Thomas Mortagne created SOLR-15393: -------------------------------------- Summary: Allow disabling programmatically CoreContainer#warnUsersOfInsecureSettings() Key: SOLR-15393 URL: https://issues.apache.org/jira/browse/SOLR-15393 Project: Solr Issue Type: Improvement Security Level: Public (Default Security Level. Issues are Public) Affects Versions: 8.4 Reporter: Thomas Mortagne
We are using Solr in an embedded mode and in our case configuring things like a Solr authenticator or setting a "solr.jetty.https.port" env var does not make much sense. The problem is that since 8.4 (and SOLR-13972) we are getting warnings which are not very easy to avoid in a clean way. While I understand the intent for the standalone Solr it would be nice if org.apache.solr.core.CoreContainer was exposing some API that could only be used when embedding Solr (so when Solr is not directly exposed) and which would allow disabling this check. -- This message was sent by Atlassian Jira (v8.3.4#803005) --------------------------------------------------------------------- To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org For additional commands, e-mail: issues-h...@solr.apache.org