When you send a read request for the test2Collection collection, the logs
do not display as a collection, and I get 10 entries with admin_x rights
attached log with description
ср, 29 мар. 2023 г., 16:39 Jan Høydahl <[email protected]>:
> Permissions are evaluated in order from top to bottom.
> The first "read" permission found requires roles "admin_ro", "admin_rwx",
> "solr-internal-traffic", so that should be selected.
>
> Do you have any logs that can shed light over what happens?
>
> Jan
>
> > 29. mar. 2023 kl. 14:27 skrev MEXANIK <[email protected]>:
> >
> > I logged in using the john_sl user in Solr UI, and sent a request to read
> > the collection, but I can read some of the collections, but I don't want
> > them to be read.
> >
> > If I replace the admin user's rights from admin_rwx to admin_x, then the
> > john_sl user can't read either
> >
> > How do I make it so that john_sl cannot read collections with admin_x
> > rights, but at the same time so that the admin user has admin_rwx
> rights??
> >
> > Help!!
> >
> > Example security.json http://replit.com/@irkuev666/Test#data.json
>
>
----- WARNING!---
-------------CASE SEND REQUEST READ test2Collection----WITH USERS
john_sl-----------------
----------------NOT CORRECT RESPONSE--I CAN READ DATA THE COLLECTION WITH
admin_x rights------------------------------
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-177) [ ] o.e.j.i.ManagedSelector
updates 0
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-177) [ ] o.e.j.i.ManagedSelector
Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting with 2 keys
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to
[/____v2/schema-designer/configs] of type: [ADMIN], associated with collections
[[]]
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking
admin permissions
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{
"name":"config-edit",
"role":[
"admin_rwx",
"admin_x",
"solr-internal-traffic"]}] to govern resource
[/____v2/schema-designer/configs]
2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{
"name":"config-edit",
"role":[
"admin_rwx",
"admin_x",
"solr-internal-traffic"]}] allows access to role [admin_x]; permitting
access
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to
[/admin/collections] of type: [ADMIN], associated with collections [[]]
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-150) [ ]
o.e.j.i.ManagedSelector Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting
with 2 keys
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking
admin permissions
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{
"collection":null,
"path":"/admin/collections",
"params":{"action":[
"LIST",
"LISTALIASES",
"CLUSTERSTATUS"]},
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] to govern resource [/admin/collections]
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{
"collection":null,
"path":"/admin/collections",
"params":{"action":[
"LIST",
"LISTALIASES",
"CLUSTERSTATUS"]},
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] allows access to role [admin_x]; permitting
access
2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ]
o.a.s.h.a.CollectionsHandler Invoked Collection Action :listaliases with params
action=LISTALIASES&wt=json&_=1680176979652 and sendToOCPQueue=true
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to
[/admin/info/system] of type: [ADMIN], associated with collections [[]]
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking
admin permissions
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-59) [ ]
o.e.j.h.HTTP2Connection Processing
HeadersFrame@50cec7e7#97{end=true}+PriorityFrame@4f576204#97/#5{weight=22,exclusive=false}
on
HTTP2Stream@25c48b4f#97@9d00611{sendWindow=131072,recvWindow=524288,reset=false/false,REMOTELY_CLOSED,age=0,attachment=null}
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-59) [ ]
o.e.j.h.s.HttpTransportOverHTTP2
org.eclipse.jetty.http2.server.HttpTransportOverHTTP2@5463412d setStream 97
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{
"name":"all",
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] to govern resource [/admin/info/system]
2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{
"name":"all",
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] allows access to role [admin_x]; permitting
access
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.SolrDispatchFilter Request to authenticate:
org.apache.solr.servlet.SolrDispatchFilter$1@2e4d085f, domain: 10.56.103.108,
port: 13700
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.SolrDispatchFilter User principal:
us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@2e5ea716
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to
[/admin/cores] of type: [ADMIN], associated with collections [[]]
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking
admin permissions
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{
"name":"core-admin-read",
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] to govern resource [/admin/cores]
2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ]
o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{
"name":"core-admin-read",
"role":[
"admin_ro",
"admin_x",
"admin_rwx",
"solr-internal-traffic"]}] allows access to role [admin_x];
permitting access
----- WARNING!---
-----------------------CASE SEND REQUEST READ test1Collection--------------WITH
USER john_sl---------------
---------CORRECT RESPONSE 403 with role admin_x-------------------
2023-03-30 16:20:23.400 DEBUG (qtp1299327689-156) [ ] o.e.j.i.ManagedSelector
Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting with 2 keys
2023-03-30 16:20:23.400 DEBUG (qtp1299327689-146) [ ]
o.a.s.s.SolrDispatchFilter User principal:
us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@778d0b82
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to
[/select] of type: [READ], associated with collections
[[CollectionRequest(test1Collection.0)]]
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing collection-aware request,
checking perms applicable to specific collection [test1Collection.0]
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing collection-aware request,
checking perms applicable to all (*) collections
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase No perms configured for the resource
/select . So allowed to access
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{
"name":"collection-query",
"role":[
"admin_ro",
"admin_rwx"]}] to govern resource [/select]
2023-03-30 16:20:23.401 INFO (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33]
o.a.s.s.RuleBasedAuthorizationPluginBase This resource is configured to have a
permission {
"name":"collection-query",
"role":[
"admin_ro",
"admin_rwx"]}, The principal
us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@3b33128b
does not have the right role
2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8
r:core_node35 x:test1Collection.0_shard8_replica_n33] o.e.j.s.HttpChannelState
sendError HttpChannelState@6bce1579{s=HANDLING rs=BLOCKING os=OPEN is=IDLE
awp=false se=false i=true al=0}