Thomas Mortagne created SOLR-15393:
--------------------------------------

             Summary: Allow disabling programmatically 
CoreContainer#warnUsersOfInsecureSettings()
                 Key: SOLR-15393
                 URL: https://issues.apache.org/jira/browse/SOLR-15393
             Project: Solr
          Issue Type: Improvement
      Security Level: Public (Default Security Level. Issues are Public)
    Affects Versions: 8.4
            Reporter: Thomas Mortagne


We are using Solr in an embedded mode and in our case configuring things like a 
Solr authenticator or setting a "solr.jetty.https.port" env var does not make 
much sense. The problem is that since 8.4 (and SOLR-13972) we are getting 
warnings which are not very easy to avoid in a clean way.

While I understand the intent for the standalone Solr it would be nice if 
org.apache.solr.core.CoreContainer was exposing some API that could only be 
used when embedding Solr (so when Solr is not directly exposed) and which would 
allow disabling this check.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to