 
> system {{MMapDirectory}} is the wrong choice as only the default file system 
> can provide {{mmap()}}.
> In case of a non default file system {{SimpleFSDirectory}} is a good choice.
> See this bug for an example
> https://github.com/marschall/memoryfilesystem/issues/113



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14070) Deprecate CloudSolrClient's ZKHost constructor

2019-12-18 Thread Jason Gerlowski (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14070?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999139#comment-16999139
 ] 

Jason Gerlowski commented on SOLR-14070:


bq. This is inherently insecure.
Can you elaborate a bit on this please?  AFAIK clusterstate, security.json, 
etc. information is going to be in ZooKeeper with the same protections, 
regardless of how SolrJ finds the shape/status of a particular cluster.  I 
can't see how deprecating this constructor will make that information any more 
or less protected.

> Deprecate CloudSolrClient's ZKHost constructor
> --
>
> Key: SOLR-14070
> URL: https://issues.apache.org/jira/browse/SOLR-14070
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Ishan Chattopadhyaya
>Priority: Major
>
> CloudSolrClient can be used by pointing it to a ZK cluster. This is 
> inherently insecure.
> CSC can already be used in all the same ways by pointing it to a Solr cluster.
> Proposing to add a deprecation notice to the following constructor to the 
> CloudSolrClient#Builder:
> {code}
> public Builder(List zkHosts, Optional zkChroot)
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Comment Edited] (SOLR-13190) Fuzzy search treated as server error instead of client error when terms are too complex

2019-12-18 Thread Andy Webb (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13190?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999118#comment-16999118
 ] 

Andy Webb edited comment on SOLR-13190 at 12/18/19 1:18 PM:


Thanks Mike!

I've [tried adding|https://github.com/apache/lucene-solr/pull/1098] a 
{{maxQueryLength}} option to {{Direct(Solr)SpellChecker}} which can be set to 
prevent long terms being spellchecked - it's a simple change, largely a 
cut-and-paste of the {{minQueryLength}}, and as far as I can see this would 
prevent us seeing the exceptions. It could default to 0, i.e. "no limit", to 
maintain the existing default behaviour unless it's deliberately set. Would 
this be a reasonable change to make to Lucene/Solr or do you think there might 
be a better approach?


was (Author: andywebb1975):
Thanks Mike!

I've [tried 
adding|https://github.com/apache/lucene-solr/compare/master...andywebb1975:maxQueryLength]
 a {{maxQueryLength}} option to {{Direct(Solr)SpellChecker}} which can be set 
to prevent long terms being spellchecked - it's a simple change, largely a 
cut-and-paste of the {{minQueryLength}}, and as far as I can see this would 
prevent us seeing the exceptions. It could default to 0, i.e. "no limit", to 
maintain the existing default behaviour unless it's deliberately set. Would 
this be a reasonable change to make to Lucene/Solr or do you think there might 
be a better approach?

> Fuzzy search treated as server error instead of client error when terms are 
> too complex
> ---
>
> Key: SOLR-13190
> URL: https://issues.apache.org/jira/browse/SOLR-13190
> Project: Solr
>  Issue Type: Bug
>  Components: search
>Affects Versions: master (9.0)
>Reporter: Mike Drob
>Assignee: Mike Drob
>Priority: Major
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> We've seen a fuzzy search end up breaking the automaton and getting reported 
> as a server error. This usage should be improved by
> 1) reporting as a client error, because it's similar to something like too 
> many boolean clauses queries in how an operator should deal with it
> 2) report what field is causing the error, since that currently must be 
> deduced from adjacent query logs and can be difficult if there are multiple 
> terms in the search
> This trigger was added to defend against adversarial regex but somehow hits 
> fuzzy terms as well, I don't understand enough about the automaton mechanisms 
> to really know how to approach a fix there, but improving the operability is 
> a good first step.
> relevant stack trace:
> {noformat}
> org.apache.lucene.util.automaton.TooComplexToDeterminizeException: 
> Determinizing automaton with 13632 states and 21348 transitions would result 
> in more than 1 states.
>   at 
> org.apache.lucene.util.automaton.Operations.determinize(Operations.java:746)
>   at 
> org.apache.lucene.util.automaton.RunAutomaton.(RunAutomaton.java:69)
>   at 
> org.apache.lucene.util.automaton.ByteRunAutomaton.(ByteRunAutomaton.java:32)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:247)
>   at 
> org.apache.lucene.util.automaton.CompiledAutomaton.(CompiledAutomaton.java:133)
>   at 
> org.apache.lucene.search.FuzzyTermsEnum.(FuzzyTermsEnum.java:143)
>   at org.apache.lucene.search.FuzzyQuery.getTermsEnum(FuzzyQuery.java:154)
>   at 
> org.apache.lucene.search.MultiTermQuery$RewriteMethod.getTermsEnum(MultiTermQuery.java:78)
>   at 
> org.apache.lucene.search.TermCollectingRewrite.collectTerms(TermCollectingRewrite.java:58)
>   at 
> org.apache.lucene.search.TopTermsRewrite.rewrite(TopTermsRewrite.java:67)
>   at 
> org.apache.lucene.search.MultiTermQuery.rewrite(MultiTermQuery.java:310)
>   at 
> org.apache.lucene.search.IndexSearcher.rewrite(IndexSearcher.java:667)
>   at org.apache.lucene.search.IndexSearcher.search(IndexSearcher.java:442)
>   at 
> org.apache.solr.search.SolrIndexSearcher.buildAndRunCollectorChain(SolrIndexSearcher.java:200)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListNC(SolrIndexSearcher.java:1604)
>   at 
> org.apache.solr.search.SolrIndexSearcher.getDocListC(SolrIndexSearcher.java:1420)
>   at 
> org.apache.solr.search.SolrIndexSearcher.search(SolrIndexSearcher.java:567)
>   at 
> org.apache.solr.handler.component.QueryComponent.doProcessUngroupedSearch(QueryComponent.java:1435)
>   at 
> org.apache.solr.handler.component.QueryComponent.process(QueryComponent.java:374)
>   at 
> org.apache.solr.handler.component.SearchHandler.handleRequestBody(SearchHandler.java:298)
>   at 
> org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:199)
>   at org.apache.s

[GitHub] [lucene-solr] andywebb1975 opened a new pull request #1098: SOLR-13190 - added maxQueryLength parameter

2019-12-18 Thread GitBox
andywebb1975 opened a new pull request #1098: SOLR-13190 - added maxQueryLength 
parameter
URL: https://github.com/apache/lucene-solr/pull/1098
 
 
   
   
   
   # Description
   
   Please provide a short description of the changes you're making with this 
pull request.
   
