code cleanup in the security admin module - fix string comparisons

Change-Id: Ic76336bae0a6b7c05fe1820a1ba05f345b4a66db

Signed-off-by: Colm O hEigeartaigh <cohei...@apache.org>


Project: http://git-wip-us.apache.org/repos/asf/ranger/repo
Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/1d18e76d
Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/1d18e76d
Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/1d18e76d

Branch: refs/heads/master
Commit: 1d18e76dacc9326419855c7881ef79cf60f19a61
Parents: cdde1b6
Author: Zsombor Gegesy <gzsom...@gmail.com>
Authored: Sun Apr 2 18:25:15 2017 +0200
Committer: Colm O hEigeartaigh <cohei...@apache.org>
Committed: Wed Apr 5 17:36:20 2017 +0100

----------------------------------------------------------------------
 .../java/org/apache/ranger/biz/AssetMgr.java    |  16 +--
 .../java/org/apache/ranger/biz/KmsKeyMgr.java   |   2 +-
 .../org/apache/ranger/biz/RangerBizUtil.java    |  34 +++---
 .../org/apache/ranger/biz/ServiceDBStore.java   |   6 +-
 .../java/org/apache/ranger/biz/ServiceMgr.java  |  10 +-
 .../java/org/apache/ranger/biz/SessionMgr.java  |   2 +-
 .../java/org/apache/ranger/biz/XAuditMgr.java   |   4 +-
 .../org/apache/ranger/common/AppConstants.java  | 102 +++++++++---------
 .../apache/ranger/common/PropertiesUtil.java    |  16 +--
 .../apache/ranger/common/RangerSearchUtil.java  |  10 +-
 .../org/apache/ranger/common/SearchGroup.java   |   4 +-
 .../org/apache/ranger/common/SearchUtil.java    |  16 ++-
 .../org/apache/ranger/common/ServiceUtil.java   |  38 +++----
 .../org/apache/ranger/common/StringUtil.java    |   2 +-
 .../org/apache/ranger/db/RangerDaoManager.java  |   2 +-
 .../apache/ranger/db/RangerDaoManagerBase.java  | 108 +++++++++----------
 .../apache/ranger/entity/XXAccessAuditBase.java |   4 +-
 .../java/org/apache/ranger/entity/XXAsset.java  |   4 +-
 .../org/apache/ranger/entity/XXAuditMap.java    |   2 +-
 .../org/apache/ranger/entity/XXAuthSession.java |   8 +-
 .../java/org/apache/ranger/entity/XXGroup.java  |   4 +-
 .../org/apache/ranger/entity/XXPermMap.java     |   6 +-
 .../org/apache/ranger/entity/XXPortalUser.java  |   4 +-
 .../apache/ranger/entity/XXPortalUserRole.java  |   2 +-
 .../org/apache/ranger/entity/XXResource.java    |  14 +--
 .../java/org/apache/ranger/entity/XXTrxLog.java |   2 +-
 .../java/org/apache/ranger/entity/XXUser.java   |   2 +-
 .../patch/cliutil/DbToSolrMigrationUtil.java    |   8 +-
 .../apache/ranger/patch/cliutil/MetricUtil.java |   4 +-
 .../org/apache/ranger/rest/ServiceREST.java     |  10 +-
 .../handler/RangerAuthenticationProvider.java   |   8 +-
 .../RangerAuthFailureHandler.java               |   6 +-
 .../RangerAuthSuccessHandler.java               |   2 +-
 .../RangerAuthenticationEntryPoint.java         |   2 +-
 .../filter/RangerKRBAuthenticationFilter.java   |   8 +-
 .../security/web/filter/RangerKrbFilter.java    |   2 +-
 .../filter/RangerSSOAuthenticationFilter.java   |   2 +-
 .../service/AbstractBaseResourceService.java    |  20 ++--
 .../ranger/service/RangerPolicyService.java     |  66 ++++++------
 .../ranger/service/RangerServiceService.java    |   6 +-
 .../apache/ranger/service/XAssetService.java    |  17 ++-
 .../apache/ranger/service/XAuditMapService.java |   8 +-
 .../apache/ranger/service/XGroupService.java    |   8 +-
 .../ranger/service/XGroupUserService.java       |   6 +-
 .../apache/ranger/service/XPermMapService.java  |  20 ++--
 .../ranger/service/XPortalUserService.java      |  10 +-
 .../apache/ranger/service/XResourceService.java |  16 +--
 .../org/apache/ranger/service/XUserService.java |  22 ++--
 .../service/filter/RangerRESTAPIFilter.java     |   6 +-
 .../java/org/apache/ranger/solr/SolrMgr.java    |  10 +-
 .../java/org/apache/ranger/solr/SolrUtil.java   |   2 +-
 .../java/org/apache/ranger/util/RestUtil.java   |   2 +-
 52 files changed, 342 insertions(+), 353 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java 
b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
index 9244cd6..01062de 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
@@ -149,7 +149,7 @@ public class AssetMgr extends AssetMgrBase {
                File file = null;
                try {
                        if (fileType != null) {
-                               if (fileType.equalsIgnoreCase("json")) {
+                               if ("json".equalsIgnoreCase(fileType)) {
                                        file = 
jsonUtil.writeJsonToFile(xResource,
                                                        xResource.getName());
                                } else {
@@ -211,7 +211,7 @@ public class AssetMgr extends AssetMgrBase {
 
