From 31aabe4bf9ea73cbb1c21322d9e9aa2a578b41a0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Christoph=20B=C3=BCscher?= Date: Mon, 2 Jul 2018 15:14:44 +0200 Subject: [PATCH] Clean up double semicolon code typos (#31687) --- .../org/elasticsearch/index/rankeval/EvalQueryQuality.java | 2 +- .../http/netty4/Netty4HttpPipeliningHandler.java | 2 +- .../org/elasticsearch/http/netty4/cors/Netty4CorsHandler.java | 2 +- .../org/elasticsearch/ingest/useragent/UserAgentParser.java | 2 +- .../cluster/routing/allocation/DiskThresholdSettings.java | 2 +- .../org/elasticsearch/common/geo/builders/CircleBuilder.java | 2 +- .../bucket/histogram/DateHistogramAggregator.java | 2 +- .../cluster/settings/ClusterUpdateSettingsRequestTests.java | 2 +- .../concurrent/QueueResizingEsThreadPoolExecutorTests.java | 2 +- .../org/elasticsearch/gateway/PrimaryShardAllocatorTests.java | 4 ++-- .../search/aggregations/bucket/MinDocCountIT.java | 2 +- .../bucket/composite/CompositeAggregatorTests.java | 2 +- .../search/basic/SearchWhileCreatingIndexIT.java | 2 +- .../org/elasticsearch/search/fetch/subphase/InnerHitsIT.java | 2 +- .../search/profile/SearchProfileShardResultsTests.java | 2 +- .../test/AbstractStreamableXContentTestCase.java | 2 +- .../java/org/elasticsearch/test/XContentTestUtilsTests.java | 2 +- .../xpack/core/ml/action/GetJobsStatsAction.java | 2 +- .../xpack/monitoring/exporter/http/HttpExporter.java | 4 ++-- .../xpack/security/transport/nio/SecurityNioTransport.java | 2 +- .../security/authc/esnative/ESNativeMigrateToolTests.java | 2 +- .../org/elasticsearch/xpack/sql/util/LikeConversionTests.java | 4 ++-- 22 files changed, 25 insertions(+), 25 deletions(-) diff --git a/modules/rank-eval/src/main/java/org/elasticsearch/index/rankeval/EvalQueryQuality.java b/modules/rank-eval/src/main/java/org/elasticsearch/index/rankeval/EvalQueryQuality.java index c683c54bfdd07..2ad3e589bd8c0 100644 --- a/modules/rank-eval/src/main/java/org/elasticsearch/index/rankeval/EvalQueryQuality.java +++ b/modules/rank-eval/src/main/java/org/elasticsearch/index/rankeval/EvalQueryQuality.java @@ -33,7 +33,7 @@ import java.io.IOException; import java.util.ArrayList; import java.util.List; -import java.util.Objects;; +import java.util.Objects; /** * Result of the evaluation metric calculation on one particular query alone. diff --git a/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/Netty4HttpPipeliningHandler.java b/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/Netty4HttpPipeliningHandler.java index e6436ccea1a93..827963a2332c9 100644 --- a/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/Netty4HttpPipeliningHandler.java +++ b/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/Netty4HttpPipeliningHandler.java @@ -60,7 +60,7 @@ public void channelRead(final ChannelHandlerContext ctx, final Object msg) { @Override public void write(final ChannelHandlerContext ctx, final Object msg, final ChannelPromise promise) { - assert msg instanceof Netty4HttpResponse : "Invalid message type: " + msg.getClass();; + assert msg instanceof Netty4HttpResponse : "Invalid message type: " + msg.getClass(); Netty4HttpResponse response = (Netty4HttpResponse) msg; boolean success = false; try { diff --git a/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/cors/Netty4CorsHandler.java b/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/cors/Netty4CorsHandler.java index 38d832d608051..3dad3c8a4373d 100644 --- a/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/cors/Netty4CorsHandler.java +++ b/modules/transport-netty4/src/main/java/org/elasticsearch/http/netty4/cors/Netty4CorsHandler.java @@ -83,7 +83,7 @@ public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise) assert msg instanceof