This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ws-wss4j.git


The following commit(s) were added to refs/heads/master by this push:
     new 0f6820a  Fixing some code scanning issues
0f6820a is described below

commit 0f6820aafe275c4789afc6731791f6f4700379e9
Author: Colm O hEigeartaigh <[email protected]>
AuthorDate: Mon Oct 19 09:58:31 2020 +0100

    Fixing some code scanning issues
---
 policy/src/main/java/org/apache/wss4j/policy/SPUtils.java      |  2 +-
 .../org/apache/wss4j/dom/message/token/KerberosSecurity.java   |  2 +-
 .../org/apache/wss4j/dom/processor/SAMLTokenProcessor.java     |  2 +-
 .../org/apache/wss4j/dom/validate/UsernameTokenValidator.java  |  2 +-
 .../org/apache/wss4j/policy/stax/enforcer/PolicyEnforcer.java  | 10 +++++-----
 .../processor/input/SecurityTokenReferenceInputHandler.java    |  3 +--
 .../main/java/org/apache/wss4j/stax/setup/InboundWSSec.java    |  8 ++++----
 7 files changed, 14 insertions(+), 15 deletions(-)

diff --git a/policy/src/main/java/org/apache/wss4j/policy/SPUtils.java 
b/policy/src/main/java/org/apache/wss4j/policy/SPUtils.java
index 561da15..878bdb0 100644
--- a/policy/src/main/java/org/apache/wss4j/policy/SPUtils.java
+++ b/policy/src/main/java/org/apache/wss4j/policy/SPUtils.java
@@ -159,7 +159,7 @@ public final class SPUtils {
 
     public static String getAttribute(Element element, QName attName) {
         Attr attr;
-        if (attName.getNamespaceURI() == null || 
"".equals(attName.getNamespaceURI())) {
+        if (attName.getNamespaceURI() == null || 
attName.getNamespaceURI().length() == 0) {
             attr = element.getAttributeNode(attName.getLocalPart());
         } else {
             attr = element.getAttributeNodeNS(attName.getNamespaceURI(), 
attName.getLocalPart());
diff --git 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/message/token/KerberosSecurity.java
 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/message/token/KerberosSecurity.java
index 6bbc1ed..875a92c 100644
--- 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/message/token/KerberosSecurity.java
+++ 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/message/token/KerberosSecurity.java
@@ -260,7 +260,7 @@ public class KerberosSecurity extends BinarySecurity {
         }
         LOG.debug("Successfully retrieved a service ticket");
 
-        if ("".equals(getValueType())) {
+        if (getValueType().length() == 0) {
             setValueType(WSConstants.WSS_GSS_KRB_V5_AP_REQ);
         }
     }
diff --git 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/processor/SAMLTokenProcessor.java
 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/processor/SAMLTokenProcessor.java
index b27e889..5092bfd 100644
--- 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/processor/SAMLTokenProcessor.java
+++ 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/processor/SAMLTokenProcessor.java
@@ -256,7 +256,7 @@ public class SAMLTokenProcessor implements Processor {
         for (Object refObject : xmlSignature.getSignedInfo().getReferences()) {
             Reference reference = (Reference)refObject;
 
-            if ("".equals(reference.getURI())
+            if (reference.getURI() == null || reference.getURI().length() == 0
                 || reference.getURI().equals(samlAssertion.getId())
                 || reference.getURI().equals("#" + samlAssertion.getId())) {
                 WSDataRef ref = new WSDataRef();
diff --git 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/validate/UsernameTokenValidator.java
 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/validate/UsernameTokenValidator.java
index a3a0d3c..90a14a2 100644
--- 
a/ws-security-dom/src/main/java/org/apache/wss4j/dom/validate/UsernameTokenValidator.java
+++ 
b/ws-security-dom/src/main/java/org/apache/wss4j/dom/validate/UsernameTokenValidator.java
@@ -88,7 +88,7 @@ public class UsernameTokenValidator implements Validator {
         if (usernameToken.isHashed()) {
             verifyDigestPassword(usernameToken, data);
         } else if (WSConstants.PASSWORD_TEXT.equals(pwType)
-            || password != null && (pwType == null || 
"".equals(pwType.trim()))) {
+            || password != null && (pwType == null || pwType.trim().length() 
== 0)) {
             verifyPlaintextPassword(usernameToken, data);
         } else if (password != null) {
             if (!handleCustomPasswordTypes) {
diff --git 
a/ws-security-policy-stax/src/main/java/org/apache/wss4j/policy/stax/enforcer/PolicyEnforcer.java
 
b/ws-security-policy-stax/src/main/java/org/apache/wss4j/policy/stax/enforcer/PolicyEnforcer.java
index 45d1ff1..ea266fc 100644
--- 
a/ws-security-policy-stax/src/main/java/org/apache/wss4j/policy/stax/enforcer/PolicyEnforcer.java
+++ 
b/ws-security-policy-stax/src/main/java/org/apache/wss4j/policy/stax/enforcer/PolicyEnforcer.java
@@ -188,12 +188,12 @@ public class PolicyEnforcer implements 
SecurityEventListener {
 
