This is an automated email from the ASF dual-hosted git repository.
houston pushed a commit to branch branch_9x
in repository https://gitbox.apache.org/repos/asf/solr.git
The following commit(s) were added to refs/heads/branch_9x by this push:
new afc3c45099e SOLR-16668: Default to Java SSL for Http2SolrClient (#1366)
afc3c45099e is described below
commit afc3c45099eaa5f5007fbff79f1fbb8ab114d3c1
Author: Houston Putman <[email protected]>
AuthorDate: Tue Feb 21 19:43:28 2023 -0800
SOLR-16668: Default to Java SSL for Http2SolrClient (#1366)
(cherry picked from commit eb34d9ffbebe71ac8a041432ea7096529d6cfdd6)
---
solr/CHANGES.txt | 2 ++
.../solr/client/solrj/impl/Http2SolrClient.java | 29 ++++++++--------------
2 files changed, 13 insertions(+), 18 deletions(-)
diff --git a/solr/CHANGES.txt b/solr/CHANGES.txt
index 46017afe0d9..0c3a431732e 100644
--- a/solr/CHANGES.txt
+++ b/solr/CHANGES.txt
@@ -191,6 +191,8 @@ Bug Fixes
* SOLR-16670: Fix directory/file check in S3Repository (Houston Putman, Hakan
Özler)
+* SOLR-16668: Use default to Java SSL for Http2SolrClient when none is
provided (Houston Putman)
+
Build
---------------------
* Upgrade forbiddenapis to 3.4 (Uwe Schindler)
diff --git
a/solr/solrj/src/java/org/apache/solr/client/solrj/impl/Http2SolrClient.java
b/solr/solrj/src/java/org/apache/solr/client/solrj/impl/Http2SolrClient.java
index 74fb58bdb23..7ddd5413610 100644
--- a/solr/solrj/src/java/org/apache/solr/client/solrj/impl/Http2SolrClient.java
+++ b/solr/solrj/src/java/org/apache/solr/client/solrj/impl/Http2SolrClient.java
@@ -222,39 +222,32 @@ public class Http2SolrClient extends SolrClient {
}
SslContextFactory.Client sslContextFactory;
- boolean sslEnabled;
if (builder.sslConfig == null) {
- sslEnabled =
- System.getProperty("javax.net.ssl.keyStore") != null
- || System.getProperty("javax.net.ssl.trustStore") != null;
- sslContextFactory = sslEnabled ? getDefaultSslContextFactory() : null;
+ sslContextFactory = getDefaultSslContextFactory();
} else {
sslContextFactory = builder.sslConfig.createClientContextFactory();
- sslEnabled = true;
}
+ ClientConnector clientConnector = new ClientConnector();
+ clientConnector.setReuseAddress(true);
+ clientConnector.setSslContextFactory(sslContextFactory);
+ clientConnector.setSelectors(2);
+
HttpClientTransport transport;
if (builder.useHttp1_1) {
if (log.isDebugEnabled()) {
log.debug("Create Http2SolrClient with HTTP/1.1 transport");
}
- ClientConnector clientConnector = new ClientConnector();
- clientConnector.setReuseAddress(true);
- clientConnector.setSslContextFactory(sslContextFactory);
- clientConnector.setSelectors(2);
transport = new HttpClientTransportOverHTTP(clientConnector);
-
httpClient = new HttpClient(transport);
-
- if (builder.maxConnectionsPerHost != null)
+ if (builder.maxConnectionsPerHost != null) {
httpClient.setMaxConnectionsPerDestination(builder.maxConnectionsPerHost);
+ }
} else {
- log.debug("Create Http2SolrClient with HTTP/2 transport");
- ClientConnector clientConnector = new ClientConnector();
- clientConnector.setReuseAddress(true);
- clientConnector.setSslContextFactory(sslContextFactory);
- clientConnector.setSelectors(2);
+ if (log.isDebugEnabled()) {
+ log.debug("Create Http2SolrClient with HTTP/2 transport");
+ }
HTTP2Client http2client = new HTTP2Client(clientConnector);
transport = new HttpClientTransportOverHTTP2(http2client);