[ 
https://issues.apache.org/jira/browse/SOLR-15393?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mayya Sharipova updated SOLR-15393:
-----------------------------------
    Security:     (was: Public)

> Allow disabling programmatically CoreContainer#warnUsersOfInsecureSettings()
> ----------------------------------------------------------------------------
>
>                 Key: SOLR-15393
>                 URL: https://issues.apache.org/jira/browse/SOLR-15393
>             Project: Solr
>          Issue Type: Improvement
>    Affects Versions: 8.4
>            Reporter: Thomas Mortagne
>            Priority: Major
>
> We are using Solr in an embedded mode and in our case configuring things like 
> a Solr authenticator or setting a "solr.jetty.https.port" env var does not 
> make much sense. The problem is that since 8.4 (and SOLR-13972) we are 
> getting warnings which are not very easy to avoid in a clean way.
> While I understand the intent for the standalone Solr it would be nice if 
> org.apache.solr.core.CoreContainer was exposing some API that could only be 
> used when embedding Solr (so when Solr is not directly exposed) and which 
> would allow disabling this check.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to