   # Solution
   
   Please provide a short description of the approach taken to implement your 
solution.
   
   # Tests
   
   Please describe the tests you've developed or run to confirm this patch 
implements the feature or solves the problem.
   
   # Checklist
   
   Please review the following and check all that apply:
   
   - [ ] I have reviewed the guidelines for [How to 
Contribute](https://wiki.apache.org/solr/HowToContribute) and my code conforms 
to the standards described there to the best of my ability.
   - [ ] I have created a Jira issue and added the issue ID to my pull request 
title.
   - [ ] I have given Solr maintainers 
[access](https://help.github.com/en/articles/allowing-changes-to-a-pull-request-branch-created-from-a-fork)
 to contribute to my PR branch. (optional but recommended)
   - [ ] I have developed this patch against the `master` branch.
   - [ ] I have run `ant precommit` and the appropriate test suite.
   - [ ] I have added tests for my changes.
   - [ ] I have added documentation for the [Ref 
Guide](https://github.com/apache/lucene-solr/tree/master/solr/solr-ref-guide) 
(for Solr changes only).
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8596) The replacement of comments is a bug, in "UserDictionary.java"

2019-12-18 Thread Michael Sokolov (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8596?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999146#comment-16999146
 ] 

Michael Sokolov commented on LUCENE-8596:
-

That looks like a real problem we should fix.  There's no way to include a 
token with a "#" in a user dictionary. However it's problematic since any 
change here will not be backwards-compatible.

We can just change the behavior to respect comments only at the beginning of 
the line, and document the  breaking change. Some users may get bit when they 
upgrade (if they have been using the other comment style in their dictionaries).

Or, we can introduce some API change to support both styles of commenting. This 
seems overly complex for a pretty small edge case though: I favor fixing the 
behavior with a  breaking change plus documentation in CHANGES. If there's no 
objection, I'll merge this and add a note to CHANGES

> The replacement of comments is a bug, in "UserDictionary.java"
> --
>
> Key: LUCENE-8596
> URL: https://issues.apache.org/jira/browse/LUCENE-8596
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: modules/analysis
>Reporter: miyaharas
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> [https://github.com/apache/lucene-solr/blob/1d85cd783863f75cea133fb9c452302214165a4d/lucene/analysis/kuromoji/src/java/org/apache/lucene/analysis/ja/dict/UserDictionary.java#L68]
>  
> hi
> I think that this is bug.
> I think the following is correct
> {code:java}
> line = line.replaceAll ("^ #. * $", "");  
> {code}
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[GitHub] [lucene-solr] janhoy opened a new pull request #1099: SOLR-14111: Revert SOLR13541 which breaks SSL client auth

2019-12-18 Thread GitBox
janhoy opened a new pull request #1099: SOLR-14111: Revert SOLR13541 which 
breaks SSL client auth
URL: https://github.com/apache/lucene-solr/pull/1099
 
 
   See https://issues.apache.org/jira/browse/SOLR-14111 for details


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Tim Allison (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999151#comment-16999151
 ] 

Tim Allison commented on SOLR-14054:


[~dweiss], you are right.  I only found this issue when I ran all of Tika's 
unit test docs against the upgraded Solr.  I think users would be surprised to 
get a ClassNotFoundException when they send a csv file to DIH.  I can add unit 
tests for more file format coverage (including csv) or we can configure Tika to 
use only the TXTParser in Solr.  Let me know your preference.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14111) Revert SOLR-13541 which breaks SSL client auth

2019-12-18 Thread Jira


 [ 
https://issues.apache.org/jira/browse/SOLR-14111?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jan Høydahl updated SOLR-14111:
---
Affects Version/s: 8.4
   8.2
   8.3
   8.3.1

> Revert SOLR-13541 which breaks SSL client auth
> --
>
> Key: SOLR-14111
> URL: https://issues.apache.org/jira/browse/SOLR-14111
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Jan Høydahl
>Priority: Major
> Fix For: 8.4.1
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Propose to revert SOLR-13541 which was the commit introducing the regression. 
> This means rolling back to Jetty 9.4.14, in branch_8_4 only. Then release a 
> bugfix version 8.4.1 with this fix.
> The full fix of this issue will come in SOLR-14105 and SOLR-14106 in 8.5.0 
> but is more involved, requires further upgrade of Jetty beyond 9.4.19 and is 
> thus not suitable for a bugfix release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14111) Revert SOLR-13541 which breaks SSL client auth

2019-12-18 Thread Jira


 [ 
https://issues.apache.org/jira/browse/SOLR-14111?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jan Høydahl updated SOLR-14111:
---
Component/s: Server

> Revert SOLR-13541 which breaks SSL client auth
> --
>
> Key: SOLR-14111
> URL: https://issues.apache.org/jira/browse/SOLR-14111
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: Server
>Affects Versions: 8.2, 8.3, 8.4, 8.3.1
>Reporter: Jan Høydahl
>Assignee: Jan Høydahl
>Priority: Major
> Fix For: 8.4.1
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Propose to revert SOLR-13541 which was the commit introducing the regression. 
> This means rolling back to Jetty 9.4.14, in branch_8_4 only. Then release a 
> bugfix version 8.4.1 with this fix.
> The full fix of this issue will come in SOLR-14105 and SOLR-14106 in 8.5.0 
> but is more involved, requires further upgrade of Jetty beyond 9.4.19 and is 
> thus not suitable for a bugfix release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14111) Revert SOLR-13541 which breaks SSL client auth

2019-12-18 Thread Jira


[ 
https://issues.apache.org/jira/browse/SOLR-14111?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999152#comment-16999152
 ] 

Jan Høydahl commented on SOLR-14111:


[~krisden] do you agree that for 8.4.1 it is safer to revert jetty than to 
upgrade it? As I understood, v9.4.19 is also broken wrt client auth? Doing both 
jetty upgrade and your fixes for a bugfix release seems a bit too much.

