gerlowskija commented on code in PR #3272:
URL: https://github.com/apache/solr/pull/3272#discussion_r2006263832


##########
solr/modules/scripting/src/java/org/apache/solr/scripting/xslt/XSLTUpdateRequestHandler.java:
##########
@@ -93,14 +93,6 @@ public void load(
         return;
       }
 
-      if (req.getCore().getCoreDescriptor().isConfigSetTrusted() == false) {

Review Comment:
   [Q] See review comment on ScriptUpdateProcessorFactory, also applicable here.



##########
solr/modules/scripting/src/java/org/apache/solr/scripting/update/ScriptUpdateProcessorFactory.java:
##########
@@ -216,13 +215,6 @@ void setScriptEngineCustomizer(ScriptEngineCustomizer 
scriptEngineCustomizer) {
 
   @Override
   public void inform(SolrCore core) {
-    if (!core.getCoreDescriptor().isConfigSetTrusted()) {

Review Comment:
   [Q] Configset "trustedness" is going away, but that doesn't make 
`ScriptUpdateProcessorFactory` any less risky to run.  What do you all think of 
logging a warning here to flag this for folks? e.g.
   
   ```
   log.warn("{} loaded for core {}: this URP allows the running of arbitrary 
scripts and should not generally be run in environments without authc/authz 
enabled.  Carefully consider the security ramifications for your environment, 
and proceed with caution.", this.getClass().getSimpleName(), core.getName());
   ```
   
   (I'll avoid duplicating my PR comment, but the same comment goes for 
`XSLTUpdateRequestHandler` as well.)



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to