Contributors/Committers, please review if any of your commit is giving these errors. And fix them if required.
Thanks Bosco On 8/13/17, 1:07 AM, "scan-ad...@coverity.com" <scan-ad...@coverity.com> wrote: Hi, Please find the latest report on new defect(s) introduced to Apache Ranger found with Coverity Scan. 10 new defect(s) introduced to Apache Ranger found with Coverity Scan. 1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 10 of 10 defect(s) ** CID 166304: Incorrect expression (USELESS_CALL) ________________________________________________________________________________________________________ *** CID 166304: Incorrect expression (USELESS_CALL) /security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java: 851 in org.apache.ranger.biz.TestXUserMgr.test30CreateVXUserGroupInfo()() 845 Assert.assertEquals("user1", vxUserGroupTest.getXuserInfo().getName()); 846 List<VXGroup> result = vxUserGroupTest.getXgroupInfo(); 847 List<VXGroup> expected = new ArrayList<VXGroup>(); 848 expected.add(vXGroup1); 849 expected.add(vXGroup2); 850 Assert.assertTrue(result.containsAll(expected)); >>> CID 166304: Incorrect expression (USELESS_CALL) >>> Calling "(org.apache.ranger.db.RangerDaoManager)org.mockito.Mockito.verify(daoManager).getXXPortalUser()" is only useful for its return value, which is ignored. 851 Mockito.verify(daoManager).getXXPortalUser(); 852 Mockito.verify(portalUser).findByLoginId(vXUser.getName()); 853 Mockito.verify(daoManager).getXXPortalUserRole(); 854 Mockito.verify(userDao).findXPortalUserRolebyXPortalUserId( 855 Mockito.anyLong()); 856 ** CID 166303: High impact security (CSRF) /security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java: 178 in org.apache.ranger.rest.XUserREST.createXGroupUserFromMap(org.apache.ranger.view.VXGroupUserInfo)() ________________________________________________________________________________________________________ *** CID 166303: High impact security (CSRF) /security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java: 178 in org.apache.ranger.rest.XUserREST.createXGroupUserFromMap(org.apache.ranger.view.VXGroupUserInfo)() 172 } 173 174 @POST 175 @Path("/groups/groupinfo") 176 @Produces({ "application/xml", "application/json" }) 177 @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") >>> CID 166303: High impact security (CSRF) >>> No CSRF protection was detected anywhere in this application. If this is not correct, please refer to the CSRF checker reference on how to specify it via checker option. 178 public VXGroupUserInfo createXGroupUserFromMap(VXGroupUserInfo vXGroupUserInfo) { 179 return xUserMgr.createXGroupUserFromMap(vXGroupUserInfo); 180 } 181 182 @POST 183 @Path("/secure/groups") ** CID 166302: Exceptional resource leaks (RESOURCE_LEAK) /hive-agent/src/test/java/org/apache/ranger/services/hive/HIVERangerAuthorizerTest.java: 908 in org.apache.ranger.services.hive.HIVERangerAuthorizerTest.testShowPrivileges()() ________________________________________________________________________________________________________ *** CID 166302: Exceptional resource leaks (RESOURCE_LEAK) /hive-agent/src/test/java/org/apache/ranger/services/hive/HIVERangerAuthorizerTest.java: 908 in org.apache.ranger.services.hive.HIVERangerAuthorizerTest.testShowPrivileges()() 902 903 @Test 904 public void testShowPrivileges() throws Exception { 905 String initialUrl = "jdbc:hive2://localhost:" + port; 906 Connection connection = DriverManager.getConnection(initialUrl, "admin", "admin"); 907 Statement statement = connection.createStatement(); >>> CID 166302: Exceptional resource leaks (RESOURCE_LEAK) >>> Variable "statement" going out of scope leaks the resource it refers to. 908 Assert.assertTrue(statement.execute("show grant user admin")); 909 statement.close(); 910 } 911 ** CID 166301: Incorrect expression (USELESS_CALL) ________________________________________________________________________________________________________ *** CID 166301: Incorrect expression (USELESS_CALL) /security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java: 853 in org.apache.ranger.biz.TestXUserMgr.test30CreateVXUserGroupInfo()() 847 List<VXGroup> expected = new ArrayList<VXGroup>(); 848 expected.add(vXGroup1); 849 expected.add(vXGroup2); 850 Assert.assertTrue(result.containsAll(expected)); 851 Mockito.verify(daoManager).getXXPortalUser(); 852 Mockito.verify(portalUser).findByLoginId(vXUser.getName()); >>> CID 166301: Incorrect expression (USELESS_CALL) >>> Calling "(org.apache.ranger.db.RangerDaoManager)org.mockito.Mockito.verify(daoManager).getXXPortalUserRole()" is only useful for its return value, which is ignored. 