Tibor17 commented on a change in pull request #240: [SUREFIRE-1658] TCP/IP 
Channel for forked Surefire JVM. Extensions API and SPI. Polymorphism for 
remote and local process communication.
URL: https://github.com/apache/maven-surefire/pull/240#discussion_r382901754
 
 

 ##########
 File path: 
surefire-booter/src/main/java/org/apache/maven/surefire/booter/BooterDeserializer.java
 ##########
 @@ -58,6 +60,18 @@ public BooterDeserializer( InputStream inputStream )
         properties = SystemPropertyManager.loadProperties( inputStream );
     }
 
+    /**
+     * Describes the current connection channel used by the client in the 
forked JVM
+     * in order to connect to the plugin process.
+     *
+     * @return connection string (must not be null)
+     */
+    @Nonnull
+    public String getConnectionString()
+    {
+        return properties.getProperty( FORK_NODE_CONNECTION_STRING );
 
 Review comment:
   @eolivelli 
   A new security gap might be in Docker when you `EXPOSE 65000` (expose the 
port 65000) and the surefire server will find this port unused. This might be a 
problem right? How can we avoid that?

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

Reply via email to