Thanks Jason. 
We are awaiting the 7.7.2 release. 

I will send out a note describing how the documentation is easy to mess-up.
Maybe this is worth writing a blog for folks like yourselves who are experts in 
this :) 


> On May 28, 2019, at 4:31 AM, Jason Gerlowski <gerlowsk...@gmail.com> wrote:
> 
> Hey Aroop,
> 
> The fix in SOLR-13355 is available starting in 8.1.  It will also be
> available in 7.7.2 once that is released.  (Jan Hoydahl started the
> release process for 7.7.2, but held off for a number of other ongoing
> releases.  He's recently resumed work on the release though, and I
> expect we'll see 7.7.2 in a week or two.)
> 
> RuleBasedAuthorizationPlugin does have some coverage in the ref-guide,
> as you've likely seen:
> https://lucene.apache.org/solr/guide/7_7/rule-based-authorization-plugin.html.
> I don't think SOLR-13355 involved any changes to that documentation:
> it fixed a bug that deviated from what was described in the ref-guide,
> so there were no changes required when that bug was fixed.  That said,
> if you see something I've missed, or think that page could be improved
> more generally, it's definitely worth raising a JIRA for.  RBAP
> permission matching/processing can be subtle for those using it for
> the first time, so any improvement to the docs will go a long way.
> 
> Jason
> 
> On Sat, May 25, 2019 at 3:12 AM Aroop Ganguly <aroopgang...@icloud.com> wrote:
>> 
>> hi jason
>> 
>> which version of solr has the definitive fix for the rbap again ?
>> also is there a jira to fix or create a documentation for the same that 
>> works :) ?
>> 
>> aroop
>> 
>> 
>>> On May 24, 2019, at 9:55 AM, Jason Gerlowski <gerlowsk...@gmail.com> wrote:
>>> 
>>> Hi Sotiris,
>>> 
>>> First, what version of Solr are you running?  We've made some fixes
>>> recently (esp. SOLR-13355) to RBAP, and they might affect the behavior
>>> you're seeing or any fixes we can recommend.
>>> 
>>> Second, the order of permissions in security.json has a huge effect on
>>> how .  Solr always uses the first permission rule that matches a given
>>> API...later rules are ignored if a match is found in earlier ones.
>>> The first rule in your permissions block ({"name": "all", "role":
>>> "admin"}) will match all APIs and will only allow requests through if
>>> the requesting user has the "admin" role.  So "user" being unable to
>>> query an alias makes sense.  Usually "all" and other catchall
>>> permissions are best used at the very bottom of your permissions list.
>>> That way the catchall is the last rule to be checked, giving other
>>> rules a chance to match first.
>>> 
>>> Hope that helps.
>>> 
>>> Jason
>>> 
>>> On Wed, May 22, 2019 at 6:21 AM Sotiris Fragkiskos <sfra...@gmail.com> 
>>> wrote:
>>>> 
>>>> Hi everyone!
>>>> I've been trying unsuccessfully to read an alias to a collection with a
>>>> curl command.
>>>> The command only works when I put in the admin credentials, although the
>>>> user I want access for also has the required role for accessing.
>>>> Is this perhaps built-in, or should anyone be able to access an alias from
>>>> the API?
>>>> 
>>>> The command I'm using is:
>>>> curl http://
>>>> <user>:<pass>@<solrhostname>/solr/<AliasName>/select?q=<field>:<value>
>>>> This fails for the user but succeeds for the admin
>>>> 
>>>> My minimum working example of security.json follows.
>>>> Many thanks!
>>>> 
>>>> {
>>>> "authentication":{
>>>>   "blockUnknown":true,
>>>>   "class":"solr.BasicAuthPlugin",
>>>>   "credentials":{
>>>>     "admin":"blahblahblah",
>>>>     "user":"blahblah"},
>>>>   "":{"v":13}},
>>>> "authorization":{
>>>>   "class":"solr.RuleBasedAuthorizationPlugin",
>>>>   "permissions":[
>>>>     {
>>>>       "name":"all",
>>>>       "role":"admin",
>>>>       "index":1},
>>>>     {
>>>>       "name":"readColl",
>>>>       "collection":"Coll",
>>>>       "path":"/select/*",
>>>>       "role":"readColl",
>>>>       "index":2},
>>>>     {
>>>>       "name":"readSCollAlias",
>>>>       "collection":"sCollAlias",
>>>>       "path":"/select/*",
>>>>       "role":"readSCollAlias",
>>>>       "index":3}],
>>>>   "user-role":{
>>>>     "admin":[
>>>>       "admin",
>>>>       "readSCollAlias"],
>>>>     "user":["readSCollAlias"]},
>>>>   "":{"v":21}}}
>> 

Reply via email to