853 Mockito.verify(daoManager).getXXPortalUserRole(); 854 Mockito.verify(userDao).findXPortalUserRolebyXPortalUserId( 855 Mockito.anyLong()); 856 857 } 858 ** CID 166300: FindBugs: Correctness (FB.EC_UNRELATED_CLASS_AND_INTERFACE) /ugsync/src/main/java/org/apache/ranger/ldapusersync/process/LdapPolicyMgrUserGroupBuilder.java: 451 in org.apache.ranger.ldapusersync.process.LdapPolicyMgrUserGroupBuilder.addOrUpdateGroup(java.lang.String, java.util.List)() ________________________________________________________________________________________________________ *** CID 166300: FindBugs: Correctness (FB.EC_UNRELATED_CLASS_AND_INTERFACE) /ugsync/src/main/java/org/apache/ranger/ldapusersync/process/LdapPolicyMgrUserGroupBuilder.java: 451 in org.apache.ranger.ldapusersync.process.LdapPolicyMgrUserGroupBuilder.addOrUpdateGroup(java.lang.String, java.util.List)() 445 } 446 } 447 if (oldUsers.isEmpty()) { 448 addUsers = users; 449 } else { 450 for (String user : users) { >>> CID 166300: FindBugs: Correctness (FB.EC_UNRELATED_CLASS_AND_INTERFACE) >>> Call to java.util.List.equals(String). 451 if (!oldUsers.contains(user)|| !(oldUserMap.get(user).equals(groupMap.get(groupName)))) { 452 addUsers.add(user); 453 } 454 } 455 } 456 ** CID 166299: Incorrect expression (USELESS_CALL) ________________________________________________________________________________________________________ *** CID 166299: Incorrect expression (USELESS_CALL) /security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java: 1278 in org.apache.ranger.biz.TestXUserMgr.test44getGroupsForUser()() 1272 Mockito.when(modDef.findAccessibleModulesByUserId(Mockito.anyLong(), 1273 Mockito.anyLong())).thenReturn(lstModule); 1274 1275 Set<String> list = xUserMgr.getGroupsForUser(userName); 1276 Assert.assertNotNull(list); 1277 Mockito.verify(xUserService, Mockito.atLeast(2)).getXUserByUserName(userName); >>> CID 166299: Incorrect expression (USELESS_CALL) >>> Calling "(org.apache.ranger.db.RangerDaoManager)org.mockito.Mockito.verify(daoManager).getXXModuleDef()" is only useful for its return value, which is ignored. 1278 Mockito.verify(daoManager).getXXModuleDef(); 1279 Mockito.verify(modDef).findAccessibleModulesByUserId(Mockito.anyLong(),Mockito.anyLong()); 1280 } 1281 1282 @Test 1283 public void test45setUserRolesByExternalID() { ** CID 166298: Control flow issues (DEADCODE) /security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java: 1338 in org.apache.ranger.biz.XUserMgr.checkAccessRoles(java.util.List)() ________________________________________________________________________________________________________ *** CID 166298: Control flow issues (DEADCODE) /security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java: 1338 in org.apache.ranger.biz.XUserMgr.checkAccessRoles(java.util.List)() 1332 + " denied. LoggedInUser=" 1333 + (session != null ? session.getXXPortalUser() 1334 .getId() : "") 1335 + " isn't permitted to perform the action."); 1336 } 1337 } else { >>> CID 166298: Control flow issues (DEADCODE) >>> Execution cannot reach the expression "" is permitted to perform the action"" inside this statement: "org.apache.ranger.biz.XUser...". 