> Revert SOLR-13541 which breaks SSL client auth
> --
>
> Key: SOLR-14111
> URL: https://issues.apache.org/jira/browse/SOLR-14111
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Jan Høydahl
>Assignee: Jan Høydahl
>Priority: Major
> Fix For: 8.4.1
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Propose to revert SOLR-13541 which was the commit introducing the regression. 
> This means rolling back to Jetty 9.4.14, in branch_8_4 only. Then release a 
> bugfix version 8.4.1 with this fix.
> The full fix of this issue will come in SOLR-14105 and SOLR-14106 in 8.5.0 
> but is more involved, requires further upgrade of Jetty beyond 9.4.19 and is 
> thus not suitable for a bugfix release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8561) Heap dump while search the index

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8561?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-8561.
-
Resolution: Abandoned

closing since the issue is stale and there is no way to repro

> Heap dump while search the index
> 
>
> Key: LUCENE-8561
> URL: https://issues.apache.org/jira/browse/LUCENE-8561
> Project: Lucene - Core
>  Issue Type: Bug
>Affects Versions: 4.3
>Reporter: Roshini
>Priority: Major
>
> A fatal error has been detected by the Java Runtime Environment:
> #
> #  EXCEPTION_IN_PAGE_ERROR (0xc006) at pc=0x08e02b78, pid=9892, 
> tid=8688
> #
> # JRE version: Java(TM) SE Runtime Environment (8.0_74-b02) (build 
> 1.8.0_74-b02)
> # Java VM: Java HotSpot(TM) 64-Bit Server VM (25.74-b02 mixed mode 
> windows-amd64 compressed oops)
> # Problematic frame:
> # J 45372 C2 
> org.apache.lucene.store.CompoundFileDirectory.readEntries(Lorg/apache/lucene/store/Directory$IndexInputSlicer;Lorg/apache/lucene/store/Directory;Ljava/lang/String;)Ljava/util/Map;
>  (387 bytes) @ 0x08e02b78 [0x08e02a40+0x138]
> #
> # Failed to write core dump. Minidump has been disabled from the command line
> #
> # If you would like to submit a bug report, please visit:
> #   [http://bugreport.java.com/bugreport/crash.jsp]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (LUCENE-8547) Add a build target that beasts all of the tests modified in the last commit.

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8547?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov updated LUCENE-8547:

Summary: Add a build target that beasts all of the tests modified in the 
last commit.  (was: Add an ant target that beasts all of the tests modified in 
the last commit.)

> Add a build target that beasts all of the tests modified in the last commit.
> 
>
> Key: LUCENE-8547
> URL: https://issues.apache.org/jira/browse/LUCENE-8547
> Project: Lucene - Core
>  Issue Type: Test
>Reporter: Mark Miller
>Priority: Major
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8530) fix some 'rawtypes' javac warnings

2019-12-18 Thread Michael Sokolov (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8530?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999163#comment-16999163
 ] 

Michael Sokolov commented on LUCENE-8530:
-

[~cpoerschke] did you want to push this? Otherwise, we could close the issue as 
abandoned/won't fix

> fix some 'rawtypes' javac warnings
> --
>
> Key: LUCENE-8530
> URL: https://issues.apache.org/jira/browse/LUCENE-8530
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Christine Poerschke
>Assignee: Christine Poerschke
>Priority: Minor
> Attachments: LUCENE-8530.patch
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8517) TestRandomChains.testRandomChainsWithLargeStrings failure

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8517?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-8517.
-
Resolution: Fixed

> TestRandomChains.testRandomChainsWithLargeStrings failure
> -
>
> Key: LUCENE-8517
> URL: https://issues.apache.org/jira/browse/LUCENE-8517
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: modules/analysis
>Reporter: Steven Rowe
>Priority: Major
>  Time Spent: 2h 10m
>  Remaining Estimate: 0h
>
> From 
> [https://jenkins.thetaphi.de/job/Lucene-Solr-7.x-Linux/2828/consoleText], 
> reproduces for me on Java8:
> {noformat}
> Checking out Revision 216f10026b86627750e133fe24ce6a750c470695 
> (refs/remotes/origin/branch_7x)
> [...]
> [java-info] java version "10.0.1"
> [java-info] OpenJDK Runtime Environment (10.0.1+10, Oracle Corporation)
> [java-info] OpenJDK 64-Bit Server VM (10.0.1+10, Oracle Corporation)
> [java-info] Test args: [-XX:-UseCompressedOops -XX:+UseConcMarkSweepGC]
> [...]
>[junit4] Suite: org.apache.lucene.analysis.core.TestRandomChains
>[junit4]   2> Exception from random analyzer: 
>[junit4]   2> charfilters=
>[junit4]   2>   
> org.apache.lucene.analysis.charfilter.MappingCharFilter(org.apache.lucene.analysis.charfilter.NormalizeCharMap@3ef95503,
>  java.io.StringReader@70dde633)
>[junit4]   2>   
> org.apache.lucene.analysis.fa.PersianCharFilter(org.apache.lucene.analysis.charfilter.MappingCharFilter@12423b20)
>[junit4]   2> tokenizer=
>[junit4]   2>   org.apache.lucene.analysis.th.ThaiTokenizer()
>[junit4]   2> filters=
>[junit4]   2>   
> org.apache.lucene.analysis.compound.HyphenationCompoundWordTokenFilter(ValidatingTokenFilter@7914bba7
>  
> term=,bytes=[],startOffset=0,endOffset=0,positionIncrement=1,positionLength=1,type=word,termFrequency=1,
>  org.apache.lucene.analysis.compound.hyphenation.HyphenationTree@abd7bca)
>[junit4]   2>   
> Conditional:org.apache.lucene.analysis.MockGraphTokenFilter(java.util.Random@56348091,
>  OneTimeWrapper@aa1c073 
> term=,bytes=[],startOffset=0,endOffset=0,positionIncrement=1,positionLength=1,type=word,termFrequency=1)
>[junit4]   2>   
> Conditional:org.apache.lucene.analysis.shingle.FixedShingleFilter(OneTimeWrapper@4cf58fce
>  
> term=,bytes=[],startOffset=0,endOffset=0,positionIncrement=1,positionLength=1,type=word,termFrequency=1,
>  4, , )
>[junit4]   2>   
> org.apache.lucene.analysis.pt.PortugueseLightStemFilter(ValidatingTokenFilter@3a915324
>  
> term=,bytes=[],startOffset=0,endOffset=0,positionIncrement=1,positionLength=1,type=word,termFrequency=1,keyword=false)
>[junit4]   2> NOTE: reproduce with: ant test  -Dtestcase=TestRandomChains 
> -Dtests.method=testRandomChainsWithLargeStrings -Dtests.seed=92344C536D4E00F4 
> -Dtests.multiplier=3 -Dtests.slow=true -Dtests.locale=en-ZW 
> -Dtests.timezone=Atlantic/Faroe -Dtests.asserts=true 
> -Dtests.file.encoding=US-ASCII
>[junit4] ERROR   0.46s J2 | 
> TestRandomChains.testRandomChainsWithLargeStrings <<<
>[junit4]> Throwable #1: java.lang.IllegalStateException: stage 3: 
> inconsistent startOffset at pos=0: 0 vs 5; token=effort
>[junit4]>  at 
> __randomizedtesting.SeedInfo.seed([92344C536D4E00F4:F86FF34234002007]:0)
>[junit4]>  at 
> org.apache.lucene.analysis.ValidatingTokenFilter.incrementToken(ValidatingTokenFilter.java:109)
>[junit4]>  at 
> org.apache.lucene.analysis.pt.PortugueseLightStemFilter.incrementToken(PortugueseLightStemFilter.java:48)
>[junit4]>  at 
> org.apache.lucene.analysis.ValidatingTokenFilter.incrementToken(ValidatingTokenFilter.java:68)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkResetException(BaseTokenStreamTestCase.java:441)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:546)
>[junit4]>  at 
> org.apache.lucene.analysis.core.TestRandomChains.testRandomChainsWithLargeStrings(TestRandomChains.java:897)
>[junit4]>  at 
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>[junit4]>  at 
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>[junit4]>  at 
> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>[junit4]>  at 
> java.base/java.lang.reflect.Method.invoke(Method.java:564)
>[junit4]>  at java.base/java.lang.Thread.run(Thread.java:844)
>[junit4]   2> NOTE: test params are: codec=Asserting(Lucene70): 
> {dummy=TestBloomFilteredLucenePostings(BloomFilteringPostingsFormat(Lucene50(blocksize=128)))},
>  docValues:{}, maxPointsInLeafNode=214, maxMBSortInHe

[jira] [Commented] (LUCENE-8494) CFS leaks a file on exception opening it

2019-12-18 Thread Michael Sokolov (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8494?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999172#comment-16999172
 ] 

Michael Sokolov commented on LUCENE-8494:
-

Is there anything to be done here? Or ... is this just an issue with cleaning 
up from a failed test (in which case I think we should close if there's no 
obvious fix)

> CFS leaks a file on exception opening it
> 
>
> Key: LUCENE-8494
> URL: https://issues.apache.org/jira/browse/LUCENE-8494
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: core/codecs
>Reporter: Robert Muir
>Priority: Major
>
> If CFS hits an exception opening its file, it will leak the file handle. 
> Found by Jenkins: https://jenkins.thetaphi.de/job/Lucene-Solr-7.x-Solaris/808/
> {noformat}
>  java.lang.RuntimeException: MockDirectoryWrapper: cannot close: there are 
> still 7 open files: {_j.cfs=1, _h.cfs=1, _e.cfs=1, _g.cfs=1, _i.cfs=1, 
> _k.cfs=1, _f.cfs=1}
> ...
> Caused by: java.lang.RuntimeException: unclosed IndexInput: _f.cfs
> at 
> org.apache.lucene.store.MockDirectoryWrapper.addFileHandle(MockDirectoryWrapper.java:730)
> at 
> org.apache.lucene.store.MockDirectoryWrapper.openInput(MockDirectoryWrapper.java:773)
> at 
> org.apache.lucene.codecs.lucene50.Lucene50CompoundReader.(Lucene50CompoundReader.java:78)
> {noformat}
> Looks like it needs to move opening of {{handle}} into the try block 
> (untested):
> {noformat}
> diff --git 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
>  
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> index 7526c88c20..db54ecdee2 100644
> --- 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> +++ 
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> @@ -75,8 +75,8 @@ final class Lucene50CompoundReader extends Directory {
>  }
>  expectedLength += CodecUtil.footerLength(); 
>  
> -handle = directory.openInput(dataFileName, context);
>  try {
> +  handle = directory.openInput(dataFileName, context);
>CodecUtil.checkIndexHeader(handle, Lucene50CompoundFormat.DATA_CODEC, 
> version, version, si.getId(), "");
>
>// NOTE: data file is too costly to verify checksum against all the 
> bytes on open,
> {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8489) Provide List type constructors for BaseCompositeReader based Readers

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8489?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-8489.
-
Resolution: Won't Fix

The discussion ended up deciding not to go forward , so I'm resolving the issue.

> Provide List type constructors for BaseCompositeReader based Readers
> 
>
> Key: LUCENE-8489
> URL: https://issues.apache.org/jira/browse/LUCENE-8489
> Project: Lucene - Core
>  Issue Type: Improvement
>  Components: core/index
>Reporter: Namgyu Kim
>Priority: Major
>  Labels: usability
> Attachments: LUCENE-8489.patch
>
>
> Currently, Reader based on BaseCompositeReader(MultiReader, 
> ParallelCompositeReader, DirectoryReader) does not support List type 
> constructor.
> In fact, this does not make a big difference in performance, but users will 
> think positively if the API supports more variants.
> I will add the following to support this.
> 1) MultiReader
> {code:java}
> public MultiReader(List subReaders) throws IOException {
>   this(subReaders, true);
> }
> public MultiReader(List subReaders, boolean closeSubReaders) 
> throws IOException {
>   this(subReaders.toArray(new IndexReader[0]), closeSubReaders);
> }
> {code}
> 2) ParallelCompositeReader
> {code:java}
> public ParallelCompositeReader(List readers) throws 
> IOException {
>   this(true, readers);
> }
> public ParallelCompositeReader(boolean closeSubReaders, List 
> readers) throws IOException {
>   this(closeSubReaders, readers, readers);
> }
> public ParallelCompositeReader(boolean closeSubReaders, List 
> readers, List storedFieldReaders) throws IOException {
>   this(closeSubReaders, readers.toArray(new CompositeReader[0]), 
> storedFieldReaders.toArray(new CompositeReader[0]));
> }
> {code}
> 3) DirectoryReader
> {code:java}
> protected DirectoryReader(Directory directory, List 
> segmentReaders) throws IOException {
>   super(segmentReaders);
>   this.directory = directory;
> }
> {code}
> 4) BaseCompositeReader
> {code:java}
> @SuppressWarnings("unchecked")
> protected BaseCompositeReader(List subReaders) throws IOException {
>   this(subReaders.toArray((R[]) new IndexReader[subReaders.size()]));
> }
> {code}
> 5) Test
>  I wrote a test case in "TestParallelCompositeReader".
> If you have any questions or requests, please left any comments :D



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8488) Javadoc examples should be kept in sync with actual compiled code

2019-12-18 Thread Michael Sokolov (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8488?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999175#comment-16999175
 ] 

Michael Sokolov commented on LUCENE-8488:
-

[~dweiss]can you elaborate what your idea here is? Are you thinking of a way to 
*automatically* keep examples in javadocs up to date?

