HoustonPutman commented on code in PR #4193:
URL: https://github.com/apache/solr/pull/4193#discussion_r2962137982


##########
solr/solrj-zookeeper/src/java/org/apache/solr/common/cloud/ZkMaintenanceUtils.java:
##########
@@ -443,13 +433,9 @@ public static void downloadFromZK(SolrZkClient zkClient, 
String zkPath, Path fil
       if (children.size() == 0) {
         // If we didn't copy data down, then we also didn't create the file. 
But we still need a
         // marker on the local disk so create an empty file.
-        if (isFileForbiddenInConfigSets(zkPath)) {

Review Comment:
   Ahhh ok, so I remember why I protected this as well. Back then, we would 
have been worried that attackers could have already uploaded malicious 
configSets via the API before this fix was made. So checking the zk downloads 
made it so that upgrading Solr would protect you even if you had already been 
"compromised". Since this would only bee affecting Solr 10, I think the risk 
vector is much lower. So I'm totally okay removing the check from downloads 
from ZK.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to