[ https://issues.apache.org/jira/browse/ZOOKEEPER-2451?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Chris Nauroth resolved ZOOKEEPER-2451. -------------------------------------- Resolution: Duplicate Hello [~sershe]. I believe your concerns are addressed in ZOOKEEPER-2139, which has a patch committed for the 3.5.2-alpha release candidate that I'm about to create shortly. That patch allows for more fine-grained configuration of the client without needing to rely on global JVM properties. I'll resolve this as a duplicate. (If I misunderstood, please feel free to reopen.) > do not make use of system properties for security configuration > --------------------------------------------------------------- > > Key: ZOOKEEPER-2451 > URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2451 > Project: ZooKeeper > Issue Type: Bug > Reporter: Sergey Shelukhin > > Is there (or could there be) a way to set up security for ZK client that > doesn't involve calls like {noformat} > System.setProperty(ZooKeeperSaslClient.LOGIN_CONTEXT_NAME_KEY, > SASL_LOGIN_CONTEXT_NAME); > {noformat}? > I was looking at an unrelated security configuration issue and stumbled upon > this pattern; we use (at least) 2 ZK connections from the same process, that > (for now) use the same config but different context names, one of which is in > a library out of our control. Unless I'm missing something with this pattern > it seems extremely brittle. Or unless there's an alternative approach > already; if there is, hadoop-common and hive don't use it atm, old approach > seems prevalent. > There should be an approach that is at least slightly more solid, like say > public globals... maybe even threadlocals! -- This message was sent by Atlassian JIRA (v6.3.4#6332)