Skip to content

Commit a93c091

Browse files
SOLR-17584: Remove code and docs for "trusted" configsets (#3272)
All Configsets are now inherently "trusted". Co-authored-by: aumarjikar <[email protected]>
1 parent e3e99d8 commit a93c091

33 files changed

+51
-614
lines changed

solr/CHANGES.txt

+4
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,10 @@ Other Changes
164164
* SOLR-17706: SolrJ DocumentObjectBinder is now a global singleton via an INSTANCE field and that
165165
which is pluggable via Java SPI/ServiceLoader. SolrClient.getBinder is gone. (David Smiley)
166166

167+
* SOLR-17584: There is no longer a distinction between trusted and untrusted configSets; all are now trusted.
168+
To ensure security, Solr should enforce authentication and authorization,
169+
allowing only authorized admins to publish them. (Abhishek Umarjikar)
170+
167171
================== 9.9.0 ==================
168172
New Features
169173
---------------------

solr/core/src/java/org/apache/solr/cli/CreateTool.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ protected void createCollection(CloudSolrClient cloudSolrClient, CommandLine cli
283283
+ " to ZooKeeper at "
284284
+ cloudSolrClient.getClusterStateProvider().getQuorumHosts());
285285
// We will trust the config since we have the Zookeeper Address
286-
configSetService.uploadConfig(confName, confPath, true);
286+
configSetService.uploadConfig(confName, confPath);
287287
}
288288

289289
// since creating a collection is a heavy-weight operation, check for existence first

solr/core/src/java/org/apache/solr/cloud/ZkConfigSetService.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ public void copyConfig(String fromConfig, String toConfig) throws IOException {
167167
}
168168

169169
@Override
170-
protected void uploadConfig(String configName, Path dir) throws IOException {
170+
public void uploadConfig(String configName, Path dir) throws IOException {
171171
zkClient.uploadToZK(
172172
dir, CONFIGS_ZKNODE + "/" + configName, ConfigSetService.UPLOAD_FILENAME_EXCLUDE_PATTERN);
173173
}

solr/core/src/java/org/apache/solr/cloud/api/collections/RestoreCmd.java

+3-8
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,6 @@ private static class RestoreContext implements Closeable {
150150
final URI location;
151151
final URI backupPath;
152152
final List<String> nodeList;
153-
final boolean requestIsTrusted;
154153

155154
final CoreContainer container;
156155
final BackupRepository repository;
@@ -166,7 +165,6 @@ private RestoreContext(ZkNodeProps message, CollectionCommandContext ccc) throws
166165
this.asyncId = message.getStr(ASYNC);
167166
this.repo = message.getStr(CoreAdminParams.BACKUP_REPOSITORY);
168167
this.backupId = message.getInt(CoreAdminParams.BACKUP_ID, -1);
169-
this.requestIsTrusted = message.getBool(CoreAdminParams.TRUSTED, false);
170168

171169
this.container = ccc.getCoreContainer();
172170
this.repository = this.container.newBackupRepository(repo);
@@ -230,8 +228,7 @@ public void process(NamedList<Object> results, RestoreContext rc) throws Excepti
230228
rc.backupProperties.getConfigName(),
231229
rc.restoreConfigName,
232230
rc.backupManager,
233-
rc.container.getConfigSetService(),
234-
rc.requestIsTrusted);
231+
rc.container.getConfigSetService());
235232

236233
log.info(
237234
"Starting restore into collection={} with backup_name={} at location={}",
@@ -296,8 +293,7 @@ private void uploadConfig(
296293
String configName,
297294
String restoreConfigName,
298295
BackupManager backupMgr,
299-
ConfigSetService configSetService,
300-
boolean requestIsTrusted)
296+
ConfigSetService configSetService)
301297
throws IOException {
302298
if (configSetService.checkConfigExists(restoreConfigName)) {
303299
log.info(
@@ -309,8 +305,7 @@ private void uploadConfig(
309305
"Config with name {} does not already exist in ZooKeeper. Will restore from Backup.",
310306
restoreConfigName);
311307