         while (operationPolicyIterator.hasNext()) {
             OperationPolicy operationPolicy = operationPolicyIterator.next();
-            if (operationPolicy.getOperationName() != null) {
-                if 
(soapOperationName.equals(operationPolicy.getOperationName())) {
+            QName operationName = operationPolicy.getOperationName();
+            if (operationName != null) {
+                if (soapOperationName.equals(operationName)) {
                     return operationPolicy;
-                } else if 
("".equals(operationPolicy.getOperationName().getNamespaceURI())
-                    && soapOperationName.getLocalPart().equals(
-                        operationPolicy.getOperationName().getLocalPart())) {
+                } else if ((operationName.getNamespaceURI() == null || 
operationName.getNamespaceURI().length() == 0)
+                    && 
soapOperationName.getLocalPart().equals(operationName.getLocalPart())) {
                     noNamespaceOperation = operationPolicy;
                 }
             }
diff --git 
a/ws-security-stax/src/main/java/org/apache/wss4j/stax/impl/processor/input/SecurityTokenReferenceInputHandler.java
 
b/ws-security-stax/src/main/java/org/apache/wss4j/stax/impl/processor/input/SecurityTokenReferenceInputHandler.java
index 1e8b61c..aaeb891 100644
--- 
a/ws-security-stax/src/main/java/org/apache/wss4j/stax/impl/processor/input/SecurityTokenReferenceInputHandler.java
+++ 
b/ws-security-stax/src/main/java/org/apache/wss4j/stax/impl/processor/input/SecurityTokenReferenceInputHandler.java
@@ -162,9 +162,8 @@ public class SecurityTokenReferenceInputHandler extends 
AbstractInputSecurityHea
 
                                 SecurityTokenProvider<? extends 
InboundSecurityToken> securityTokenProvider =
                                         
inputProcessorChain.getSecurityContext().getSecurityTokenProvider(attributeValue);
-                                InboundSecurityToken securityToken = 
securityTokenProvider.getSecurityToken();
                                 return this.securityToken = new 
SecurityTokenReferenceImpl(
-                                        securityToken,
+                                        
securityTokenProvider.getSecurityToken(),
                                         xmlSecEventList,
                                         (WSInboundSecurityContext) 
inputProcessorChain.getSecurityContext(),
                                         securityTokenReferenceId,
diff --git 
a/ws-security-stax/src/main/java/org/apache/wss4j/stax/setup/InboundWSSec.java 
b/ws-security-stax/src/main/java/org/apache/wss4j/stax/setup/InboundWSSec.java
index f62e382..bdb86eb 100644
--- 
a/ws-security-stax/src/main/java/org/apache/wss4j/stax/setup/InboundWSSec.java
+++ 
b/ws-security-stax/src/main/java/org/apache/wss4j/stax/setup/InboundWSSec.java
@@ -105,7 +105,7 @@ public class InboundWSSec {
      * @param xmlStreamReader The original XMLStreamReader
      * @return A new XMLStreamReader which does transparently the security 
processing.
      * @throws XMLStreamException  thrown when a streaming error occurs
-     * @throws XMLSecurityException
+     * @throws WSSecurityException
      */
     public XMLStreamReader processInMessage(
             XMLStreamReader xmlStreamReader) throws XMLStreamException, 
WSSecurityException {
@@ -127,7 +127,7 @@ public class InboundWSSec {
      * @param xmlStreamReader       The original XMLStreamReader
      * @return A new XMLStreamReader which does transparently the security 
processing.
      * @throws XMLStreamException  thrown when a streaming error occurs
-     * @throws XMLSecurityException
+     * @throws WSSecurityException
      */
     public XMLStreamReader processInMessage(
             XMLStreamReader xmlStreamReader, List<SecurityEvent> 
requestSecurityEvents
@@ -151,7 +151,7 @@ public class InboundWSSec {
      * @param securityEventListener A SecurityEventListener to receive 
security-relevant events.
      * @return A new XMLStreamReader which does transparently the security 
processing.
      * @throws XMLStreamException  thrown when a streaming error occurs
-     * @throws XMLSecurityException
+     * @throws WSSecurityException
      */
     public XMLStreamReader processInMessage(
             XMLStreamReader xmlStreamReader, List<SecurityEvent> 
requestSecurityEvents,
@@ -175,7 +175,7 @@ public class InboundWSSec {
      * @param securityEventListeners A list of SecurityEventListeners to 
receive security-relevant events.
      * @return A new XMLStreamReader which does transparently the security 
processing.
      * @throws XMLStreamException  thrown when a streaming error occurs
-     * @throws XMLSecurityException
+     * @throws WSSecurityException
      */
     public XMLStreamReader processInMessage(
             XMLStreamReader xmlStreamReader, List<SecurityEvent> 
requestSecurityEvents,

Reply via email to