Netty4HttpResponse : "Invalid message type: " + msg.getClass(); Netty4HttpResponse response = (Netty4HttpResponse) msg; setCorsResponseHeaders(response.getRequest().nettyRequest(), response, config); - ctx.write(response, promise);; + ctx.write(response, promise); } public static void setCorsResponseHeaders(HttpRequest request, HttpResponse resp, Netty4CorsConfig config) { diff --git a/plugins/ingest-user-agent/src/main/java/org/elasticsearch/ingest/useragent/UserAgentParser.java b/plugins/ingest-user-agent/src/main/java/org/elasticsearch/ingest/useragent/UserAgentParser.java index 2be4f84317f9e..f8aec041d742a 100644 --- a/plugins/ingest-user-agent/src/main/java/org/elasticsearch/ingest/useragent/UserAgentParser.java +++ b/plugins/ingest-user-agent/src/main/java/org/elasticsearch/ingest/useragent/UserAgentParser.java @@ -161,7 +161,7 @@ String getName() { } public Details parse(String agentString) { - Details details = cache.get(name, agentString);; + Details details = cache.get(name, agentString); if (details == null) { VersionedName userAgent = findMatch(uaPatterns, agentString); diff --git a/server/src/main/java/org/elasticsearch/cluster/routing/allocation/DiskThresholdSettings.java b/server/src/main/java/org/elasticsearch/cluster/routing/allocation/DiskThresholdSettings.java index 58d93401508e4..fdba1c7009bc3 100644 --- a/server/src/main/java/org/elasticsearch/cluster/routing/allocation/DiskThresholdSettings.java +++ b/server/src/main/java/org/elasticsearch/cluster/routing/allocation/DiskThresholdSettings.java @@ -56,7 +56,7 @@ public class DiskThresholdSettings { Setting.Property.Dynamic, Setting.Property.NodeScope); public static final Setting CLUSTER_ROUTING_ALLOCATION_INCLUDE_RELOCATIONS_SETTING = Setting.boolSetting("cluster.routing.allocation.disk.include_relocations", true, - Setting.Property.Dynamic, Setting.Property.NodeScope);; + Setting.Property.Dynamic, Setting.Property.NodeScope); public static final Setting CLUSTER_ROUTING_ALLOCATION_REROUTE_INTERVAL_SETTING = Setting.positiveTimeSetting("cluster.routing.allocation.disk.reroute_interval", TimeValue.timeValueSeconds(60), Setting.Property.Dynamic, Setting.Property.NodeScope); diff --git a/server/src/main/java/org/elasticsearch/common/geo/builders/CircleBuilder.java b/server/src/main/java/org/elasticsearch/common/geo/builders/CircleBuilder.java index 9c58877653e16..c6a0743980fd3 100644 --- a/server/src/main/java/org/elasticsearch/common/geo/builders/CircleBuilder.java +++ b/server/src/main/java/org/elasticsearch/common/geo/builders/CircleBuilder.java @@ -56,7 +56,7 @@ public CircleBuilder() { */ public CircleBuilder(StreamInput in) throws IOException { center(readFromStream(in)); - radius(in.readDouble(), DistanceUnit.readFromStream(in));; + radius(in.readDouble(), DistanceUnit.readFromStream(in)); } @Override diff --git a/server/src/main/java/org/elasticsearch/search/aggregations/bucket/histogram/DateHistogramAggregator.java b/server/src/main/java/org/elasticsearch/search/aggregations/bucket/histogram/DateHistogramAggregator.java index 94dc18eae63e2..e0b64d2cd5b9e 100644 --- a/server/src/main/java/org/elasticsearch/search/aggregations/bucket/histogram/DateHistogramAggregator.java +++ b/server/src/main/java/org/elasticsearch/search/aggregations/bucket/histogram/DateHistogramAggregator.java @@ -75,7 +75,7 @@ class DateHistogramAggregator extends BucketsAggregator { this.rounding = rounding; this.shardRounding = shardRounding; this.offset = offset; - this.order = InternalOrder.validate(order, this);; + this.order = InternalOrder.validate(order, this); this.keyed = keyed; this.minDocCount = minDocCount; this.extendedBounds = extendedBounds; diff --git a/server/src/test/java/org/elasticsearch/action/admin/cluster/settings/ClusterUpdateSettingsRequestTests.java