When you send a read request for the test2Collection collection, the logs do not display as a collection, and I get 10 entries with admin_x rights
attached log with description ср, 29 мар. 2023 г., 16:39 Jan Høydahl <jan....@cominvent.com>: > Permissions are evaluated in order from top to bottom. > The first "read" permission found requires roles "admin_ro", "admin_rwx", > "solr-internal-traffic", so that should be selected. > > Do you have any logs that can shed light over what happens? > > Jan > > > 29. mar. 2023 kl. 14:27 skrev MEXANIK <irkuev...@gmail.com>: > > > > I logged in using the john_sl user in Solr UI, and sent a request to read > > the collection, but I can read some of the collections, but I don't want > > them to be read. > > > > If I replace the admin user's rights from admin_rwx to admin_x, then the > > john_sl user can't read either > > > > How do I make it so that john_sl cannot read collections with admin_x > > rights, but at the same time so that the admin user has admin_rwx > rights?? > > > > Help!! > > > > Example security.json http://replit.com/@irkuev666/Test#data.json > >
----- WARNING!--- -------------CASE SEND REQUEST READ test2Collection----WITH USERS john_sl----------------- ----------------NOT CORRECT RESPONSE--I CAN READ DATA THE COLLECTION WITH admin_x rights------------------------------ 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-177) [ ] o.e.j.i.ManagedSelector updates 0 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-177) [ ] o.e.j.i.ManagedSelector Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting with 2 keys 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to [/____v2/schema-designer/configs] of type: [ADMIN], associated with collections [[]] 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking admin permissions 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{ "name":"config-edit", "role":[ "admin_rwx", "admin_x", "solr-internal-traffic"]}] to govern resource [/____v2/schema-designer/configs] 2023-03-30 15:30:55.897 DEBUG (qtp1299327689-150) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{ "name":"config-edit", "role":[ "admin_rwx", "admin_x", "solr-internal-traffic"]}] allows access to role [admin_x]; permitting access 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to [/admin/collections] of type: [ADMIN], associated with collections [[]] 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-150) [ ] o.e.j.i.ManagedSelector Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting with 2 keys 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking admin permissions 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{ "collection":null, "path":"/admin/collections", "params":{"action":[ "LIST", "LISTALIASES", "CLUSTERSTATUS"]}, "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] to govern resource [/admin/collections] 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{ "collection":null, "path":"/admin/collections", "params":{"action":[ "LIST", "LISTALIASES", "CLUSTERSTATUS"]}, "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] allows access to role [admin_x]; permitting access 2023-03-30 15:30:55.876 DEBUG (qtp1299327689-173) [ ] o.a.s.h.a.CollectionsHandler Invoked Collection Action :listaliases with params action=LISTALIASES&wt=json&_=1680176979652 and sendToOCPQueue=true 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to [/admin/info/system] of type: [ADMIN], associated with collections [[]] 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking admin permissions 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-59) [ ] o.e.j.h.HTTP2Connection Processing HeadersFrame@50cec7e7#97{end=true}+PriorityFrame@4f576204#97/#5{weight=22,exclusive=false} on HTTP2Stream@25c48b4f#97@9d00611{sendWindow=131072,recvWindow=524288,reset=false/false,REMOTELY_CLOSED,age=0,attachment=null} 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-59) [ ] o.e.j.h.s.HttpTransportOverHTTP2 org.eclipse.jetty.http2.server.HttpTransportOverHTTP2@5463412d setStream 97 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{ "name":"all", "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] to govern resource [/admin/info/system] 2023-03-30 15:30:55.808 DEBUG (qtp1299327689-21) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{ "name":"all", "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] allows access to role [admin_x]; permitting access 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.SolrDispatchFilter Request to authenticate: org.apache.solr.servlet.SolrDispatchFilter$1@2e4d085f, domain: 10.56.103.108, port: 13700 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.SolrDispatchFilter User principal: us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@2e5ea716 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to [/admin/cores] of type: [ADMIN], associated with collections [[]] 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing an ADMIN request, checking admin permissions 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{ "name":"core-admin-read", "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] to govern resource [/admin/cores] 2023-03-30 15:30:55.806 DEBUG (qtp1299327689-145) [ ] o.a.s.s.RuleBasedAuthorizationPluginBase Governing permission [{ "name":"core-admin-read", "role":[ "admin_ro", "admin_x", "admin_rwx", "solr-internal-traffic"]}] allows access to role [admin_x]; permitting access ----- WARNING!--- -----------------------CASE SEND REQUEST READ test1Collection--------------WITH USER john_sl--------------- ---------CORRECT RESPONSE 403 with role admin_x------------------- 2023-03-30 16:20:23.400 DEBUG (qtp1299327689-156) [ ] o.e.j.i.ManagedSelector Selector sun.nio.ch.EPollSelectorImpl@5f7185e3 waiting with 2 keys 2023-03-30 16:20:23.400 DEBUG (qtp1299327689-146) [ ] o.a.s.s.SolrDispatchFilter User principal: us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@778d0b82 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase Attempting to authorize request to [/select] of type: [READ], associated with collections [[CollectionRequest(test1Collection.0)]] 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing collection-aware request, checking perms applicable to specific collection [test1Collection.0] 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase Authorizing collection-aware request, checking perms applicable to all (*) collections 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase No perms configured for the resource /select . So allowed to access 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase Found perm [{ "name":"collection-query", "role":[ "admin_ro", "admin_rwx"]}] to govern resource [/select] 2023-03-30 16:20:23.401 INFO (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.a.s.s.RuleBasedAuthorizationPluginBase This resource is configured to have a permission { "name":"collection-query", "role":[ "admin_ro", "admin_rwx"]}, The principal us.ssl.CustomSSLAuthenticationPlugin$1$$Lambda$769/0x00000008406ae040@3b33128b does not have the right role 2023-03-30 16:20:23.401 DEBUG (qtp1299327689-146) [c:test1Collection.0 s:shard8 r:core_node35 x:test1Collection.0_shard8_replica_n33] o.e.j.s.HttpChannelState sendError HttpChannelState@6bce1579{s=HANDLING rs=BLOCKING os=OPEN is=IDLE awp=false se=false i=true al=0}