magibney commented on a change in pull request #304:
URL: https://github.com/apache/solr/pull/304#discussion_r717003635



##########
File path: gradle/testing/randomization/policies/solr-tests.policy
##########
@@ -226,4 +226,8 @@ grant {
   permission java.io.FilePermission "${gradle.worker.jar}", "read";
   // Allow reading from classpath JARs (resources).
   permission java.io.FilePermission "${gradle.user.home}${/}-", "read";
+  // Allow reading from local Lucene development repository, if used.
+  permission java.io.FilePermission "${lucene-dev-repo.dir}${/}-", "read";
+  // Allow reading jars from mavenLocal repository
+  permission java.io.FilePermission 
"${user.home}${/}.m2${/}repository${/}org${/}apache${/}lucene${/}-", "read";

Review comment:
       I'm all for simplicity, and certainly defer to you wrt security policy 
stuff. I guess I was reading the purpose of the security policy file as: to 
keep things as locked-down as possible to avoid any local filesystem 
dependencies that aren't explicitly declared. Either way, as I mentioned I 
agree this is unlikely to present a practical problem. Maybe a note about 
why/when this access is needed then? (another benefit of setting a property 
specific to the permission is to give a clue that can be used to trace the 
purpose of the permission without resorting to `git blame`, etc. ...)




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to