Yair Zaslavsky has uploaded a new change for review. Change subject: aaa: coverity fixes ......................................................................
aaa: coverity fixes Topic: AAA Change-Id: I1bb986dd9df608cac00f9387cfee7c84b65b2631 Signed-off-by: Yair Zaslavsky <yzasl...@redhat.com> --- M backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/kerberosldap/utils/kerberos/KrbConfCreator.java M backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/tools/ManageDomains.java M backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendGroupsResourceTest.java M backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendUsersResourceTest.java 4 files changed, 44 insertions(+), 38 deletions(-) git pull ssh://gerrit.ovirt.org:29418/ovirt-engine refs/changes/69/31569/1 diff --git a/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/kerberosldap/utils/kerberos/KrbConfCreator.java b/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/kerberosldap/utils/kerberos/KrbConfCreator.java index a6bdc9f..74b4072 100644 --- a/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/kerberosldap/utils/kerberos/KrbConfCreator.java +++ b/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/kerberosldap/utils/kerberos/KrbConfCreator.java @@ -118,7 +118,7 @@ public void toFile(String krb5ConfPath, StringBuffer sb) throws FileNotFoundException, IOException { try (FileOutputStream fos = new FileOutputStream(krb5ConfPath)) { - fos.write(sb.toString().getBytes()); + fos.write(sb.toString().getBytes(Charset.forName("UTF-8"))); } } diff --git a/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/tools/ManageDomains.java b/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/tools/ManageDomains.java index 08aec0b..1bfe5a5 100644 --- a/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/tools/ManageDomains.java +++ b/backend/manager/modules/builtin-extensions/src/main/java/org/ovirt/engine/extensions/aaa/builtin/tools/ManageDomains.java @@ -261,7 +261,7 @@ System.console() .readLine("Please enter message or URL to appear when user tries to login with an expired password" + emptyValueDescription + ":"); - if (changePasswordMsgStr.indexOf("http") == 0 || changePasswordMsgStr.indexOf("https") == 0) { + if (changePasswordMsgStr != null && changePasswordMsgStr.indexOf("http") == 0 || changePasswordMsgStr.indexOf("https") == 0) { try { URL url = new URL(changePasswordMsgStr); log.debug("Validated that " + url + " is in correct format"); @@ -487,39 +487,43 @@ LdapProviderType ldapProviderType = args.getLdapProvider(); - adUserNameEntry.setValueForDomain(domainName, userName); - adUserPasswordEntry.setValueForDomain(domainName, getPasswordInput()); - authModeEntry.setValueForDomain(domainName, authMode); - ldapProviderTypesEntry.setValueForDomain(domainName, ldapProviderType.name()); - if (args.contains(ARG_LDAP_SERVERS)) { - setLdapServersPerDomain(domainName, ldapServersEntry, StringUtils.join(ldapServers, ",")); + if (ldapProviderType != null) { + adUserNameEntry.setValueForDomain(domainName, userName); + adUserPasswordEntry.setValueForDomain(domainName, getPasswordInput()); + authModeEntry.setValueForDomain(domainName, authMode); + ldapProviderTypesEntry.setValueForDomain(domainName, ldapProviderType.name()); + if (args.contains(ARG_LDAP_SERVERS)) { + setLdapServersPerDomain(domainName, ldapServersEntry, StringUtils.join(ldapServers, ",")); + } + handleChangePasswordMsg(domainName, changePasswordUrlEntry, false); + testConfiguration(domainName, + domainNameEntry, + adUserNameEntry, + adUserPasswordEntry, + authModeEntry, + adUserIdEntry, + ldapProviderTypesEntry, + ldapServersEntry, + ldapServerPort, + true, + false, + ldapServers); + + handleAddPermissions(domainName, userName, adUserIdEntry.getValueForDomain(domainName)); + + // Update the configuration + setConfigurationEntries(domainNameEntry, + adUserNameEntry, + adUserPasswordEntry, + authModeEntry, + ldapServersEntry, + adUserIdEntry, + ldapProviderTypesEntry, changePasswordUrlEntry); + + printSuccessMessage(domainName, "added"); + } else { + System.err.println("Provider typ was not provided. Use --providerType=<ldap_provider_type"); } - handleChangePasswordMsg(domainName, changePasswordUrlEntry, false); - testConfiguration(domainName, - domainNameEntry, - adUserNameEntry, - adUserPasswordEntry, - authModeEntry, - adUserIdEntry, - ldapProviderTypesEntry, - ldapServersEntry, - ldapServerPort, - true, - false, - ldapServers); - - handleAddPermissions(domainName, userName, adUserIdEntry.getValueForDomain(domainName)); - - // Update the configuration - setConfigurationEntries(domainNameEntry, - adUserNameEntry, - adUserPasswordEntry, - authModeEntry, - ldapServersEntry, - adUserIdEntry, - ldapProviderTypesEntry, changePasswordUrlEntry); - - printSuccessMessage(domainName, "added"); } private void setLdapServersPerDomain(String domainName, @@ -794,7 +798,7 @@ SimpleAuthenticationCheck simpleAuthenticationCheck = new SimpleAuthenticationCheck(); Pair<ReturnStatus, String> simpleCheckResult = simpleAuthenticationCheck.printUserGuid(domain, userName, password, userGuid, ldapProviderType, ldapServers); - if (!simpleCheckResult.getFirst().equals(ReturnStatus.OK)) { + if (simpleCheckResult == null || !simpleCheckResult.getFirst().equals(ReturnStatus.OK)) { System.err.println(simpleCheckResult.getSecond()); return new ManageDomainsResult(ManageDomainsResultEnum.FAILURE_WHILE_TESTING_DOMAIN, new String[] { domain, simpleCheckResult.getFirst().getDetailedMessage() }); diff --git a/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendGroupsResourceTest.java b/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendGroupsResourceTest.java index de832c4..1184e46 100644 --- a/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendGroupsResourceTest.java +++ b/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendGroupsResourceTest.java @@ -1,5 +1,6 @@ package org.ovirt.engine.api.restapi.resource.aaa; +import java.nio.charset.Charset; import java.util.List; import javax.ws.rs.WebApplicationException; @@ -384,7 +385,7 @@ assertEquals(GUIDS[index].toString(), model.getId()); assertEquals(GROUP_NAMES[index], model.getName()); assertNotNull(model.getDomain()); - assertEquals(new Guid(DOMAIN.getBytes(), true).toString(), model.getDomain().getId()); + assertEquals(new Guid(DOMAIN.getBytes(Charset.forName("UTF-8")), true).toString(), model.getDomain().getId()); verifyLinks(model); } } diff --git a/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendUsersResourceTest.java b/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendUsersResourceTest.java index 9546aa6..b5059be 100644 --- a/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendUsersResourceTest.java +++ b/backend/manager/modules/restapi/jaxrs/src/test/java/org/ovirt/engine/api/restapi/resource/aaa/BackendUsersResourceTest.java @@ -1,5 +1,6 @@ package org.ovirt.engine.api.restapi.resource.aaa; +import java.nio.charset.Charset; import java.util.Arrays; import java.util.HashSet; import java.util.LinkedList; @@ -159,7 +160,7 @@ User model = new User(); model.setUserName(NAMES[0]); Domain domain = new Domain(); - domain.setId(new Guid(DOMAIN.getBytes(), true).toString()); + domain.setId(new Guid(DOMAIN.getBytes(Charset.forName("UTF-8")), true).toString()); model.setDomain(domain); Response response = collection.add(model); verifyAddUser(response); @@ -227,7 +228,7 @@ assertEquals(GUIDS[index].toString(), model.getId()); assertEquals(NAMES[index] + "@" + DOMAIN, model.getUserName()); assertNotNull(model.getDomain()); - assertEquals(new Guid(DOMAIN.getBytes(), true).toString(), model.getDomain().getId()); + assertEquals(new Guid(DOMAIN.getBytes(Charset.forName("UTF-8")), true).toString(), model.getDomain().getId()); assertTrue(model.isSetGroups()); assertEquals(PARSED_GROUPS.length, model.getGroups().getGroups().size()); HashSet<String> groupNames = new HashSet<>(); -- To view, visit http://gerrit.ovirt.org/31569 To unsubscribe, visit http://gerrit.ovirt.org/settings Gerrit-MessageType: newchange Gerrit-Change-Id: I1bb986dd9df608cac00f9387cfee7c84b65b2631 Gerrit-PatchSet: 1 Gerrit-Project: ovirt-engine Gerrit-Branch: master Gerrit-Owner: Yair Zaslavsky <yzasl...@redhat.com> _______________________________________________ Engine-patches mailing list Engine-patches@ovirt.org http://lists.ovirt.org/mailman/listinfo/engine-patches