b/server/src/test/java/org/elasticsearch/action/admin/cluster/settings/ClusterUpdateSettingsRequestTests.java index 9701e76619824..06bd3dc26d8f6 100644 --- a/server/src/test/java/org/elasticsearch/action/admin/cluster/settings/ClusterUpdateSettingsRequestTests.java +++ b/server/src/test/java/org/elasticsearch/action/admin/cluster/settings/ClusterUpdateSettingsRequestTests.java @@ -31,7 +31,7 @@ import java.util.Collections; import static org.hamcrest.CoreMatchers.containsString; -import static org.hamcrest.CoreMatchers.equalTo;; +import static org.hamcrest.CoreMatchers.equalTo; public class ClusterUpdateSettingsRequestTests extends ESTestCase { diff --git a/server/src/test/java/org/elasticsearch/common/util/concurrent/QueueResizingEsThreadPoolExecutorTests.java b/server/src/test/java/org/elasticsearch/common/util/concurrent/QueueResizingEsThreadPoolExecutorTests.java index 8e69b8093597f..3f2c8fabec27b 100644 --- a/server/src/test/java/org/elasticsearch/common/util/concurrent/QueueResizingEsThreadPoolExecutorTests.java +++ b/server/src/test/java/org/elasticsearch/common/util/concurrent/QueueResizingEsThreadPoolExecutorTests.java @@ -131,7 +131,7 @@ public void testAutoQueueSizingWithMin() throws Exception { 5000); int threads = randomIntBetween(1, 5); - int measureWindow = randomIntBetween(10, 100);; + int measureWindow = randomIntBetween(10, 100); int min = randomIntBetween(4981, 4999); logger.info("--> auto-queue with a measurement window of {} tasks", measureWindow); QueueResizingEsThreadPoolExecutor executor = diff --git a/server/src/test/java/org/elasticsearch/gateway/PrimaryShardAllocatorTests.java b/server/src/test/java/org/elasticsearch/gateway/PrimaryShardAllocatorTests.java index e3687548190a3..ae643b7f094c2 100644 --- a/server/src/test/java/org/elasticsearch/gateway/PrimaryShardAllocatorTests.java +++ b/server/src/test/java/org/elasticsearch/gateway/PrimaryShardAllocatorTests.java @@ -169,7 +169,7 @@ public void testShardLockObtainFailedExceptionPreferOtherValidCopies() { String allocId1 = randomAlphaOfLength(10); String allocId2 = randomAlphaOfLength(10); final RoutingAllocation allocation = routingAllocationWithOnePrimaryNoReplicas(yesAllocationDeciders(), CLUSTER_RECOVERED, - allocId1, allocId2);; + allocId1, allocId2); testAllocator.addData(node1, allocId1, randomBoolean(), new ShardLockObtainFailedException(shardId, "test")); testAllocator.addData(node2, allocId2, randomBoolean(), null); @@ -310,7 +310,7 @@ public void testFoundAllocationButThrottlingDecider() { public void testFoundAllocationButNoDecider() { final RoutingAllocation allocation = routingAllocationWithOnePrimaryNoReplicas(noAllocationDeciders(), CLUSTER_RECOVERED, "allocId1"); - testAllocator.addData(node1, "allocId1", randomBoolean());; + testAllocator.addData(node1, "allocId1", randomBoolean()); testAllocator.allocateUnassigned(allocation); assertThat(allocation.routingNodesChanged(), equalTo(true)); assertThat(allocation.routingNodes().unassigned().ignored().isEmpty(), equalTo(true)); diff --git a/server/src/test/java/org/elasticsearch/search/aggregations/bucket/MinDocCountIT.java b/server/src/test/java/org/elasticsearch/search/aggregations/bucket/MinDocCountIT.java index 015664109cdfe..af1104879e92e 100644 --- a/server/src/test/java/org/elasticsearch/search/aggregations/bucket/MinDocCountIT.java +++ b/server/src/test/java/org/elasticsearch/search/aggregations/bucket/MinDocCountIT.java @@ -162,7 +162,7 @@ TermsAggregationBuilder apply(TermsAggregationBuilder builder, String field) { // check that terms2 is a subset of terms1 private void assertSubset(Terms terms1, Terms terms2, long minDocCount, int size, String include) { - final