You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@lucene.apache.org by rm...@apache.org on 2019/12/24 14:41:22 UTC

[lucene-solr] branch master updated: SOLR-13984: docs, changes.txt

This is an automated email from the ASF dual-hosted git repository.

rmuir pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/lucene-solr.git


The following commit(s) were added to refs/heads/master by this push:
     new efd13f2  SOLR-13984: docs, changes.txt
efd13f2 is described below

commit efd13f2884d55d67d73dca771fa9a2a20ae3d6ee
Author: Robert Muir <rm...@apache.org>
AuthorDate: Tue Dec 24 06:41:14 2019 -0800

    SOLR-13984: docs, changes.txt
---
 solr/CHANGES.txt                           | 3 +++
 solr/solr-ref-guide/src/securing-solr.adoc | 4 ++++
 2 files changed, 7 insertions(+)

diff --git a/solr/CHANGES.txt b/solr/CHANGES.txt
index 2e1679d..8533f46 100644
--- a/solr/CHANGES.txt
+++ b/solr/CHANGES.txt
@@ -172,6 +172,9 @@ Improvements
 
 * SOLR-14131: Add maxQueryLength option to DirectSolrSpellchecker. (Andy Webb via Bruno Roustant)
 
+* SOLR-13984: Java's SecurityManager sandbox can be enabled via environment variable,
+  SOLR_SECURITY_MANAGER_ENABLED=true. (rmuir)
+
 Optimizations
 ---------------------
 (No changes)
diff --git a/solr/solr-ref-guide/src/securing-solr.adoc b/solr/solr-ref-guide/src/securing-solr.adoc
index b2d8703..976a6b8 100644
--- a/solr/solr-ref-guide/src/securing-solr.adoc
+++ b/solr/solr-ref-guide/src/securing-solr.adoc
@@ -62,3 +62,7 @@ Audit logging will record an audit trail of incoming reqests to your cluster, su
 
 ZooKeeper is a central and important part of a SolrCloud cluster and understanding how to secure
 its content is covered in the <<zookeeper-access-control.adoc#zookeeper-access-control,ZooKeeper Access Control>> page.
+
+== Enable Security Manager
+
+Solr can run in a Java Security Manager sandbox by setting `SOLR_SECURITY_MANAGER_ENABLED=true` via environment variable or in `solr.in.sh`/`solr.in.cmd`. This feature is incompatible with Hadoop.