                policyExportAudit.setClientIP(ipAddress);
 
-               if (epoch != null && !epoch.trim().isEmpty() && 
!epoch.equalsIgnoreCase("null")) {
+               if (epoch != null && !epoch.trim().isEmpty() && 
!"null".equalsIgnoreCase(epoch)) {
                        
policyExportAudit.setRequestedEpoch(Long.parseLong(epoch));
                } else {
                        policyExportAudit.setRequestedEpoch(0L);
@@ -253,7 +253,7 @@ public class AssetMgr extends AssetMgrBase {
                        try {
                                LdapName ln = new LdapName(dn);
                                for (Rdn rdn : ln.getRdns()) {
-                                       if 
(rdn.getType().equalsIgnoreCase("CN")) {
+                                       if 
("CN".equalsIgnoreCase(rdn.getType())) {
                                                commonName = rdn.getValue() + 
"";
                                                break;
                                        }
@@ -976,10 +976,10 @@ public class AssetMgr extends AssetMgrBase {
         }
         if (searchCriteria.getSortType() == null) {
             searchCriteria.setSortType("desc");
-        } else if (!searchCriteria.getSortType().equalsIgnoreCase("asc") && 
!searchCriteria.getSortType().equalsIgnoreCase("desc")) {
+        } else if (!"asc".equalsIgnoreCase(searchCriteria.getSortType()) && 
!"desc".equalsIgnoreCase(searchCriteria.getSortType())) {
             searchCriteria.setSortType("desc");
         }
-        if 
(xaBizUtil.getAuditDBType().equalsIgnoreCase(RangerBizUtil.AUDIT_STORE_SOLR)) {
+        if 
(RangerBizUtil.AUDIT_STORE_SOLR.equalsIgnoreCase(xaBizUtil.getAuditDBType())) {
             return solrAccessAuditsService.searchXAccessAudits(searchCriteria);
         } else {
             return xAccessAuditService.searchXAccessAudits(searchCriteria);
@@ -1007,14 +1007,14 @@ public class AssetMgr extends AssetMgrBase {
                for (VXTrxLog xTrxLog : xTrxLogList) {
                        VXTrxLog vXTrxLog = new VXTrxLog();
                        vXTrxLog = xTrxLog;
-                       if(vXTrxLog.getPreviousValue()==null || 
vXTrxLog.getPreviousValue().equalsIgnoreCase("null")){
+                       if(vXTrxLog.getPreviousValue()==null || 
"null".equalsIgnoreCase(vXTrxLog.getPreviousValue())){
                                vXTrxLog.setPreviousValue("");
                        }
-                       if(vXTrxLog.getAttributeName()!=null && 
vXTrxLog.getAttributeName().equalsIgnoreCase("Password")){
+                       if(vXTrxLog.getAttributeName()!=null && 
"Password".equalsIgnoreCase(vXTrxLog.getAttributeName())){
                                vXTrxLog.setPreviousValue("*********");
                                vXTrxLog.setNewValue("***********");
                        }
-                       if(vXTrxLog.getAttributeName()!=null && 
vXTrxLog.getAttributeName().equalsIgnoreCase("Connection Configurations")){
+                       if(vXTrxLog.getAttributeName()!=null && "Connection 
Configurations".equalsIgnoreCase(vXTrxLog.getAttributeName())){
                                if(vXTrxLog.getPreviousValue()!=null && 
vXTrxLog.getPreviousValue().contains("password")){
                                        String 
tempPreviousStr=vXTrxLog.getPreviousValue();                                    
 