Matcher matcher = include == null ? null : Pattern.compile(include).matcher("");; + final Matcher matcher = include == null ? null : Pattern.compile(include).matcher(""); final Iterator it1 = terms1.getBuckets().iterator(); final Iterator it2 = terms2.getBuckets().iterator(); int size2 = 0; diff --git a/server/src/test/java/org/elasticsearch/search/aggregations/bucket/composite/CompositeAggregatorTests.java b/server/src/test/java/org/elasticsearch/search/aggregations/bucket/composite/CompositeAggregatorTests.java index 953175018df65..0ed1dacb73f5e 100644 --- a/server/src/test/java/org/elasticsearch/search/aggregations/bucket/composite/CompositeAggregatorTests.java +++ b/server/src/test/java/org/elasticsearch/search/aggregations/bucket/composite/CompositeAggregatorTests.java @@ -1457,7 +1457,7 @@ public void testWithKeywordAndTopHits() throws Exception { topHits = result.getBuckets().get(2).getAggregations().get("top_hits"); assertNotNull(topHits); assertEquals(topHits.getHits().getHits().length, 1); - assertEquals(topHits.getHits().getTotalHits(), 1L);; + assertEquals(topHits.getHits().getTotalHits(), 1L); } ); diff --git a/server/src/test/java/org/elasticsearch/search/basic/SearchWhileCreatingIndexIT.java b/server/src/test/java/org/elasticsearch/search/basic/SearchWhileCreatingIndexIT.java index 4748b6292c417..23d18562b28c1 100644 --- a/server/src/test/java/org/elasticsearch/search/basic/SearchWhileCreatingIndexIT.java +++ b/server/src/test/java/org/elasticsearch/search/basic/SearchWhileCreatingIndexIT.java @@ -73,7 +73,7 @@ private void searchWhileCreatingIndex(boolean createIndex, int numberOfReplicas) logger.info("using preference {}", preference); // we want to make sure that while recovery happens, and a replica gets recovered, its properly refreshed - ClusterHealthStatus status = client().admin().cluster().prepareHealth("test").get().getStatus();; + ClusterHealthStatus status = client().admin().cluster().prepareHealth("test").get().getStatus(); while (status != ClusterHealthStatus.GREEN) { // first, verify that search normal search works SearchResponse searchResponse = client().prepareSearch("test").setQuery(QueryBuilders.termQuery("field", "test")).execute().actionGet(); diff --git a/server/src/test/java/org/elasticsearch/search/fetch/subphase/InnerHitsIT.java b/server/src/test/java/org/elasticsearch/search/fetch/subphase/InnerHitsIT.java index 426db6f7425bb..802c343871e1f 100644 --- a/server/src/test/java/org/elasticsearch/search/fetch/subphase/InnerHitsIT.java +++ b/server/src/test/java/org/elasticsearch/search/fetch/subphase/InnerHitsIT.java @@ -474,7 +474,7 @@ public void testInnerHitsWithObjectFieldThatHasANestedField() throws Exception { .innerHit(new InnerHitBuilder().setFetchSourceContext(new FetchSourceContext(false)))).get(); assertNoFailures(response); assertHitCount(response, 1); - hit = response.getHits().getAt(0);; + hit = response.getHits().getAt(0); assertThat(hit.getId(), equalTo("1")); messages = hit.getInnerHits().get("comments.messages"); assertThat(messages.getTotalHits(), equalTo(1L)); diff --git a/server/src/test/java/org/elasticsearch/search/profile/SearchProfileShardResultsTests.java b/server/src/test/java/org/elasticsearch/search/profile/SearchProfileShardResultsTests.java index 7bc9b18860641..36841c08c9048 100644 --- a/server/src/test/java/org/elasticsearch/search/profile/SearchProfileShardResultsTests.java +++ b/server/src/test/java/org/elasticsearch/search/profile/SearchProfileShardResultsTests.java @@ -40,7 +40,7 @@ import static org.elasticsearch.common.xcontent.XContentParserUtils.ensureExpectedToken; import static org.elasticsearch.common.xcontent.XContentParserUtils.ensureFieldName; import static