312-
backupMgr.uploadConfigDir(
313-
configName, restoreConfigName, configSetService, requestIsTrusted);
308+
backupMgr.uploadConfigDir(configName, restoreConfigName, configSetService);
314309
}
315310
}
316311

solr/core/src/java/org/apache/solr/core/ConfigSet.java

+1-9
Original file line numberDiff line numberDiff line change
@@ -35,20 +35,16 @@ public class ConfigSet {
3535

3636
private final NamedList<?> properties;
3737

38-
private final boolean trusted;
39-
4038
public ConfigSet(
4139
String name,
4240
SolrConfig solrConfig,
4341
SchemaSupplier indexSchemaSupplier,
44-
NamedList<?> properties,
45-
boolean trusted) {
42+
NamedList<?> properties) {
4643
this.name = name;
4744
this.solrConfig = solrConfig;
4845
this.schemaSupplier = indexSchemaSupplier;
4946
schema = schemaSupplier.get(true);
5047
this.properties = properties;
51-
this.trusted = trusted;
5248
}
5349

5450
public String getName() {
@@ -75,10 +71,6 @@ public NamedList<?> getProperties() {
7571
return properties;
7672
}
7773

78-
public boolean isTrusted() {
79-
return trusted;
80-
}
81-
8274
/**
8375
* Provide a Schema object on demand We want IndexSchema Objects to be lazily instantiated because
8476
* when a configset is created the {@link SolrResourceLoader} associated with it is not associated

solr/core/src/java/org/apache/solr/core/ConfigSetService.java

+5-74
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@
2323
import java.lang.reflect.Constructor;
2424
import java.nio.file.Files;
2525
import java.nio.file.Path;
26-
import java.util.HashMap;
2726
import java.util.List;
2827
import java.util.Locale;
2928
import java.util.Map;
@@ -117,7 +116,7 @@ private void bootstrapDefaultConf() throws IOException {
117116
"intended to be the default. Current 'solr.default.confdir' value:",
118117
System.getProperty(SolrDispatchFilter.SOLR_DEFAULT_CONFDIR_ATTRIBUTE));
119118
} else {
120-
this.uploadConfig(ConfigSetsHandler.DEFAULT_CONFIGSET_NAME, configDirPath, true);
119+
this.uploadConfig(ConfigSetsHandler.DEFAULT_CONFIGSET_NAME, configDirPath);
121120
}
122121
}
123122
}
@@ -132,7 +131,7 @@ private void bootstrapConfDir(String confDir) throws IOException {
132131
String confName =
133132
System.getProperty(
134133
ZkController.COLLECTION_PARAM_PREFIX + ZkController.CONFIGNAME_PROP, "configuration1");
135-
this.uploadConfig(confName, configPath, true);
134+
this.uploadConfig(confName, configPath);
136135
}
137136

138137
/**
@@ -216,47 +215,10 @@ public static void bootstrapConf(CoreContainer cc) throws IOException {
216215
if (StrUtils.isNullOrEmpty(confName)) confName = coreName;
217216
Path udir = cd.getInstanceDir().resolve("conf");
218217
log.info("Uploading directory {} with name {} for solrCore {}", udir, confName, coreName);
219-
cc.getConfigSetService().uploadConfig(confName, udir, true);
218+
cc.getConfigSetService().uploadConfig(confName, udir);
220219
}
221220
}
222221

