v1.6.2
Small update to v1.6.1 adding these settings allowing for symlinks (and security around them) to be used for the tempDir
path in which the WAR
or distribution is exploded and Solr web resources are served:
# If tempDir contains symbolic links they are blocked for security reasons by default because web content is served from this dir, but can be enabled
tempDirSymLinksAllow: false
# If tempDir can contain symbolic links, to what ABSOLUTE paths are they allowed to access? (or empty for ALL)
tempDirSymLinksSafePaths: []
Also all paths are normalized to remove any relative pathing to avoid other issues and make it clearer to the system that checks security of symlinks that you are not pathing out to some forbidden directory.