                                        String 
tempPreviousArr[]=vXTrxLog.getPreviousValue().split(",");                       
                 

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/KmsKeyMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/KmsKeyMgr.java 
b/security-admin/src/main/java/org/apache/ranger/biz/KmsKeyMgr.java
index 924aaa9..03bcb60 100755
--- a/security-admin/src/main/java/org/apache/ranger/biz/KmsKeyMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/KmsKeyMgr.java
@@ -587,7 +587,7 @@ public class KmsKeyMgr {
        }
 
        private boolean checkKerberos() throws Exception {
-               if(PropertiesUtil.getProperty(RANGER_AUTH_TYPE, 
"simple").equalsIgnoreCase(KERBEROS_TYPE)){
+               
if(KERBEROS_TYPE.equalsIgnoreCase(PropertiesUtil.getProperty(RANGER_AUTH_TYPE, 
"simple"))){
                        return true;
                }else{
                        return false;

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java 
b/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
index cceb380..efc308a 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
@@ -172,12 +172,12 @@ public class RangerBizUtil {
         * @return
         */
        public int getMimeTypeInt(String contentType) {
-               if (contentType.equalsIgnoreCase("JPEG")
-                               || contentType.equalsIgnoreCase("JPG")
+               if ("JPEG".equalsIgnoreCase(contentType)
+                               || "JPG".equalsIgnoreCase(contentType)
                                || contentType.endsWith("jpg") || 
contentType.endsWith("jpeg")) {
                        return RangerConstants.MIME_JPEG;
                }
-               if (contentType.equalsIgnoreCase("PNG") || 
contentType.endsWith("png")) {
+               if ("PNG".equalsIgnoreCase(contentType) || 
contentType.endsWith("png")) {
                        return RangerConstants.MIME_PNG;
                }
                return RangerConstants.MIME_UNKNOWN;
@@ -880,11 +880,11 @@ public class RangerBizUtil {
                        // if permission is enabled then load 
Topologies,services list from
                        // resource
                        if (hasPermission) {
-                               String[] xTopologies = 
(xResource.getTopologies() == null || xResource
-                                               
.getTopologies().equalsIgnoreCase("")) ? null
+                               String[] xTopologies = 
(xResource.getTopologies() == null || "".equalsIgnoreCase(xResource
+                                               .getTopologies())) ? null
                                                : 
stringUtil.split(xResource.getTopologies(), ",");
-                               String[] xServices = (xResource.getServices() 
== null || xResource
-                                               
.getServices().equalsIgnoreCase("")) ? null
+                               String[] xServices = (xResource.getServices() 
== null || "".equalsIgnoreCase(xResource
+                                               .getServices())) ? null
                                                : 
stringUtil.split(xResource.getServices(), ",");
 
                                boolean matchFound = false;
@@ -967,8 +967,8 @@ public class RangerBizUtil {
                        // if permission is enabled then load 
Topologies,services list from
                        // resource
                        if (hasPermission) {
-                               String[] xTopologies = 
(xResource.getTopologies() == null || xResource
-                                               
.getTopologies().equalsIgnoreCase("")) ? null
+                               String[] xTopologies = 
(xResource.getTopologies() == null || "".equalsIgnoreCase(xResource
+                                               .getTopologies())) ? null
                                                : 
stringUtil.split(xResource.getTopologies(), ",");
                                /*
                                 * String[] xServices = 
(xResource.getServices() == null ||
@@ -1453,9 +1453,9 @@ public class RangerBizUtil {
                                return false;
                        }
 
-                       if (isKeyAdmin && 
implClass.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+                       if (isKeyAdmin && 
EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClass)) {
                                return true;
-                       } else if ((isSysAdmin || isUser) && 
!implClass.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+                       } else if ((isSysAdmin || isUser) && 
!EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClass)) {
                                return true;
                        }
                }
@@ -1475,9 +1475,9 @@ public class RangerBizUtil {
                                return false;
                        }
 