223-
/**
224-
* Return whether the given configSet is trusted.
225-
*
226-
* @param name name of the configSet
227-
*/
228-
public boolean isConfigSetTrusted(String name) throws IOException {
229-
Map<String, Object> contentMap = getConfigMetadata(name);
230-
return (boolean) contentMap.getOrDefault("trusted", true);
231-
}
232-
233-
/**
234-
* Return whether the configSet used for the given resourceLoader is trusted.
235-
*
236-
* @param coreLoader resourceLoader for a core
237-
*/
238-
public boolean isConfigSetTrusted(SolrResourceLoader coreLoader) throws IOException {
239-
// ConfigSet flags are loaded from the metadata of the ZK node of the configset. (For the
240-
// ZKConfigSetService)
241-
NamedList<?> flags = loadConfigSetFlags(coreLoader);
242-
243-
// Trust if there is no trusted flag (i.e. the ConfigSetApi was not used for this configSet)
244-
// or if the trusted flag is set to "true".
245-
return (flags == null || flags.get("trusted") == null || flags.getBooleanArg("trusted"));
246-
}
247-
248-
/**
249-
* Change the trust of the given configSet.
250-
*
251-
* @param name name of the configSet
252-
* @param isTrusted whether the given configSet should be trusted or not
253-
*/
254-
public void setConfigSetTrust(String name, boolean isTrusted) throws IOException {
255-
Map<String, Object> contentMap = new HashMap<>(getConfigMetadata(name));
256-
contentMap.put("trusted", isTrusted);
257-
setConfigMetadata(name, contentMap);
258-
}
259-
260222
/**
261223
* Load the ConfigSet for a core
262224
*
@@ -270,7 +232,6 @@ public final ConfigSet loadConfigSet(CoreDescriptor dcore) {
270232
try {
271233
// ConfigSet properties are loaded from ConfigSetProperties.DEFAULT_FILENAME file.
272234
NamedList<?> properties = loadConfigSetProperties(dcore, coreLoader);
273-
boolean trusted = isConfigSetTrusted(coreLoader);
274235

275236
SolrConfig solrConfig = createSolrConfig(dcore, coreLoader);
276237
return new ConfigSet(
@@ -283,8 +244,7 @@ public final ConfigSet loadConfigSet(CoreDescriptor dcore) {
283244
throw new SolrException(SolrException.ErrorCode.SERVER_ERROR, e.getMessage(), e);
284245
}
285246
},
286-
properties,
287-
trusted);
247+
properties);
288248
} catch (Exception e) {
289249
throw new SolrException(
290250
SolrException.ErrorCode.SERVER_ERROR,
@@ -418,20 +378,7 @@ protected NamedList<Object> loadConfigSetFlags(SolrResourceLoader loader) throws
418378
* @param dir {@link Path} to the files
419379
* @throws IOException if an I/O error occurs or the path does not exist
420380
*/
421-
protected abstract void uploadConfig(String configName, Path dir) throws IOException;
422-
423-
/**
424-
* Upload files from a given path to config, which will explicitly be trusted or not.
425-
*
426-
* @param configName the config name
427-
* @param dir {@link Path} to the files
428-
* @param isTrusted whether the config being uploaded is trusted
429-
* @throws IOException if an I/O error occurs or the path does not exist
430-
*/
431-
public void uploadConfig(String configName, Path dir, boolean isTrusted) throws IOException {
432-
setConfigSetTrust(configName, isTrusted);
433-
uploadConfig(configName, dir);
434-
}
381+
public abstract void uploadConfig(String configName, Path dir) throws IOException;
435382

436383
/**
437384
* Upload a file to config If file does not exist, it will be uploaded If overwriteOnExists is set
@@ -507,22 +454,6 @@ public abstract void deleteFilesFromConfig(String configName, List<String> files
507454
protected abstract void setConfigMetadata(String configName, Map<String, Object> data)
508455
throws IOException;
509456

510-
/**
511-
* Set the config metadata If config does not exist, it will be created and set metadata on it
512-
* Else metadata will be replaced with the provided metadata. This will preserve the trust that
513-
* the configSet already has if trust is not included in the metadata.
514-
*
515-
* @param configName the config name
516-
* @param data the metadata to be set on config
517-
*/
518-
public void setConfigMetadataWithTrust(String configName, Map<String, Object> data)
519-
throws IOException {
520-
if (!data.containsKey("trusted")) {
521-
data.put("trusted", isConfigSetTrusted(configName));
522-
}
523-
setConfigMetadata(configName, data);
524-
}
525-
526457
/**
527458
* Get the config metadata (mutable, non-null)
528459
*

solr/core/src/java/org/apache/solr/core/CoreContainer.java

+2-4
Original file line numberDiff line numberDiff line change
@@ -1741,13 +1741,11 @@ private SolrCore createFromDescriptor(
17411741
}
17421742

