Skip to content

Conversation

@jasontedor
Copy link
Member

This commit avoids an NPE when checking for privileges to follow indices. The problem here is that in some cases we might not be able to read the authentication info from the thread context. In that case, a null user would be returned and we were not guarding against this.

Closes #44172

This commit avoids an NPE when checking for privileges to follow
indices. The problem here is that in some cases we might not be able to
read the authentication info from the thread context. In that case, a
null user would be returned and we were not guarding against this.
@jasontedor jasontedor added >bug :Distributed Indexing/CCR Issues around the Cross Cluster State Replication features v8.0.0 v7.3.0 v6.8.2 v7.4.0 v7.2.2 labels Jul 16, 2019
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-distributed

Copy link
Member

@dnhatn dnhatn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jasontedor jasontedor merged commit f0aa681 into elastic:master Jul 16, 2019
jasontedor added a commit that referenced this pull request Jul 16, 2019
This commit avoids an NPE when checking for privileges to follow
indices. The problem here is that in some cases we might not be able to
read the authentication info from the thread context. In that case, a
null user would be returned and we were not guarding against this.
jasontedor added a commit that referenced this pull request Jul 16, 2019
This commit avoids an NPE when checking for privileges to follow
indices. The problem here is that in some cases we might not be able to
read the authentication info from the thread context. In that case, a
null user would be returned and we were not guarding against this.
jasontedor added a commit that referenced this pull request Jul 16, 2019
This commit avoids an NPE when checking for privileges to follow
indices. The problem here is that in some cases we might not be able to
read the authentication info from the thread context. In that case, a
null user would be returned and we were not guarding against this.
jasontedor added a commit that referenced this pull request Jul 16, 2019
This commit avoids an NPE when checking for privileges to follow
indices. The problem here is that in some cases we might not be able to
read the authentication info from the thread context. In that case, a
null user would be returned and we were not guarding against this.
@jasontedor jasontedor deleted the ccr-license-checker-missing-authentication-info branch July 16, 2019 21:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Pushing auto-follow-pattern results in a Null pointer exception on elasticsearch side

4 participants