[
https://issues.apache.org/jira/browse/SOLR-15393?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Mayya Sharipova updated SOLR-15393:
-----------------------------------
Security: (was: Public)
> Allow disabling programmatically CoreContainer#warnUsersOfInsecureSettings()
> ----------------------------------------------------------------------------
>
> Key: SOLR-15393
> URL: https://issues.apache.org/jira/browse/SOLR-15393
> Project: Solr
> Issue Type: Improvement
> Affects Versions: 8.4
> Reporter: Thomas Mortagne
> Priority: Major
>
> We are using Solr in an embedded mode and in our case configuring things like
> a Solr authenticator or setting a "solr.jetty.https.port" env var does not
> make much sense. The problem is that since 8.4 (and SOLR-13972) we are
> getting warnings which are not very easy to avoid in a clean way.
> While I understand the intent for the standalone Solr it would be nice if
> org.apache.solr.core.CoreContainer was exposing some API that could only be
> used when embedding Solr (so when Solr is not directly exposed) and which
> would allow disabling this check.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]