org.elasticsearch.test.XContentTestUtils.insertRandomFields; -import static org.elasticsearch.test.hamcrest.ElasticsearchAssertions.assertToXContentEquivalent;; +import static org.elasticsearch.test.hamcrest.ElasticsearchAssertions.assertToXContentEquivalent; public class SearchProfileShardResultsTests extends ESTestCase { diff --git a/test/framework/src/main/java/org/elasticsearch/test/AbstractStreamableXContentTestCase.java b/test/framework/src/main/java/org/elasticsearch/test/AbstractStreamableXContentTestCase.java index 4c9d2f7f95231..5bc9c66d4c9a7 100644 --- a/test/framework/src/main/java/org/elasticsearch/test/AbstractStreamableXContentTestCase.java +++ b/test/framework/src/main/java/org/elasticsearch/test/AbstractStreamableXContentTestCase.java @@ -42,7 +42,7 @@ public final void testFromXContent() throws IOException { /** * Parses to a new instance using the provided {@link XContentParser} */ - protected abstract T doParseInstance(XContentParser parser) throws IOException;; + protected abstract T doParseInstance(XContentParser parser) throws IOException; /** * Indicates whether the parser supports unknown fields or not. In case it does, such behaviour will be tested by diff --git a/test/framework/src/test/java/org/elasticsearch/test/XContentTestUtilsTests.java b/test/framework/src/test/java/org/elasticsearch/test/XContentTestUtilsTests.java index 62857fee9addb..c8fbd84f69aec 100644 --- a/test/framework/src/test/java/org/elasticsearch/test/XContentTestUtilsTests.java +++ b/test/framework/src/test/java/org/elasticsearch/test/XContentTestUtilsTests.java @@ -40,7 +40,7 @@ import static org.elasticsearch.test.XContentTestUtils.insertRandomFields; import static org.hamcrest.Matchers.equalTo; import static org.hamcrest.Matchers.hasItem; -import static org.hamcrest.Matchers.instanceOf;; +import static org.hamcrest.Matchers.instanceOf; public class XContentTestUtilsTests extends ESTestCase { diff --git a/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetJobsStatsAction.java b/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetJobsStatsAction.java index 1ec9f0c473232..ad34f5611383f 100644 --- a/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetJobsStatsAction.java +++ b/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetJobsStatsAction.java @@ -320,7 +320,7 @@ public void writeTo(StreamOutput out) throws IOException { @Override public XContentBuilder toXContent(XContentBuilder builder, Params params) throws IOException { - builder.startObject();; + builder.startObject(); jobsStats.doXContentBody(builder, params); builder.endObject(); return builder; diff --git a/x-pack/plugin/monitoring/src/main/java/org/elasticsearch/xpack/monitoring/exporter/http/HttpExporter.java b/x-pack/plugin/monitoring/src/main/java/org/elasticsearch/xpack/monitoring/exporter/http/HttpExporter.java index 38e8fbe1fccdc..ee583dd377085 100644 --- a/x-pack/plugin/monitoring/src/main/java/org/elasticsearch/xpack/monitoring/exporter/http/HttpExporter.java +++ b/x-pack/plugin/monitoring/src/main/java/org/elasticsearch/xpack/monitoring/exporter/http/HttpExporter.java @@ -350,7 +350,7 @@ static MultiHttpResource createResources(final Config config) { * @throws SettingsException if any setting is malformed or if no host is set */ private static HttpHost[] createHosts(final Config config) { - final List hosts = HOST_SETTING.getConcreteSettingForNamespace(config.name()).get(config.settings());; + final List hosts = HOST_SETTING.getConcreteSettingForNamespace(config.name()).get(config.settings()); String configKey = HOST_SETTING.getConcreteSettingForNamespace(config.name()).getKey(); if (hosts.isEmpty()) { @@ -446,7 +446,7 @@ private static void configureSecurity(final RestClientBuilder builder, final Con final