-                       if (isKeyAdmin && 
implClass.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+                       if (isKeyAdmin && 
EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClass)) {
                                return true;
-                       } else if (isUser && 
!implClass.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+                       } else if (isUser && 
!EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClass)) {
                                return true;
                        }
                        // else if ((isSysAdmin || isUser) && 
!implClass.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
@@ -1506,7 +1506,7 @@ public class RangerBizUtil {
        public void hasKMSPermissions(String objType, String implClassName) {
                UserSessionBase session = ContextUtil.getCurrentUserSession();
 
-               if (session.isKeyAdmin() && 
!implClassName.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+               if (session.isKeyAdmin() && 
!EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClassName)) {
                        throw restErrorUtil.createRESTException("KeyAdmin can 
create/update/delete only KMS " + objType,
                                        MessageEnums.OPER_NO_PERMISSION);
                }
@@ -1514,7 +1514,7 @@ public class RangerBizUtil {
                // TODO: As of now we are allowing SYS_ADMIN to 
create/update/read/delete all the
                // services including KMS
 
-               if (objType.equalsIgnoreCase("Service-Def") && 
session.isUserAdmin() && 
implClassName.equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME)) {
+               if ("Service-Def".equalsIgnoreCase(objType) && 
session.isUserAdmin() && 
EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(implClassName)) {
                        throw restErrorUtil.createRESTException("System Admin 
cannot create/update/delete KMS " + objType,
                                        MessageEnums.OPER_NO_PERMISSION);
                }
@@ -1557,7 +1557,7 @@ public class RangerBizUtil {
                        String[] userList = userNames.split(",");
                        if(userList != null){
                                for (String u : userList) {
-                                       if (u.equals("*") || (user != null && 
u.equalsIgnoreCase(user))) {
+                                       if ("*".equals(u) || (user != null && 
u.equalsIgnoreCase(user))) {
                                                return true;
                                        }
                                }
@@ -1575,7 +1575,7 @@ public class RangerBizUtil {
                        String[] userList = userNames.split(",");
                        if (userList != null) {
                                for (String u : userList) {
-                                       if (u.equals("*") || (userName != null 
&& u.equalsIgnoreCase(userName))) {
+                                       if ("*".equals(u) || (userName != null 
&& u.equalsIgnoreCase(userName))) {
                                                return true;
                                        }
                                }

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
b/security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java
index b882488..986c37e 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java
@@ -1508,7 +1508,7 @@ public class ServiceDBStore extends AbstractServiceStore {
                if (StringUtils.isNotBlank(newTagServiceName)) {
                        RangerService tmp = getServiceByName(newTagServiceName);
 
-                       if (tmp == null || 
!tmp.getType().equals(EmbeddedServiceDefsUtil.EMBEDDED_SERVICEDEF_TAG_NAME)) {
+                       if (tmp == null || 
!EmbeddedServiceDefsUtil.EMBEDDED_SERVICEDEF_TAG_NAME.equals(tmp.getType())) {
                                if (LOG.isDebugEnabled()) {
                                        
LOG.debug("ServiceDBStore.updateService() - " + newTagServiceName + " does not 
refer to a valid tag service.(" + service + ")");
                                }
@@ -1879,7 +1879,7 @@ public class ServiceDBStore extends AbstractServiceStore {
                updatePolicySignature(policy);
 
                boolean isTagVersionUpdateNeeded = false;
-               if 
(service.getType().equals(EmbeddedServiceDefsUtil.EMBEDDED_SERVICEDEF_TAG_NAME))
 {
+               if 
(EmbeddedServiceDefsUtil.EMBEDDED_SERVICEDEF_TAG_NAME.equals(service.getType()))
 {
                        isTagVersionUpdateNeeded = existing.getIsEnabled() ? 
!policy.getIsEnabled() : policy.getIsEnabled();
                        isTagVersionUpdateNeeded = isTagVersionUpdateNeeded || 
!StringUtils.equals(existing.getResourceSignature(), 
policy.getResourceSignature());
                }
@@ -3783,7 +3783,7 @@ public class ServiceDBStore extends AbstractServiceStore {
                                                        
