[ 
https://issues.apache.org/jira/browse/SOLR-5617?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13864741#comment-13864741
 ] 

Shawn Heisey commented on SOLR-5617:
------------------------------------

I have figured out a workaround.  I've got a config structure that heavily uses 
xinclude and symlinks.  By changing things around so that only the symlinks 
traverse upwards and xinclude only refers to "local" files, I no longer need to 
enable unsafe loading.

I still think that it would be useful to fix this issue, but the urgency is 
gone.

> Default classloader restrictions may be too tight
> -------------------------------------------------
>
>                 Key: SOLR-5617
>                 URL: https://issues.apache.org/jira/browse/SOLR-5617
>             Project: Solr
>          Issue Type: Bug
>    Affects Versions: 4.6
>            Reporter: Shawn Heisey
>              Labels: security
>             Fix For: 5.0, 4.7
>
>
> SOLR-4882 introduced restrictions for the Solr class loader that cause 
> resources outside the instanceDir to fail to load.  This is a very good goal, 
> but what if you have common resources like included config files that are 
> outside instanceDir but are still fully inside the solr home?
> I can understand not wanting to load resources from an arbitrary path, but 
> the solr home and its children should be about as trustworthy as instanceDir.
> Ideally I'd like to have anything that's in $\{solr.solr.home\} trusted 
> automatically.  If I need to define a system property to make this happen, 
> I'm OK with that -- as long as I don't have to turn off the safety checking 
> entirely.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org

Reply via email to