[
https://issues.apache.org/jira/browse/HADOOP-5820?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12709631#action_12709631
]
Tsz Wo (Nicholas), SZE commented on HADOOP-5820:
------------------------------------------------
{noformat}
[exec] -1 overall.
[exec]
[exec] +1 @author. The patch does not contain any @author tags.
[exec]
[exec] -1 tests included. The patch doesn't appear to include any new
or modified tests.
[exec] Please justify why no tests are needed for
this patch.
[exec]
[exec] +1 javadoc. The javadoc tool did not generate any warning
messages.
[exec]
[exec] +1 javac. The applied patch does not increase the total number
of javac compiler warnings.
[exec]
[exec] +1 findbugs. The patch does not introduce any new Findbugs
warnings.
[exec]
[exec] +1 Eclipse classpath. The patch retains Eclipse classpath
integrity.
[exec]
[exec] +1 release audit. The applied patch does not increase the
total number of release audit warnings.
{noformat}
No new tests added since we don't test web components by unit tests.
> Fix findbugs warnings for http related codes in hdfs
> ----------------------------------------------------
>
> Key: HADOOP-5820
> URL: https://issues.apache.org/jira/browse/HADOOP-5820
> Project: Hadoop Core
> Issue Type: Bug
> Components: dfs
> Reporter: Tsz Wo (Nicholas), SZE
> Assignee: Tsz Wo (Nicholas), SZE
> Fix For: 0.21.0
>
> Attachments: 5820_20090513.patch
>
>
> There are a few findbugs warnings:
> - HRS HTTP parameter directly written to HTTP header output in
> org.apache.hadoop.hdfs.server.namenode.StreamFile.doGet(HttpServletRequest,
> HttpServletResponse)
> - XSS HTTP parameter directly written to JSP output, giving reflected XSS
> vulnerability in org.apache.hadoop.hdfs.server.datanode.browseBlock_jsp
> - XSS HTTP parameter directly written to JSP output, giving reflected XSS
> vulnerability in org.apache.hadoop.hdfs.server.datanode.browseBlock_jsp
> - XSS HTTP parameter directly written to JSP output, giving reflected XSS
> vulnerability in org.apache.hadoop.hdfs.server.datanode.browseDirectory_jsp
> - XSS HTTP parameter directly written to JSP output, giving reflected XSS
> vulnerability in org.apache.hadoop.hdfs.server.datanode.tail_jsp
> - XSS HTTP parameter directly written to JSP output, giving reflected XSS
> vulnerability in org.apache.hadoop.hdfs.server.datanode.tail_jsp
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.