Settings sslSettings = SSL_SETTING.getConcreteSettingForNamespace(config.name()).get(config.settings()); final SSLIOSessionStrategy sslStrategy = sslService.sslIOSessionStrategy(sslSettings); final CredentialsProvider credentialsProvider = createCredentialsProvider(config); - List hostList = HOST_SETTING.getConcreteSettingForNamespace(config.name()).get(config.settings());; + List hostList = HOST_SETTING.getConcreteSettingForNamespace(config.name()).get(config.settings()); // sending credentials in plaintext! if (credentialsProvider != null && hostList.stream().findFirst().orElse("").startsWith("https") == false) { logger.warn("exporter [{}] is not using https, but using user authentication with plaintext " + diff --git a/x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/transport/nio/SecurityNioTransport.java b/x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/transport/nio/SecurityNioTransport.java index fd1b1198607d1..874dc36a31cce 100644 --- a/x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/transport/nio/SecurityNioTransport.java +++ b/x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/transport/nio/SecurityNioTransport.java @@ -130,7 +130,7 @@ public NioTcpChannel createChannel(NioSelector selector, SocketChannel channel) @Override public NioTcpServerChannel createServerChannel(NioSelector selector, ServerSocketChannel channel) throws IOException { - NioTcpServerChannel nioChannel = new NioTcpServerChannel(profileName, channel);; + NioTcpServerChannel nioChannel = new NioTcpServerChannel(profileName, channel); Consumer exceptionHandler = (e) -> onServerException(nioChannel, e); Consumer acceptor = SecurityNioTransport.this::acceptChannel; ServerChannelContext context = new ServerChannelContext(nioChannel, this, selector, acceptor, exceptionHandler); diff --git a/x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/esnative/ESNativeMigrateToolTests.java b/x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/esnative/ESNativeMigrateToolTests.java index da48136e0a3d3..14b0a58419a22 100644 --- a/x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/esnative/ESNativeMigrateToolTests.java +++ b/x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/esnative/ESNativeMigrateToolTests.java @@ -142,7 +142,7 @@ public void testRetrieveRoles() throws Exception { OptionParser parser = muor.getParser(); OptionSet options = parser.parse("-u", username, "-p", password, "-U", url); Set roles = muor.getRolesThatExist(t, settings, new Environment(settings, conf), options); - logger.info("--> output: \n{}", t.getOutput());; + logger.info("--> output: \n{}", t.getOutput()); for (String r : addedRoles) { assertThat("expected list to contain: " + r, roles.contains(r), is(true)); } diff --git a/x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/util/LikeConversionTests.java b/x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/util/LikeConversionTests.java index d363eb5274b23..19a544c14e50b 100644 --- a/x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/util/LikeConversionTests.java +++ b/x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/util/LikeConversionTests.java @@ -8,7 +8,7 @@ import org.elasticsearch.test.ESTestCase; import static org.elasticsearch.xpack.sql.util.StringUtils.likeToJavaPattern; -import static org.elasticsearch.xpack.sql.util.StringUtils.likeToLuceneWildcard;; +import static org.elasticsearch.xpack.sql.util.StringUtils.likeToLuceneWildcard; public class LikeConversionTests extends ESTestCase { @@ -103,4 +103,4 @@ public void testWildcardTripleEscaping() { public void testWildcardIgnoreDoubleEscapedButSkipEscapingOfSql() { assertEquals("foo\\\\\\*bar\\\\?\\?", wildcard("foo\\*bar\\_?")); } -} \ No newline at end of file +}