You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@logging.apache.org by "Sebastien Lannez (JIRA)" <ji...@apache.org> on 2018/03/01 10:33:00 UTC
[jira] [Commented] (LOG4J2-2274) Running log4j in restricted
environment
[ https://issues.apache.org/jira/browse/LOG4J2-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16381810#comment-16381810 ]
Sebastien Lannez commented on LOG4J2-2274:
------------------------------------------
Unit test added. Verified it fails with 2.10.0 and passes with the modified EnvironmentPropertySource.
> Running log4j in restricted environment
> ----------------------------------------
>
> Key: LOG4J2-2274
> URL: https://issues.apache.org/jira/browse/LOG4J2-2274
> Project: Log4j 2
> Issue Type: Improvement
> Components: Core
> Affects Versions: 2.10.0
> Reporter: Sebastien Lannez
> Priority: Major
> Fix For: 2.11.0
>
> Attachments: EnvironmentPropertySource.java, TestSecManager.java
>
>
> Please find attached to this email a code change proposal for the EnvironmentPropertySource so it does not fail when used in conjonction with highly restrictive security restriction managers.
>
> I propose to surround with a try..catch the retrieval of environment variables so the library does not fail to initialize when it runs in the context of a security manager that always issues Exception when security rules are violated.
>
> see attachment for proposal
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)