You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@logging.apache.org by "Gary Gregory (JIRA)" <ji...@apache.org> on 2018/03/01 15:28:00 UTC
[jira] [Updated] (LOG4J2-2274) Allow EnvironmentPropertySource to
run with a SecurityManager that rejects environment variable access
[ https://issues.apache.org/jira/browse/LOG4J2-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Gary Gregory updated LOG4J2-2274:
---------------------------------
Summary: Allow EnvironmentPropertySource to run with a SecurityManager that rejects environment variable access (was: Allow log4j in restricted environment )
> Allow EnvironmentPropertySource to run with a SecurityManager that rejects environment variable access
> ------------------------------------------------------------------------------------------------------
>
> Key: LOG4J2-2274
> URL: https://issues.apache.org/jira/browse/LOG4J2-2274
> Project: Log4j 2
> Issue Type: Improvement
> Components: Core
> Affects Versions: 2.10.0
> Reporter: Sebastien Lannez
> Assignee: Gary Gregory
> Priority: Major
> Fix For: 2.11.0
>
> Attachments: EnvironmentPropertySource.java, TestSecManager.java
>
>
> Please find attached to this email a code change proposal for the EnvironmentPropertySource so it does not fail when used in conjonction with highly restrictive security restriction managers.
>
> I propose to surround with a try..catch the retrieval of environment variables so the library does not fail to initialize when it runs in the context of a security manager that always issues Exception when security rules are violated.
>
> see attachment for proposal
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)