[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16436121#comment-16436121 ] Varun Thacker commented on SOLR-9518: - I'm trying to understand what happened here with the commit. We ran into this issue in Solr 6.6. Looks like the commit made it to Solr 6.3 , but is missing in Solr 6.4 , 6.5 , 6.6 . Solr 7.0 onwards has it > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Assignee: Noble Paul >Priority: Major > Fix For: 6.3, 7.0 > > Attachments: SOLR-9518-6x.patch, SOLR-9518.patch, SOLR-9518.patch, > SOLR-9518.patch > > > Starting up Solr 6.2.0 (with delegation tokens enabled) that doesn't have a > chrooted ZK, I see the following in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org
[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15608827#comment-15608827 ] Erick Erickson commented on SOLR-9518: -- [~noble.paul][~ichattopadhyaya] can we close this ticket? The code's been committed > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Assignee: Noble Paul > Attachments: SOLR-9518-6x.patch, SOLR-9518.patch, SOLR-9518.patch, > SOLR-9518.patch > > > Starting up Solr 6.2.0 (with delegation tokens enabled) that doesn't have a > chrooted ZK, I see the following in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v6.3.4#6332) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org
[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15601821#comment-15601821 ] ASF subversion and git services commented on SOLR-9518: --- Commit a973ca1752fccecee8db7d2a7a09ded7159e4c58 in lucene-solr's branch refs/heads/branch_6x from [~noble.paul] [ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=a973ca1 ] SOLR-9518: Kerberos Delegation Tokens don't work without a chrooted ZK > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Assignee: Noble Paul > Attachments: SOLR-9518-6x.patch, SOLR-9518.patch, SOLR-9518.patch, > SOLR-9518.patch > > > Starting up Solr 6.2.0 (with delegation tokens enabled) that doesn't have a > chrooted ZK, I see the following in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v6.3.4#6332) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org
[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15601245#comment-15601245 ] ASF subversion and git services commented on SOLR-9518: --- Commit 9b49c72dbc4d27a3160b34b5e38e095ca85daa6f in lucene-solr's branch refs/heads/master from [~noble.paul] [ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=9b49c72 ] SOLR-9518: Kerberos Delegation Tokens don't work without a chrooted ZK > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya >Assignee: Noble Paul > Attachments: SOLR-9518.patch, SOLR-9518.patch, SOLR-9518.patch > > > Starting up Solr 6.2.0 (with delegation tokens enabled) that doesn't have a > chrooted ZK, I see the following in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v6.3.4#6332) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org
[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15522053#comment-15522053 ] Ishan Chattopadhyaya commented on SOLR-9518: [~noble.paul], can you please review? > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya > Attachments: SOLR-9518.patch, SOLR-9518.patch > > > Starting up Solr 6.2.0 that doesn't have a chrooted ZK, I see the following > in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v6.3.4#6332) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org
[jira] [Commented] (SOLR-9518) Kerberos Delegation Tokens doesn't work without a chrooted ZK
[ https://issues.apache.org/jira/browse/SOLR-9518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15509506#comment-15509506 ] Ishan Chattopadhyaya commented on SOLR-9518: I tested this patch end to end for a ZK setup that doesn't use chroot and it works fine now. [~gchanan], can you please review? > Kerberos Delegation Tokens doesn't work without a chrooted ZK > - > > Key: SOLR-9518 > URL: https://issues.apache.org/jira/browse/SOLR-9518 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) >Reporter: Ishan Chattopadhyaya > Attachments: SOLR-9518.patch, SOLR-9518.patch > > > Starting up Solr 6.2.0 that doesn't have a chrooted ZK, I see the following > in the startup logs: > {code} > 2016-09-15 07:08:22.453 ERROR (main) [ ] o.a.s.s.SolrDispatchFilter Could > not start Solr. Check solr/home property and the logs > 2016-09-15 07:08:22.477 ERROR (main) [ ] o.a.s.c.SolrCore > null:java.lang.StringIndexOutOfBoundsException: String index out of range: -1 > at java.lang.String.substring(String.java:1927) > at > org.apache.solr.security.KerberosPlugin.init(KerberosPlugin.java:138) > at > org.apache.solr.core.CoreContainer.initializeAuthenticationPlugin(CoreContainer.java:316) > at org.apache.solr.core.CoreContainer.load(CoreContainer.java:442) > at > org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:158) > at > org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:134) > at > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:137) > at > org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:856) > at > org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:348) > at > org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1379) > at > org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1341) > at > org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:772) > at > org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261) > at > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:517) > at > org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68) > at > org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) > at > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188) > at > org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:499) > at > org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:147) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:180) > at > org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:458) > at > org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) > at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:610) > at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:529) > {code} > To me, it seems that adding a check for the presence of a chrooted ZK, and, > calculating the relative ZK path only if it exists should suffice. I'll add a > patch for this shortly. -- This message was sent by Atlassian JIRA (v6.3.4#6332) - To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org