Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add reference data for secrets store connectors #8396

Merged
merged 3 commits into from
Sep 25, 2024

Conversation

mandy-chessell
Copy link
Contributor

Description

This PR adds the reference data and frameworks for software servers to use the secrets stores

Related Issue(s)

None

Testing

Simple UT

Release Notes & Documentation

Not yet - next PR

Additional notes

None

Signed-off-by: Mandy Chessell <mandy.e.chessell@gmail.com>
Signed-off-by: Mandy Chessell <mandy.e.chessell@gmail.com>
@mandy-chessell mandy-chessell merged commit e2dcac8 into odpi:main Sep 25, 2024
4 checks passed
*
* @return id, name, description, wiki page URL.
*/
public ComponentDescription getConnectorComponentDescription()

Check notice

Code scanning / CodeQL

Missing Override annotation Note

This method overrides
AuditLoggingComponent.getConnectorComponentDescription
; it is advisable to add an Override annotation.
*
* @return Connection bean
*/
protected Connection getConnectionBean()

Check notice

Code scanning / CodeQL

Missing Override annotation Note

This method overrides
ConnectionProperties.getConnectionBean
; it is advisable to add an Override annotation.
if ((userId != null) && (password != null))
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty()))
{
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot);

Check failure

Code scanning / CodeQL

Log Injection High

This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
if ((userId != null) && (password != null))
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty()))
{
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot);

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
This
potentially sensitive information
is written to a log file.
if ((userId != null) && (password != null))
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty()))
{
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot);

Check failure

Code scanning / CodeQL

Log Injection High

This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a [user-p

basicAuthorizationHeader = this.createHeaders(userId, password);
authorizationHeader = this.createAuthorizationHeaders(userId, password);

Check failure

Code scanning / CodeQL

User-controlled bypass of sensitive method High

Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a
this condition
, which flows from
user-controlled value
.
Sensitive method may not be executed depending on a [this condit

if (integerOption != null)
{
return Long.parseLong(integerOption.toString());

Check notice

Code scanning / CodeQL

Missing catch of NumberFormatException Note

Potential uncaught 'java.lang.NumberFormatException'.
*
* @return id, name, description, wiki page URL.
*/
public ComponentDescription getConnectorComponentDescription()

Check notice

Code scanning / CodeQL

Missing Override annotation Note

This method overrides
AuditLoggingComponent.getConnectorComponentDescription
; it is advisable to add an Override annotation.
@@ -446,6 +451,8 @@
String connectorTypeGUID,
String networkAddress,
Map<String, Object> configurationProperties,
String secretsStorePurpose,

Check notice

Code scanning / CodeQL

Useless parameter Note

The parameter 'secretsStorePurpose' is never used.
@@ -446,6 +451,8 @@
String connectorTypeGUID,
String networkAddress,
Map<String, Object> configurationProperties,
String secretsStorePurpose,
ConnectorProvider secretsStoreProvider,

Check notice

Code scanning / CodeQL

Useless parameter Note

The parameter 'secretsStoreProvider' is never used.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant