-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix null values indexed as "null" strings in flat_object field #14069
Conversation
53b8006
to
3a814c8
Compare
❌ Gradle check result for 53b8006: FAILURE Please examine the workflow log, locate, and copy-paste the failure(s) below, then iterate to green. Is the failure a flaky test unrelated to your change? |
❌ Gradle check result for 3a814c8: FAILURE Please examine the workflow log, locate, and copy-paste the failure(s) below, then iterate to green. Is the failure a flaky test unrelated to your change? |
3a814c8
to
687dbfb
Compare
❌ Gradle check result for 687dbfb: FAILURE Please examine the workflow log, locate, and copy-paste the failure(s) below, then iterate to green. Is the failure a flaky test unrelated to your change? |
c61403e
to
67525ea
Compare
ReindexBasicTests.testMultipleSources #13913 |
92c8ddd
to
7023bd1
Compare
❌ Gradle check result for 7023bd1: FAILURE Please examine the workflow log, locate, and copy-paste the failure(s) below, then iterate to green. Is the failure a flaky test unrelated to your change? |
MasterServiceTests.testClusterStateUpdateLoggingWithDebugEnabled #15117 |
Signed-off-by: kkewwei <kkewwei@163.com>
7023bd1
to
53306f7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
server/src/main/java/org/opensearch/common/xcontent/JsonToStringXContentParser.java
Show resolved
Hide resolved
server/src/main/java/org/opensearch/common/xcontent/JsonToStringXContentParser.java
Show resolved
Hide resolved
Actually, while I still agree with my prior review comments, they don't affect the usefulness of this fix. I'm going to approve and merge, and I can take care of the cosmetic changes. |
Signed-off-by: kkewwei <kkewwei@163.com> (cherry picked from commit 9194b7a) Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
@msfroh, very thank you for your follow-up cosmetic changes. |
(cherry picked from commit 9194b7a) Signed-off-by: kkewwei <kkewwei@163.com> Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
…t#14069) Signed-off-by: kkewwei <kkewwei@163.com>
I think I'm encountering the infinite loop. Any chance of getting this backported and released into 2.15 any time soon? |
@cameronattard only high sev security fixes get released in patch releases, and only on the latest (2.17), so 2.15 is long gone |
Surely being able to DoS an entire cluster by indexing a single document is a high severity security issue. And 2.15 support was only just added to Amazon OpenSearch Service a week ago. Hardly long gone. |
…t#14069) Signed-off-by: kkewwei <kkewwei@163.com>
…t#14069) Signed-off-by: kkewwei <kkewwei@163.com>
…t#14069) Signed-off-by: kkewwei <kkewwei@163.com>
Signed-off-by: kkewwei kkewwei@163.com
Description
The pr soloves three cases:
Related Issues
Resolves #13880
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.