Thomas Mortagne created SOLR-15393:
--------------------------------------
Summary: Allow disabling programmatically
CoreContainer#warnUsersOfInsecureSettings()
Key: SOLR-15393
URL: https://issues.apache.org/jira/browse/SOLR-15393
Project: Solr
Issue Type: Improvement
Security Level: Public (Default Security Level. Issues are Public)
Affects Versions: 8.4
Reporter: Thomas Mortagne
We are using Solr in an embedded mode and in our case configuring things like a
Solr authenticator or setting a "solr.jetty.https.port" env var does not make
much sense. The problem is that since 8.4 (and SOLR-13972) we are getting
warnings which are not very easy to avoid in a clean way.
While I understand the intent for the standalone Solr it would be nice if
org.apache.solr.core.CoreContainer was exposing some API that could only be
used when embedding Solr (so when Solr is not directly exposed) and which would
allow disabling this check.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]