17431743
ConfigSet coreConfig = coreConfigService.loadConfigSet(dcore);
1744-
dcore.setConfigSetTrusted(coreConfig.isTrusted());
17451744
if (log.isInfoEnabled()) {
17461745
log.info(
1747-
"Creating SolrCore '{}' using configuration from {}, trusted={}",
1746+
"Creating SolrCore '{}' using configuration from {}",
17481747
dcore.getName(),
1749-
coreConfig.getName(),
1750-
dcore.isConfigSetTrusted());
1748+
coreConfig.getName());
17511749
}
17521750
try {
17531751
core = new SolrCore(this, dcore, coreConfig);

solr/core/src/java/org/apache/solr/core/CoreDescriptor.java

-17
Original file line numberDiff line numberDiff line change
@@ -66,13 +66,6 @@ public class CoreDescriptor {
6666
public static final String DEFAULT_EXTERNAL_PROPERTIES_FILE =
6767
"conf" + FileSystems.getDefault().getSeparator() + "solrcore.properties";
6868

69-
/**
70-
* Whether this core was configured using a configSet that was trusted. This helps in avoiding the
71-
* loading of plugins that have potential vulnerabilities, when the configSet was not uploaded
72-
* from a trusted user.
73-
*/
74-
private boolean trustedConfigSet = true;
75-
7669
/**
7770
* Get the standard properties in persistable form
7871
*
@@ -174,7 +167,6 @@ public CoreDescriptor(String coreName, CoreDescriptor other) {
174167
this.coreProperties.setProperty(CORE_NAME, coreName);
175168
this.originalCoreProperties.setProperty(CORE_NAME, coreName);
176169
this.substitutableProperties.setProperty(SOLR_CORE_PROP_PREFIX + CORE_NAME, coreName);
177-
this.trustedConfigSet = other.trustedConfigSet;
178170
}
179171

180172
/**
@@ -396,13 +388,4 @@ public void setConfigSet(String configSetName) {
396388
public String getConfigSetPropertiesName() {
397389
return coreProperties.getProperty(CORE_CONFIGSET_PROPERTIES);
398390
}
399-
400-
public boolean isConfigSetTrusted() {
401-
return trustedConfigSet;
402-
}
403-
404-
/** TODO remove mutability */
405-
public void setConfigSetTrusted(boolean trusted) {
406-
this.trustedConfigSet = trusted;
407-
}
408391
}

solr/core/src/java/org/apache/solr/core/FileSystemConfigSetService.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ public FileVisitResult postVisitDirectory(Path dir, IOException ioException)
140140
}
141141

142142
@Override
143-
protected void uploadConfig(String configName, Path source) throws IOException {
143+
public void uploadConfig(String configName, Path source) throws IOException {
144144
Path dest = getConfigDir(configName);
145145
copyRecursively(source, dest);
146146
}

solr/core/src/java/org/apache/solr/core/SyntheticSolrCore.java

-1
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,6 @@ public static SyntheticSolrCore createAndRegisterCore(
6464
syntheticCoreDescriptor.setConfigSet(configSetName);
6565
ConfigSet coreConfig =
6666
coreContainer.getConfigSetService().loadConfigSet(syntheticCoreDescriptor);
67-
syntheticCoreDescriptor.setConfigSetTrusted(coreConfig.isTrusted());
6867
SyntheticSolrCore syntheticCore =
6968
new SyntheticSolrCore(coreContainer, syntheticCoreDescriptor, coreConfig);
7069
coreContainer.registerCore(syntheticCoreDescriptor, syntheticCore, false, false);