> Javadoc examples should be kept in sync with actual compiled code
> -
>
> Key: LUCENE-8488
> URL: https://issues.apache.org/jira/browse/LUCENE-8488
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Priority: Minor
>
> This isn't something that is done trivially, unfortunately, but can be hacked 
> around. And it'd help to keep the docs up-to-date.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8488) Javadoc examples should be kept in sync with actual compiled code

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8488?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999183#comment-16999183
 ] 

Dawid Weiss commented on LUCENE-8488:
-

Precisely. I think this would have to wait until the switch to gradle is 
complete. Doing this in ant is going to be nighmarish.

> Javadoc examples should be kept in sync with actual compiled code
> -
>
> Key: LUCENE-8488
> URL: https://issues.apache.org/jira/browse/LUCENE-8488
> Project: Lucene - Core
>  Issue Type: Task
>Reporter: Dawid Weiss
>Priority: Minor
>
> This isn't something that is done trivially, unfortunately, but can be hacked 
> around. And it'd help to keep the docs up-to-date.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-8494) CFS leaks a file on exception opening it

2019-12-18 Thread Dawid Weiss (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-8494?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dawid Weiss resolved LUCENE-8494.
-
Resolution: Cannot Reproduce

> CFS leaks a file on exception opening it
> 
>
> Key: LUCENE-8494
> URL: https://issues.apache.org/jira/browse/LUCENE-8494
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: core/codecs
>Reporter: Robert Muir
>Priority: Major
>
> If CFS hits an exception opening its file, it will leak the file handle. 
> Found by Jenkins: https://jenkins.thetaphi.de/job/Lucene-Solr-7.x-Solaris/808/
> {noformat}
>  java.lang.RuntimeException: MockDirectoryWrapper: cannot close: there are 
> still 7 open files: {_j.cfs=1, _h.cfs=1, _e.cfs=1, _g.cfs=1, _i.cfs=1, 
> _k.cfs=1, _f.cfs=1}
> ...
> Caused by: java.lang.RuntimeException: unclosed IndexInput: _f.cfs
> at 
> org.apache.lucene.store.MockDirectoryWrapper.addFileHandle(MockDirectoryWrapper.java:730)
> at 
> org.apache.lucene.store.MockDirectoryWrapper.openInput(MockDirectoryWrapper.java:773)
> at 
> org.apache.lucene.codecs.lucene50.Lucene50CompoundReader.(Lucene50CompoundReader.java:78)
> {noformat}
> Looks like it needs to move opening of {{handle}} into the try block 
> (untested):
> {noformat}
> diff --git 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
>  
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> index 7526c88c20..db54ecdee2 100644
> --- 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> +++ 
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> @@ -75,8 +75,8 @@ final class Lucene50CompoundReader extends Directory {
>  }
>  expectedLength += CodecUtil.footerLength(); 
>  
> -handle = directory.openInput(dataFileName, context);
>  try {
> +  handle = directory.openInput(dataFileName, context);
>CodecUtil.checkIndexHeader(handle, Lucene50CompoundFormat.DATA_CODEC, 
> version, version, si.getId(), "");
>
>// NOTE: data file is too costly to verify checksum against all the 
> bytes on open,
> {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8494) CFS leaks a file on exception opening it

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8494?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999184#comment-16999184
 ] 

Dawid Weiss commented on LUCENE-8494:
-

I think we can close and reopen if needed. Please close JIRA issues with 
'cannot reproduce' or a similar status indicating the issue may still be there. 
I'm not sure if this is the case here.

> CFS leaks a file on exception opening it
> 
>
> Key: LUCENE-8494
> URL: https://issues.apache.org/jira/browse/LUCENE-8494
> Project: Lucene - Core
>  Issue Type: Bug
>  Components: core/codecs
>Reporter: Robert Muir
>Priority: Major
>
> If CFS hits an exception opening its file, it will leak the file handle. 
> Found by Jenkins: https://jenkins.thetaphi.de/job/Lucene-Solr-7.x-Solaris/808/
> {noformat}
>  java.lang.RuntimeException: MockDirectoryWrapper: cannot close: there are 
> still 7 open files: {_j.cfs=1, _h.cfs=1, _e.cfs=1, _g.cfs=1, _i.cfs=1, 
> _k.cfs=1, _f.cfs=1}
> ...
> Caused by: java.lang.RuntimeException: unclosed IndexInput: _f.cfs
> at 
> org.apache.lucene.store.MockDirectoryWrapper.addFileHandle(MockDirectoryWrapper.java:730)
> at 
> org.apache.lucene.store.MockDirectoryWrapper.openInput(MockDirectoryWrapper.java:773)
> at 
> org.apache.lucene.codecs.lucene50.Lucene50CompoundReader.(Lucene50CompoundReader.java:78)
> {noformat}
> Looks like it needs to move opening of {{handle}} into the try block 
> (untested):
> {noformat}
> diff --git 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
>  
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> index 7526c88c20..db54ecdee2 100644
> --- 
> a/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> +++ 
> b/lucene/core/src/java/org/apache/lucene/codecs/lucene50/Lucene50CompoundReader.java
> @@ -75,8 +75,8 @@ final class Lucene50CompoundReader extends Directory {
>  }
>  expectedLength += CodecUtil.footerLength(); 
>  
> -handle = directory.openInput(dataFileName, context);
>  try {
> +  handle = directory.openInput(dataFileName, context);
>CodecUtil.checkIndexHeader(handle, Lucene50CompoundFormat.DATA_CODEC, 
> version, version, si.getId(), "");
>
>// NOTE: data file is too costly to verify checksum against all the 
> bytes on open,
> {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (LUCENE-8222) TestICUTokenizerCJK failure

2019-12-18 Thread Michael Sokolov (Jira)


[ 
https://issues.apache.org/jira/browse/LUCENE-8222?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999188#comment-16999188
 ] 

Michael Sokolov commented on LUCENE-8222:
-

The ICU bug was marked fixed in 63.1; we should try upgrading and see we can 
re-enable this test

