Skip to content

Commit 863dc3b

Browse files
committed
HADOOP-6642. Fix javac, javadoc, findbugs warnings related to security work. Contributed by Chris Douglas, Po Cheung.
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1065959 13f79535-47bb-0310-9956-ffa450edef68
1 parent f5a831d commit 863dc3b

File tree

3 files changed

+15
-8
lines changed

3 files changed

+15
-8
lines changed

CHANGES.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -471,6 +471,9 @@ Release 0.22.0 - Unreleased
471471
HADOOP-7126. Fix file permission setting for RawLocalFileSystem on Windows.
472472
(Po Cheung via shv)
473473

474+
HADOOP-6642. Fix javac, javadoc, findbugs warnings related to security work.
475+
(Chris Douglas, Po Cheung via shv)
476+
474477
Release 0.21.1 - Unreleased
475478

476479
IMPROVEMENTS

src/java/org/apache/hadoop/security/Krb5AndCertsSslSocketConnector.java

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@
2020
import java.net.InetAddress;
2121
import java.net.ServerSocket;
2222
import java.security.Principal;
23+
import java.util.Collections;
24+
import java.util.List;
2325
import java.util.Random;
2426

2527
import javax.net.ssl.SSLContext;
@@ -52,10 +54,11 @@
5254
* running with Kerberos support.
5355
*/
5456
public class Krb5AndCertsSslSocketConnector extends SslSocketConnector {
55-
public static final String[] KRB5_CIPHER_SUITES =
56-
new String [] {"TLS_KRB5_WITH_3DES_EDE_CBC_SHA"};
57+
public static final List<String> KRB5_CIPHER_SUITES =
58+
Collections.unmodifiableList(Collections.singletonList(
59+
"TLS_KRB5_WITH_3DES_EDE_CBC_SHA"));
5760
static {
58-
System.setProperty("https.cipherSuites", KRB5_CIPHER_SUITES[0]);
61+
System.setProperty("https.cipherSuites", KRB5_CIPHER_SUITES.get(0));
5962
}
6063

6164
private static final Log LOG = LogFactory
@@ -136,11 +139,12 @@ protected ServerSocket newServerSocket(String host, int port, int backlog)
136139
String [] combined;
137140
if(useCerts) { // combine the cipher suites
138141
String[] certs = ss.getEnabledCipherSuites();
139-
combined = new String[certs.length + KRB5_CIPHER_SUITES.length];
142+
combined = new String[certs.length + KRB5_CIPHER_SUITES.size()];
140143
System.arraycopy(certs, 0, combined, 0, certs.length);
141-
System.arraycopy(KRB5_CIPHER_SUITES, 0, combined, certs.length, KRB5_CIPHER_SUITES.length);
144+
System.arraycopy(KRB5_CIPHER_SUITES.toArray(new String[0]), 0, combined,
145+
certs.length, KRB5_CIPHER_SUITES.size());
142146
} else { // Just enable Kerberos auth
143-
combined = KRB5_CIPHER_SUITES;
147+
combined = KRB5_CIPHER_SUITES.toArray(new String[0]);
144148
}
145149

146150
ss.setEnabledCipherSuites(combined);

src/java/org/apache/hadoop/security/SaslRpcServer.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -238,8 +238,8 @@ public void handle(Callback[] callbacks) throws InvalidToken,
238238
}
239239
if (ac.isAuthorized()) {
240240
if (LOG.isDebugEnabled()) {
241-
String username = getIdentifier(authzid, secretManager).getUser()
242-
.getUserName().toString();
241+
String username =
242+
getIdentifier(authzid, secretManager).getUser().getUserName();
243243
LOG.debug("SASL server DIGEST-MD5 callback: setting "
244244
+ "canonicalized client ID: " + username);
245245
}

0 commit comments

Comments
 (0)