This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
use Magento\Framework\App\Bootstrap; | |
require __DIR__ . '/app/bootstrap.php'; | |
/* | |
* There are a few instances where a file exists in the EAV tables, yet not in the media table, therefore, we should just keep these. | |
* These were generated by the following SQL (please update attribute IDs, if needed): | |
SELECT `value` AS 'image' | |
FROM catalog_product_entity_varchar |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
\Magento\Elasticsearch7\SearchAdapter\Adapter::query (This kicks off the entire request) | |
\Elasticsearch\Connections\Connection::performRequest line 210 (This is the formatted $body variable) | |
Take the serialized $body varable, then replace the -d argument with the contents: | |
curl -H 'Content-Type: application/json' -XPOST "http://elasticsearch:9200/magento2_product_1/_search?pretty" -d'{ | |
"from": 0, | |
"size": 48, | |
"stored_fields": "_none_", | |
"docvalue_fields": [ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* dangerous_functions.php | |
* Perry Holden <[email protected]> | |
* | |
* Usage: php dangerous_functions.php [type: folder|file] [folder_or_filename] | |
* Example: php dangerous_functions.php folder vendor/businessname/module-name | |
*/ | |
if (!isset($argv[1])) { |