-
Notifications
You must be signed in to change notification settings - Fork 260
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add reference data for secrets store connectors #8396
Conversation
Signed-off-by: Mandy Chessell <mandy.e.chessell@gmail.com>
Signed-off-by: Mandy Chessell <mandy.e.chessell@gmail.com>
* | ||
* @return id, name, description, wiki page URL. | ||
*/ | ||
public ComponentDescription getConnectorComponentDescription() |
Check notice
Code scanning / CodeQL
Missing Override annotation Note
AuditLoggingComponent.getConnectorComponentDescription
* | ||
* @return Connection bean | ||
*/ | ||
protected Connection getConnectionBean() |
Check notice
Code scanning / CodeQL
Missing Override annotation Note
ConnectionProperties.getConnectionBean
if ((userId != null) && (password != null)) | ||
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty())) | ||
{ | ||
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot); |
Check failure
Code scanning / CodeQL
Log Injection High
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
if ((userId != null) && (password != null)) | ||
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty())) | ||
{ | ||
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
This
potentially sensitive information
if ((userId != null) && (password != null)) | ||
if ((secretsStoreConnectorMap != null) && (! secretsStoreConnectorMap.isEmpty())) | ||
{ | ||
log.debug("Using secrets connector to call server {} on platform {} .", this.serverName, this.serverPlatformURLRoot); |
Check failure
Code scanning / CodeQL
Log Injection High
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a [user-p
|
||
basicAuthorizationHeader = this.createHeaders(userId, password); | ||
authorizationHeader = this.createAuthorizationHeaders(userId, password); |
Check failure
Code scanning / CodeQL
User-controlled bypass of sensitive method High
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a
this condition
user-controlled value
Sensitive method may not be executed depending on a [this condit
|
||
if (integerOption != null) | ||
{ | ||
return Long.parseLong(integerOption.toString()); |
Check notice
Code scanning / CodeQL
Missing catch of NumberFormatException Note
* | ||
* @return id, name, description, wiki page URL. | ||
*/ | ||
public ComponentDescription getConnectorComponentDescription() |
Check notice
Code scanning / CodeQL
Missing Override annotation Note
AuditLoggingComponent.getConnectorComponentDescription
@@ -446,6 +451,8 @@ | |||
String connectorTypeGUID, | |||
String networkAddress, | |||
Map<String, Object> configurationProperties, | |||
String secretsStorePurpose, |
Check notice
Code scanning / CodeQL
Useless parameter Note
@@ -446,6 +451,8 @@ | |||
String connectorTypeGUID, | |||
String networkAddress, | |||
Map<String, Object> configurationProperties, | |||
String secretsStorePurpose, | |||
ConnectorProvider secretsStoreProvider, |
Check notice
Code scanning / CodeQL
Useless parameter Note
Description
This PR adds the reference data and frameworks for software servers to use the secrets stores
Related Issue(s)
None
Testing
Simple UT
Release Notes & Documentation
Not yet - next PR
Additional notes
None