You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@logging.apache.org by "Gary Gregory (JIRA)" <ji...@apache.org> on 2018/03/01 15:28:00 UTC

[jira] [Updated] (LOG4J2-2274) Allow EnvironmentPropertySource to run with a SecurityManager that rejects environment variable access

     [ https://issues.apache.org/jira/browse/LOG4J2-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Gary Gregory updated LOG4J2-2274:
---------------------------------
    Summary: Allow EnvironmentPropertySource to run with a SecurityManager that rejects environment variable access  (was: Allow log4j in restricted environment )

> Allow EnvironmentPropertySource to run with a SecurityManager that rejects environment variable access
> ------------------------------------------------------------------------------------------------------
>
>                 Key: LOG4J2-2274
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-2274
>             Project: Log4j 2
>          Issue Type: Improvement
>          Components: Core
>    Affects Versions: 2.10.0
>            Reporter: Sebastien Lannez
>            Assignee: Gary Gregory
>            Priority: Major
>             Fix For: 2.11.0
>
>         Attachments: EnvironmentPropertySource.java, TestSecManager.java
>
>
> Please find attached to this email a code change proposal for the EnvironmentPropertySource so it does not  fail when used in conjonction with highly restrictive security restriction managers.
>  
> I propose to surround with a try..catch the retrieval of environment variables so the library does not fail to initialize when it runs in the context of a security manager that always issues Exception when security rules are violated.
>  
> see attachment for proposal



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)