> TestICUTokenizerCJK failure
> ---
>
> Key: LUCENE-8222
> URL: https://issues.apache.org/jira/browse/LUCENE-8222
> Project: Lucene - Core
>  Issue Type: Bug
>Reporter: Alan Woodward
>Priority: Major
>
> This reproduces for me:
> {code:java}
> [junit4] 2> NOTE: reproduce with: ant test -Dtestcase=TestICUTokenizerCJK 
> -Dtests.method=testRandomHugeStrings -Dtests.seed=2C1F4414ECB02FE4 
> -Dtests.slow=true -Dtests.badapples=true -Dtests.locale=pl-PL 
> -Dtests.timezone=Europe/Athens -Dtests.asserts=true 
> -Dtests.file.encoding=US-ASCII
> [junit4] FAILURE 0.57s | TestICUTokenizerCJK.testRandomHugeStrings <<<
> [junit4] > Throwable #1: org.junit.ComparisonFailure: term 128 expected:<ー[]> 
> but was:<ー[デ]>
> [junit4] > at 
> __randomizedtesting.SeedInfo.seed([2C1F4414ECB02FE4:B43C23D7B2C693AC]:0)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:201)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:325)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:329)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkAnalysisConsistency(BaseTokenStreamTestCase.java:869)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:668)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:566)
> [junit4] > at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:479)
> [junit4] > at 
> org.apache.lucene.analysis.icu.segmentation.TestICUTokenizerCJK.testRandomHugeStrings(TestICUTokenizerCJK.java:107)
> [junit4] > at 
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> [junit4] > at 
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> [junit4] > at 
> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> [junit4] > at java.base/java.lang.reflect.Method.invoke(Method.java:564)
> [junit4] > at java.base/java.lang.Thread.run(Thread.java:844)
> [junit4] 2> NOTE: test params are: codec=Asserting(Lucene70): 
> {dummy=PostingsFormat(name=LuceneVarGapDocFreqInterval)}, docValues:{}, 
> maxPointsInLeafNode=1800, maxMBSortInHeap=7.290162896982681, 
> sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@3f70f3d9),
>  locale=pl-PL, timezone=Europe/Athens
> [junit4] 2> NOTE: Mac OS X 10.13.3 x86_64/Oracle Corporation 9.0.1 
> (64-bit)/cpus=8,threads=1,free=150530048,total=268435456{code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-3006) Javadocs warnings should fail the build

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-3006?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-3006.
-
Resolution: Fixed

This 8-year-old issue got fixed at some point - checking javadocs is now part 
of precommit. I think we can close as Fixed.

> Javadocs warnings should fail the build
> ---
>
> Key: LUCENE-3006
> URL: https://issues.apache.org/jira/browse/LUCENE-3006
> Project: Lucene - Core
>  Issue Type: Improvement
>Affects Versions: 3.2, 4.0-ALPHA
>Reporter: Grant Ingersoll
>Priority: Major
> Attachments: LUCENE-3006-javadoc-warning-cleanup.patch, 
> LUCENE-3006-modules-javadoc-warning-cleanup.patch, LUCENE-3006.patch, 
> LUCENE-3006.patch, LUCENE-3006.patch
>
>
> We should fail the build when there are javadocs warnings, as this should not 
> be the Release Manager's job to fix all at once right before the release.
> See 
> http://www.lucidimagination.com/search/document/14bd01e519f39aff/brainstorming_on_improving_the_release_process



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Dawid Weiss (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999192#comment-16999192
 ] 

Dawid Weiss commented on SOLR-14054:


Right. I don't think we can exclude the csv dependency - I recall trying to 
make the plain text parser avoid pulling csv classes but tika defaulted to 
using this class (which does some auto-detection):

https://github.com/apache/tika/blob/4b330263d1759c35886e6243d5edc5426be54029/tika-parsers/src/main/java/org/apache/tika/parser/csv/TextAndCSVParser.java

and csv classes are hard referenced. A test that would fail (on missing 
dependency) added on top of this patch would be great.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Resolved] (LUCENE-6236) TestICUNormalizer2CharFilter test is failing consistently

2019-12-18 Thread Michael Sokolov (Jira)


 [ 
https://issues.apache.org/jira/browse/LUCENE-6236?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Sokolov resolved LUCENE-6236.
-
Resolution: Won't Fix

This is no longer true on master (the test succeeds, generally), and we're not 
going to go back and fix an issue from 5 major  versions ago, even if it is 
still reproducing there...

> TestICUNormalizer2CharFilter test is failing consistently
> -
>
> Key: LUCENE-6236
> URL: https://issues.apache.org/jira/browse/LUCENE-6236
> Project: Lucene - Core
>  Issue Type: Test
>Affects Versions: 4.10.3
>Reporter: Hrishikesh Gadre
>Priority: Major
>
> In my development environment, following unit test is failing consistently.
> ant test  -Dtestcase=TestICUNormalizer2CharFilter 
> -Dtests.method=testRandomStrings -Dtests.seed=E27DEA12D513F6FF 
> -Dtests.slow=true -Dtests.locale=ru -Dtests.timezone=PNT -Dtests.asserts=true 
> -Dtests.file.encoding=UTF-8
>[junit4] FAILURE 1.70s | TestICUNormalizer2CharFilter.testRandomStrings <<<
>[junit4]> Throwable #1: java.lang.AssertionError: startOffset 625 
> expected:<5377> but was:<5378>
>[junit4]>  at 
> __randomizedtesting.SeedInfo.seed([E27DEA12D513F6FF:6AF4EAAC7617A1CA]:0)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:183)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:296)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.assertTokenStreamContents(BaseTokenStreamTestCase.java:300)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkAnalysisConsistency(BaseTokenStreamTestCase.java:815)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:614)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:513)
>[junit4]>  at 
> org.apache.lucene.analysis.BaseTokenStreamTestCase.checkRandomData(BaseTokenStreamTestCase.java:437)
>[junit4]>  at 
> org.apache.lucene.analysis.icu.TestICUNormalizer2CharFilter.testRandomStrings(TestICUNormalizer2CharFilter.java:186)
>[junit4]>  at java.lang.Thread.run(Thread.java:745)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14110) sandbox javax.script usage in tests

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14110?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999200#comment-16999200
 ] 

ASF subversion and git services commented on SOLR-14110:


Commit 612cba38cab168a41392506cda6ebfe03a9af916 in lucene-solr's branch 
refs/heads/gradle-master from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=612cba3 ]

