SolrGuard security mode enables safe execution against enterprise Solr environments while preventing secret leakage into manifests, reports, API request logs, and plugin artifacts.
- support real enterprise auth patterns (basic, bearer, mTLS, plugin providers)
- resolve secrets from environment and files safely
- redact secrets deterministically across logs/artifacts
- provide privacy profiles with clear artifact persistence behavior
- capture audit metadata for governance and compliance workflows
none: local/dev modebasic: username/passwordbearer: token-based authmtls: client cert/key + optional CA fileplugin: auth provider plugins through the plugin SDK
Supported input forms:
- plain string values
- env reference:
${ENV_VAR} - file reference:
file:/path/to/secret.txt - object form:
{from_env: VAR},{from_file: /path},{value: ...}
Resolution behavior:
- missing/empty required secrets fail validation with non-secret error messages
- resolved secrets are never persisted back to run artifacts
- redacted config is persisted using
***REDACTED***
Redaction applies to:
- auth config payloads
- run manifests and report payload snippets
- API request payload persistence
- headers and authorization values
- URLs that include embedded credentials
- text logs with common secret patterns
Default sensitive keys include:
password,passwd,token,authorization,api_key,secret,private_key,key_file,cert_file
local-dev: full artifacts, secret redaction still enforced.enterprise-safe: redacted artifacts; raw request/doc/debug persistence disabled by default.no-sensitive-artifacts: suppresses sensitive artifact persistence.summary-only: keeps only summary/report/audit-style artifacts.
Captured fields include:
- run id, timestamp, requested_by, team, ticket_id
- environment label, target URLs/collections
- auth modes used
- security profile
- plugin list
- run outcome marker
Audit output is persisted without secrets.
- API request payload persistence uses security redaction helpers.
- API audit middleware logs principal/roles/outcome metadata.
- artifact serving remains constrained to tracked job artifacts.
- plugin config is persisted in redacted form.
- plugin outputs can mark payload as
{"sensitive": true}. - sensitive plugin payloads are suppressed in
no-sensitive-artifactsandsummary-onlyprofiles.
- prefer env/file secret references for production and CI/CD.
- avoid inline secrets outside local dev.
- use
enterprise-safeas default for shared environments. - use
summary-onlyfor broad report sharing.
- Vault / secret manager integration
- Kerberos / SPNEGO provider
- request signing auth provider
- fine-grained field masking policies
- per-artifact encryption at rest
- RBAC for API server
- per-tenant privacy policies
- admin-configurable audit sinks
- secret rotation support
- compliance mode (SOC2/GDPR-friendly artifact controls)