solr/core/src/java/org/apache/solr/core/backup/BackupManager.java

+1-5
Original file line numberDiff line numberDiff line change
@@ -255,16 +255,12 @@ public void writeCollectionState(String collectionName, DocCollection collection
255255
* @throws IOException in case of I/O errors.
256256
*/
257257
public void uploadConfigDir(
258-
String sourceConfigName,
259-
String targetConfigName,
260-
ConfigSetService configSetService,
261-
boolean requestIsTrusted)
258+
String sourceConfigName, String targetConfigName, ConfigSetService configSetService)
262259
throws IOException {
263260
URI source = repository.resolveDirectory(getZkStateDir(), CONFIG_STATE_DIR, sourceConfigName);
264261
if (!repository.exists(source)) {
265262
throw new IllegalArgumentException("Configset expected at " + source + " does not exist");
266263
}
267-
configSetService.setConfigSetTrust(targetConfigName, requestIsTrusted);
268264
uploadConfigToSolrCloud(configSetService, source, targetConfigName, "");
269265
}
270266

solr/core/src/java/org/apache/solr/handler/admin/api/RestoreCollection.java

-6
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@
2929
import static org.apache.solr.common.params.CoreAdminParams.BACKUP_ID;
3030
import static org.apache.solr.common.params.CoreAdminParams.BACKUP_LOCATION;
3131
import static org.apache.solr.common.params.CoreAdminParams.BACKUP_REPOSITORY;
32-
import static org.apache.solr.common.params.CoreAdminParams.TRUSTED;
3332
import static org.apache.solr.handler.admin.CollectionsHandler.DEFAULT_COLLECTION_OP_TIMEOUT;
3433
import static org.apache.solr.security.PermissionNameProvider.Name.COLL_EDIT_PERM;
3534

@@ -52,7 +51,6 @@
5251
import org.apache.solr.common.util.Utils;
5352
import org.apache.solr.core.CoreContainer;
5453
import org.apache.solr.handler.admin.CollectionsHandler;
55-
import org.apache.solr.handler.configsets.ConfigSetAPIBase;
5654
import org.apache.solr.jersey.PermissionName;
5755
import org.apache.solr.request.SolrQueryRequest;
5856
import org.apache.solr.response.SolrQueryResponse;
@@ -168,10 +166,6 @@ public ZkNodeProps createRemoteMessage(
168166
// Copy restore-specific parameters
169167
remoteMessage.put(QUEUE_OPERATION, CollectionParams.CollectionAction.RESTORE.toLower());
170168
remoteMessage.put(NAME, backupName);
171-
remoteMessage.put(
172-
TRUSTED,
173-
ConfigSetAPIBase.isTrusted(
174-
solrQueryRequest.getUserPrincipal(), coreContainer.getAuthenticationPlugin()));
175169
return new ZkNodeProps(remoteMessage);
176170
}
177171

solr/core/src/java/org/apache/solr/handler/configsets/CloneConfigSet.java

-10
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@
1818
package org.apache.solr.handler.configsets;
1919

2020
import static org.apache.solr.common.params.CommonParams.NAME;
21-
import static org.apache.solr.handler.admin.ConfigSetsHandler.DISABLE_CREATE_AUTH_CHECKS;
2221
import static org.apache.solr.security.PermissionNameProvider.Name.CONFIG_EDIT_PERM;
2322

2423
import jakarta.inject.Inject;
@@ -63,15 +62,6 @@ public SolrJerseyResponse cloneExistingConfigSet(CloneConfigsetRequestBody reque
6362
"Base ConfigSet does not exist: " + requestBody.baseConfigSet);
6463
}
6564

66-
if (!DISABLE_CREATE_AUTH_CHECKS
67-
&& !isTrusted(solrQueryRequest.getUserPrincipal(), coreContainer.getAuthenticationPlugin())
68-
&& configSetService.isConfigSetTrusted(requestBody.baseConfigSet)) {
69-
throw new SolrException(
70-
SolrException.ErrorCode.UNAUTHORIZED,
71-
"Can't create a configset with an unauthenticated request from a trusted "
72-
+ ConfigSetCmds.BASE_CONFIGSET);
73-
}
74-
7565
final Map<String, Object> configsetCommandMsg = new HashMap<>();
7666
configsetCommandMsg.put(NAME, requestBody.name);
7767
configsetCommandMsg.put(ConfigSetCmds.BASE_CONFIGSET, requestBody.baseConfigSet);

0 commit comments

Comments
 (0)