SOLR-14110: sandbox javax.script usage in tests


> sandbox javax.script usage in tests
> ---
>
> Key: SOLR-14110
> URL: https://issues.apache.org/jira/browse/SOLR-14110
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Assignee: Robert Muir
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14110.patch
>
>
> Similar to SOLR-13993 we should sandbox the use of javax.script if security 
> manager is present.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13983) remove or replace process execution in SystemInfoHandler

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999209#comment-16999209
 ] 

ASF subversion and git services commented on SOLR-13983:


Commit 56839f6ace6fa3241754d371e90fce696c00cd8e in lucene-solr's branch 
refs/heads/master from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=56839f6 ]

SOLR-13983: remove or replace process execution in SystemInfoHandler


> remove or replace process execution in SystemInfoHandler
> 
>
> Key: SOLR-13983
> URL: https://issues.apache.org/jira/browse/SOLR-13983
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-13983.patch
>
>
> SystemInfoHandler is the only place in solr code executing processes. 
> Since solr is a server/long running process listening to HTTP, ideally 
> process execution could be disabled (e.g. with security manager). But first 
> this code needs to be removed or replaced, so that there is no legitimate use 
> of it:
> {noformat}
> try { 
>   if (!Constants.WINDOWS) {
> info.add( "uname",  execute( "uname -a" ) );
> info.add( "uptime", execute( "uptime" ) );
>   }
> } catch( Exception ex ) {
>   log.warn("Unable to execute command line tools to get operating system 
> properties.", ex);
> } 
> return info;
> {noformat}
> It already looks like its getting data from OS MXbean here, so maybe this 
> logic is simply outdated or not needed. It seems to be "best-effort" anyway. 
> Alternatively similar stuff could be fetched by reading from e.g. /proc file 
> system location if needed.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13756) ivy cannot download org.restlet.ext.servlet jar

2019-12-18 Thread Zsolt Gyulavari (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13756?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999213#comment-16999213
 ] 

Zsolt Gyulavari commented on SOLR-13756:


I'm working on this currently.

> ivy cannot download org.restlet.ext.servlet jar
> ---
>
> Key: SOLR-13756
> URL: https://issues.apache.org/jira/browse/SOLR-13756
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Chongchen Chen
>Priority: Major
>
> I checkout the project and run `ant idea`, it will try to download jars. But  
> https://repo1.maven.org/maven2/org/restlet/jee/org.restlet.ext.servlet/2.3.0/org.restlet.ext.servlet-2.3.0.jar
>  will return 404 now.  
> [ivy:retrieve] public: tried
> [ivy:retrieve]  
> https://repo1.maven.org/maven2/org/restlet/jee/org.restlet.ext.servlet/2.3.0/org.restlet.ext.servlet-2.3.0.jar
> [ivy:retrieve]::
> [ivy:retrieve]::  FAILED DOWNLOADS::
> [ivy:retrieve]:: ^ see resolution messages for details  ^ ::
> [ivy:retrieve]::
> [ivy:retrieve]:: 
> org.restlet.jee#org.restlet;2.3.0!org.restlet.jar
> [ivy:retrieve]:: 
> org.restlet.jee#org.restlet.ext.servlet;2.3.0!org.restlet.ext.servlet.jar
> [ivy:retrieve]::



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13579) Create resource management API

2019-12-18 Thread Andrzej Bialecki (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13579?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999228#comment-16999228
 ] 

Andrzej Bialecki commented on SOLR-13579:
-

Updated patch:
 * improved algorithm for cache limits adjustments - both soft optimization and 
hard control are supported, see javadocs for {{CacheManagerPool}}
 * unit tests.
 * {{ChangeListener}} API for monitoring resource adjustments by the framework.

> Create resource management API
> --
>
> Key: SOLR-13579
> URL: https://issues.apache.org/jira/browse/SOLR-13579
> Project: Solr
>  Issue Type: New Feature
>Reporter: Andrzej Bialecki
>Assignee: Andrzej Bialecki
>Priority: Major
> Attachments: SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch
>
>
> Resource management framework API supporting the goals outlined in SOLR-13578.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-13579) Create resource management API

2019-12-18 Thread Andrzej Bialecki (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13579?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrzej Bialecki updated SOLR-13579:

Attachment: SOLR-13579.patch

> Create resource management API
> --
>
> Key: SOLR-13579
> URL: https://issues.apache.org/jira/browse/SOLR-13579
> Project: Solr
>  Issue Type: New Feature
>Reporter: Andrzej Bialecki
>Assignee: Andrzej Bialecki
>Priority: Major
> Attachments: SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch
>
>
> Resource management framework API supporting the goals outlined in SOLR-13578.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-13579) Create resource management API

2019-12-18 Thread Andrzej Bialecki (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13579?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrzej Bialecki updated SOLR-13579:

Attachment: (was: SOLR-13579.patch)

> Create resource management API
> --
>
> Key: SOLR-13579
> URL: https://issues.apache.org/jira/browse/SOLR-13579
> Project: Solr
>  Issue Type: New Feature
>Reporter: Andrzej Bialecki
>Assignee: Andrzej Bialecki
>Priority: Major
> Attachments: SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch
>
>
> Resource management framework API supporting the goals outlined in SOLR-13578.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13983) remove or replace process execution in SystemInfoHandler

2019-12-18 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999242#comment-16999242
 ] 

ASF subversion and git services commented on SOLR-13983:


Commit 8c14015e52af2568aaefbf6fb4c6e8ad01a6a8fe in lucene-solr's branch 
refs/heads/branch_8x from Robert Muir
[ https://gitbox.apache.org/repos/asf?p=lucene-solr.git;h=8c14015 ]

SOLR-13983: remove or replace process execution in SystemInfoHandler


> remove or replace process execution in SystemInfoHandler
> 
>
> Key: SOLR-13983
> URL: https://issues.apache.org/jira/browse/SOLR-13983
> Project: Solr
>  Issue Type: Improvement
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Robert Muir
>Priority: Major
> Attachments: SOLR-13983.patch
>
>
> SystemInfoHandler is the only place in solr code executing processes. 
> Since solr is a server/long running process listening to HTTP, ideally 
> process execution could be disabled (e.g. with security manager). But first 
> this code needs to be removed or replaced, so that there is no legitimate use 
> of it:
> {noformat}
> try { 
>   if (!Constants.WINDOWS) {
> info.add( "uname",  execute( "uname -a" ) );
> info.add( "uptime", execute( "uptime" ) );
>   }
> } catch( Exception ex ) {
>   log.warn("Unable to execute command line tools to get operating system 
> properties.", ex);
> } 
> return info;
> {noformat}
> It already looks like its getting data from OS MXbean here, so maybe this 
> logic is simply outdated or not needed. It seems to be "best-effort" anyway. 
> Alternatively similar stuff could be fetched by reading from e.g. /proc file 
> system location if needed.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Created] (SOLR-14112) do not display load average of -1.00 on windows in admin UI

