[ 
https://issues.apache.org/jira/browse/SOLR-4394?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Hoss Man updated SOLR-4394:
---------------------------

    Attachment: SOLR-4394.patch

revised patch...

* fixes nocommit by randomizing when we use SSL (50%)
* only randomize SSL if none of the ssl related properties have already been 
explicitly set
* improve cleanup of properties that get set when randomizing ssl
* if the random logic decides to use ssl, then 50% of the time randomly require 
client auth

The client auth changes make this patch dependent on the changes in SOLR-4451 
(using SystemDefaultHttpClient so solrj's httpclient pays attention to the 
javax.\* props)

there is still a TODO about promoting the SSL randomization code up into 
SolrJettyTestBase, but i think it would be best to commit as is and let it soak 
for a few days and see if anyone notices problems running tests before 
randomizing SSL across all jetty related tests.
                
> Add SSL tests and example configs
> ---------------------------------
>
>                 Key: SOLR-4394
>                 URL: https://issues.apache.org/jira/browse/SOLR-4394
>             Project: Solr
>          Issue Type: Improvement
>            Reporter: Hoss Man
>            Assignee: Hoss Man
>             Fix For: 4.2
>
>         Attachments: SOLR-4394.patch, SOLR-4394.patch
>
>
> We should provide some examples of running Solr+Jetty with SSL enabled, and 
> have some basic tests using jetty over SSL

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to