1338 logger.info("LoggedInUser=" 1339 + (session != null ? session.getXXPortalUser() 1340 .getId() 1341 : " is permitted to perform the action")); 1342 } 1343 } ** CID 166297: Resource leaks (RESOURCE_LEAK) /hive-agent/src/test/java/org/apache/ranger/services/hive/HIVERangerAuthorizerTest.java: 910 in org.apache.ranger.services.hive.HIVERangerAuthorizerTest.testShowPrivileges()() ________________________________________________________________________________________________________ *** CID 166297: Resource leaks (RESOURCE_LEAK) /hive-agent/src/test/java/org/apache/ranger/services/hive/HIVERangerAuthorizerTest.java: 910 in org.apache.ranger.services.hive.HIVERangerAuthorizerTest.testShowPrivileges()() 904 public void testShowPrivileges() throws Exception { 905 String initialUrl = "jdbc:hive2://localhost:" + port; 906 Connection connection = DriverManager.getConnection(initialUrl, "admin", "admin"); 907 Statement statement = connection.createStatement(); 908 Assert.assertTrue(statement.execute("show grant user admin")); 909 statement.close(); >>> CID 166297: Resource leaks (RESOURCE_LEAK) >>> Variable "connection" going out of scope leaks the connection it holds open. 910 } 911 ** CID 166296: Null pointer dereferences (REVERSE_INULL) /security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java: 1172 in org.apache.ranger.biz.UserMgr.updateRoleForExternalUsers(java.util.Collection, java.util.Collection, org.apache.ranger.view.VXPortalUser)() ________________________________________________________________________________________________________ *** CID 166296: Null pointer dereferences (REVERSE_INULL) /security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java: 1172 in org.apache.ranger.biz.UserMgr.updateRoleForExternalUsers(java.util.Collection, java.util.Collection, org.apache.ranger.view.VXPortalUser)() 1166 } 1167 1168 protected VXPortalUser updateRoleForExternalUsers( 1169 Collection<String> reqRoleList, 1170 Collection<String> existingRoleList, VXPortalUser userProfileRes) { 1171 UserSessionBase session = ContextUtil.getCurrentUserSession(); >>> CID 166296: Null pointer dereferences (REVERSE_INULL) >>> Directly dereferencing "session". 1172 if ("rangerusersync".equals(session.getXXPortalUser().getLoginId()) 1173 && reqRoleList != null && !reqRoleList.isEmpty() 1174 && existingRoleList != null && !existingRoleList.isEmpty()) { 1175 if (!reqRoleList.equals(existingRoleList)) { 1176 userProfileRes.setUserRoleList(reqRoleList); 1177 userProfileRes.setUserSource(RangerCommonEnums.USER_EXTERNAL); ** CID 166295: FindBugs: Dodgy code (FB.BC_BAD_CAST_TO_ABSTRACT_COLLECTION) /security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java: 145 in org.apache.ranger.biz.UserMgr.createUser(org.apache.ranger.view.VXPortalUser, int, java.util.Collection)() ________________________________________________________________________________________________________ *** CID 166295: FindBugs: Dodgy code (FB.BC_BAD_CAST_TO_ABSTRACT_COLLECTION) /security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java: 145 in org.apache.ranger.biz.UserMgr.createUser(org.apache.ranger.view.VXPortalUser, int, java.util.Collection)() 139 } 140 141 public XXPortalUser createUser(VXPortalUser userProfile, int userStatus, 142 Collection<String> userRoleList) { 143 XXPortalUser user = mapVXPortalUserToXXPortalUser(userProfile); 144 checkAdminAccess(); >>> CID 166295: FindBugs: Dodgy code (FB.BC_BAD_CAST_TO_ABSTRACT_COLLECTION) >>> Questionable cast from Collection to abstract class java.util.List. 145 xUserMgr.checkAccessRoles((List<String>) userRoleList); 146 user = createUser(user, userStatus, userRoleList); 147 148 return user; 149 } 150 ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRZSbhom32dlDl11LWEm9nX11zsOWMf5dv3Q9Mogo-2FGua3FsLRTFft2V-2FOFC9o0P2e0-3D_d04ZgyDzSjlwpjXIuOFYDNE6R93Lal83MDClQK32PZvCSaw3NABW8yh59tWBRwyuZoho2y-2F5qpqOMUrU04ADoN0iqPz0ihOL-2FR4yPsDrErn4RwBpgzijvCPmBHQ5xUfzpkzfwmpcrpYdgPFc3ma-2B-2FUI9ePhZ7mgTHkeS2VKK7k3yZxONllFKlBP35ZTeOtUsdHupfw-2BqQQ8GIjTIvbTf7w-3D-3D To manage Coverity Scan email notifications for "bo...@apache.org", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4HK0JLY-2BbZ-2FD0yvjg-2BbWSwquqqdEYtbR9nIDW-2BM81kI8TiABM2LsH3tiPfMWf-2FvOsjZSWngS5IRVC-2FH5Pl4zyaK1OE6Dh-2BhR6pXASEFJKZLM-3D_d04ZgyDzSjlwpjXIuOFYDNE6R93Lal83MDClQK32PZvCSaw3NABW8yh59tWBRwyuDw37o4ycFCVtnOiFa6m3TN-2B8ZucWalt-2BLSsLIdbAH63r-2FK07-2Bxo4YOUatauEAfLWXhuBa2O05WgJeJrS9Ykn0GXl62iCqjM2-2BbIpQPCp48oRvCOeMR5wWjwHa6HTOY9tAlc3LEscq-2FKkOnnfhZOFQA-3D-3D