2019-12-18 Thread Robert Muir (Jira)
Robert Muir created SOLR-14112:
--

 Summary: do not display load average of -1.00 on windows in admin 
UI
 Key: SOLR-14112
 URL: https://issues.apache.org/jira/browse/SOLR-14112
 Project: Solr
  Issue Type: Bug
  Security Level: Public (Default Security Level. Issues are Public)
Affects Versions: 8.5
Reporter: Robert Muir
 Fix For: 8.5


I caused this with SOLR-13983. The OSMXBean returns -1, we should handle that 
in the javascript and display nothing at all, to prevent confusion.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-13579) Create resource management API

2019-12-18 Thread Andrzej Bialecki (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-13579?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrzej Bialecki updated SOLR-13579:

Attachment: SOLR-13579.patch

> Create resource management API
> --
>
> Key: SOLR-13579
> URL: https://issues.apache.org/jira/browse/SOLR-13579
> Project: Solr
>  Issue Type: New Feature
>Reporter: Andrzej Bialecki
>Assignee: Andrzej Bialecki
>Priority: Major
> Attachments: SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch, 
> SOLR-13579.patch, SOLR-13579.patch, SOLR-13579.patch
>
>
> Resource management framework API supporting the goals outlined in SOLR-13578.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Tim Allison (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999247#comment-16999247
 ] 

Tim Allison commented on SOLR-14054:


[~hossman] I can replicate this now.  I should have caught this before the 
commit.  I clearly tested with Java 11 when I thought I was testing with Java 
8.  This is my fault.

 

The problem is solved if we add the xml-apis dependency, which xerces requires. 
 It looks like the earlier version of xerces didn't happen to require xml-apis 
on the execution paths the unit tests were exercising.  I can't explain why 
this isn't a problem with Java 11.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14112) do not display load average of -1.00 on windows in admin UI

2019-12-18 Thread Robert Muir (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14112?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999252#comment-16999252
 ] 

Robert Muir commented on SOLR-14112:


untested patch: i have issues with my windows VM crashing my os X kernel from 
time to time :(

> do not display load average of -1.00 on windows in admin UI
> ---
>
> Key: SOLR-14112
> URL: https://issues.apache.org/jira/browse/SOLR-14112
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Robert Muir
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14112.patch
>
>
> I caused this with SOLR-13983. The OSMXBean returns -1, we should handle that 
> in the javascript and display nothing at all, to prevent confusion.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Updated] (SOLR-14112) do not display load average of -1.00 on windows in admin UI

2019-12-18 Thread Robert Muir (Jira)


 [ 
https://issues.apache.org/jira/browse/SOLR-14112?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Muir updated SOLR-14112:
---
Attachment: SOLR-14112.patch

> do not display load average of -1.00 on windows in admin UI
> ---
>
> Key: SOLR-14112
> URL: https://issues.apache.org/jira/browse/SOLR-14112
> Project: Solr
>  Issue Type: Bug
>  Security Level: Public(Default Security Level. Issues are Public) 
>Affects Versions: 8.5
>Reporter: Robert Muir
>Priority: Major
> Fix For: 8.5
>
> Attachments: SOLR-14112.patch
>
>
> I caused this with SOLR-13983. The OSMXBean returns -1, we should handle that 
> in the javascript and display nothing at all, to prevent confusion.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-14054) Upgrade Tika to 1.23

2019-12-18 Thread Tim Allison (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-14054?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999254#comment-16999254
 ] 

Tim Allison commented on SOLR-14054:


[~dweiss], will do on a separate issue if that's ok. 

 

You can tell Tika to avoid loading the TextAndCSVParser and use the TXTParser 
instead via tika-config.xml.  If you'd prefer this behavior either offline or 
in Solr, I can show you how to do that.

> Upgrade Tika to 1.23
> 
>
> Key: SOLR-14054
> URL: https://issues.apache.org/jira/browse/SOLR-14054
> Project: Solr
>  Issue Type: Task
>  Security Level: Public(Default Security Level. Issues are Public) 
>  Components: contrib - DataImportHandler
>Reporter: Tim Allison
>Assignee: Tim Allison
>Priority: Minor
> Fix For: 8.5
>
> Attachments: test-documents.7z, 
> tika-integration-example-9.0.0-SNAPSHOT.tgz
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We just released 1.23.  Let's upgrade Tika.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



[jira] [Commented] (SOLR-13822) Isolated Classloading from packages

2019-12-18 Thread Cassandra Targett (Jira)


[ 
https://issues.apache.org/jira/browse/SOLR-13822?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16999262#comment-16999262
 ] 

Cassandra Targett commented on SOLR-13822:
--

[~noble.paul], [~ichattopadhyaya] - this commit: 

https://github.com/apache/lucene-solr/commit/f98555854cbdb9d396c34a93fde9c1610df74882#diff-04f78a3e0960a743f6b4267e2d0f7f49

was only pushed to {{master}} branch and not {{branch_8x}}. Thus these changes 
*do not* appear in 8.4, which is contrary to what this issue says. The bug 
fixes and doc changes will not be available to users. I can pull out the doc 
changes, but it's too late, I guess for the bug fixes?

> Isolated Classloading from packages
> ---
>
> Key: SOLR-13822
> URL: https://issues.apache.org/jira/browse/SOLR-13822
> Project: Solr
>  Issue Type: Sub-task
>  Security Level: Public(Default Security Level. Issues are Public) 
>Reporter: Ishan Chattopadhyaya
>Assignee: Noble Paul
>Priority: Major
> Fix For: 8.4
>
> Attachments: SOLR-13822.patch
>
>  Time Spent: 2.5h
>  Remaining Estimate: 0h
>
> Design is here: 
> [https://docs.google.com/document/d/15b3m3i3NFDKbhkhX_BN0MgvPGZaBj34TKNF2-UNC3U8/edit?ts=5d86a8ad#]
>  
> main features:
>  * A new file for packages definition (/packages.json) in ZK
>  * Public APIs to edit/read the file
>  * The APIs are registered at {{/api/cluster/package}}
>  * Classes can be loaded from the package classloader using the 
> {{:}} syntax



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org



  1   2   >