[ 
https://issues.apache.org/jira/browse/ZOOKEEPER-2451?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chris Nauroth resolved ZOOKEEPER-2451.
--------------------------------------
    Resolution: Duplicate

Hello [~sershe].

I believe your concerns are addressed in ZOOKEEPER-2139, which has a patch 
committed for the 3.5.2-alpha release candidate that I'm about to create 
shortly.  That patch allows for more fine-grained configuration of the client 
without needing to rely on global JVM properties.

I'll resolve this as a duplicate.  (If I misunderstood, please feel free to 
reopen.)

> do not make use of system properties for security configuration
> ---------------------------------------------------------------
>
>                 Key: ZOOKEEPER-2451
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2451
>             Project: ZooKeeper
>          Issue Type: Bug
>            Reporter: Sergey Shelukhin
>
> Is there (or could there be) a way to set up security for ZK client that 
> doesn't involve calls like {noformat}
> System.setProperty(ZooKeeperSaslClient.LOGIN_CONTEXT_NAME_KEY, 
> SASL_LOGIN_CONTEXT_NAME);
> {noformat}?
> I was looking at an unrelated security configuration issue and stumbled upon 
> this pattern; we use (at least) 2 ZK connections from the same process, that 
> (for now) use the same config but different context names, one of which is in 
> a library out of our control. Unless I'm missing something with this pattern 
> it seems extremely brittle. Or unless there's an alternative approach 
> already; if there is, hadoop-common and hive don't use it atm, old approach 
> seems prevalent.
> There should be an approach that is at least slightly more solid, like say 
> public globals... maybe even threadlocals!



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to