summaryrefslogtreecommitdiff
path: root/modules/lang-mustache/src/main/java/org/elasticsearch/script/mustache/MultiSearchTemplateRequest.java
diff options
context:
space:
mode:
authorJason Tedor <jason@tedor.me>2016-11-14 15:09:45 -0500
committerGitHub <noreply@github.com>2016-11-14 15:09:45 -0500
commit48579cccaba925cb50e04b263e8ba1f731d8409f (patch)
treedd791cad857e6d03dd48b81a26dcf24f8b830ec6 /modules/lang-mustache/src/main/java/org/elasticsearch/script/mustache/MultiSearchTemplateRequest.java
parent87d76c3ff8ad3e40efbc9af8dcc88fa9b5feda31 (diff)
parent795c1218523a85333838b02e757aa1ad07f17613 (diff)
Add socket permissions for tribe nodes
Today when a node starts, we create dynamic socket permissions based on the configured HTTP ports and transport ports. If no ports are configured, we use the default port ranges. When a tribe node starts, a tribe node creates an internal node client for connecting to each remote cluster. If neither an explicit HTTP port nor transport ports were specified, the default port ranges are large enough for the tribe node and its internal node clients. If an explicit HTTP port or transport port was specified for the tribe node, then socket permissions for those ports will be created, but not for the internal node clients. Whether the internal node clients have explicit ports specified, or attempt to bind within the default range, socket permissions for these will not have been created and the internal node clients will hit a permissions issue when attempting to bind. This commit addresses this issue by also accounting for tribe nodes when creating the dynamic socket permissions. Additionally, we add our first real integration test for tribe nodes. Relates #21546
Diffstat (limited to 'modules/lang-mustache/src/main/java/org/elasticsearch/script/mustache/MultiSearchTemplateRequest.java')
0 files changed, 0 insertions, 0 deletions