Skip to content

v1.6.2

Compare
Choose a tag to compare
@apatrida apatrida released this 08 Sep 19:12
· 33 commits to master since this release

Small update to v1.6.1 adding these settings allowing for symlinks (and security around them) to be used for the tempDir path in which the WAR or distribution is exploded and Solr web resources are served:

  # If tempDir contains symbolic links they are blocked for security reasons by default because web content is served from this dir, but can be enabled
  tempDirSymLinksAllow: false
  # If tempDir can contain symbolic links, to what ABSOLUTE paths are they allowed to access?  (or empty for ALL)
  tempDirSymLinksSafePaths: []

Also all paths are normalized to remove any relative pathing to avoid other issues and make it clearer to the system that checks security of symlinks that you are not pathing out to some forbidden directory.