rangerService.getConfigs().put(ServiceREST.Allowed_User_List_For_Download, 
serviceUser);
                                                        chkServiceUpdate = true;
                                }
-                               
if((!rangerService.getConfigs().containsKey(ServiceREST.Allowed_User_List_For_Grant_Revoke))
 && (rangerService.getType().equalsIgnoreCase("hbase") || 
rangerService.getType().equalsIgnoreCase("hive"))){
+                               
if((!rangerService.getConfigs().containsKey(ServiceREST.Allowed_User_List_For_Grant_Revoke))
 && ("hbase".equalsIgnoreCase(rangerService.getType()) || 
"hive".equalsIgnoreCase(rangerService.getType()))){
                                                        
rangerService.getConfigs().put(ServiceREST.Allowed_User_List_For_Grant_Revoke, 
serviceUser);
                                                        chkServiceUpdate = true;
                                }

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/ServiceMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/ServiceMgr.java 
b/security-admin/src/main/java/org/apache/ranger/biz/ServiceMgr.java
index f2b8f99..722a566 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/ServiceMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/ServiceMgr.java
@@ -90,7 +90,7 @@ public class ServiceMgr {
                String rangerPrincipal = 
SecureClientLogin.getPrincipal(PropertiesUtil.getProperty(ADMIN_USER_PRINCIPAL),
 PropertiesUtil.getProperty(HOST_NAME));
                String rangerkeytab = 
PropertiesUtil.getProperty(ADMIN_USER_KEYTAB);
                
-               if(!StringUtils.isEmpty(authType) && 
authType.trim().equalsIgnoreCase(KERBEROS_TYPE) && 
SecureClientLogin.isKerberosCredentialExists(lookupPrincipal, lookupKeytab)){
+               if(!StringUtils.isEmpty(authType) && 
KERBEROS_TYPE.equalsIgnoreCase(authType.trim()) && 
SecureClientLogin.isKerberosCredentialExists(lookupPrincipal, lookupKeytab)){
                        if(service != null && service.getConfigs() != null){
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_LOOKUP_PRINCIPAL, 
lookupPrincipal);
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_LOOKUP_KEYTAB, lookupKeytab);
@@ -98,7 +98,7 @@ public class ServiceMgr {
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_AUTH_TYPE, authType);        
                        
                        }
                }
-               if(!StringUtils.isEmpty(authType) && 
authType.trim().equalsIgnoreCase(KERBEROS_TYPE) && 
SecureClientLogin.isKerberosCredentialExists(rangerPrincipal, rangerkeytab)){
+               if(!StringUtils.isEmpty(authType) && 
KERBEROS_TYPE.equalsIgnoreCase(authType.trim()) && 
SecureClientLogin.isKerberosCredentialExists(rangerPrincipal, rangerkeytab)){
                        if(service != null && service.getConfigs() != null){
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_PRINCIPAL, rangerPrincipal);
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_KEYTAB, rangerkeytab);
@@ -143,7 +143,7 @@ public class ServiceMgr {
                String rangerPrincipal = 
SecureClientLogin.getPrincipal(PropertiesUtil.getProperty(ADMIN_USER_PRINCIPAL),
 PropertiesUtil.getProperty(HOST_NAME));
                String rangerkeytab = 
PropertiesUtil.getProperty(ADMIN_USER_KEYTAB);
                
-               if(!StringUtils.isEmpty(authType) && 
authType.trim().equalsIgnoreCase(KERBEROS_TYPE) && 
SecureClientLogin.isKerberosCredentialExists(lookupPrincipal, lookupKeytab)){
+               if(!StringUtils.isEmpty(authType) && 
KERBEROS_TYPE.equalsIgnoreCase(authType.trim()) && 
SecureClientLogin.isKerberosCredentialExists(lookupPrincipal, lookupKeytab)){
                        if(service != null && service.getConfigs() != null){
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_LOOKUP_PRINCIPAL, 
lookupPrincipal);
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_LOOKUP_KEYTAB, lookupKeytab);
@@ -151,7 +151,7 @@ public class ServiceMgr {
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_AUTH_TYPE, authType);
                        }
                }
-               if(!StringUtils.isEmpty(authType) && 
authType.trim().equalsIgnoreCase(KERBEROS_TYPE) && 
SecureClientLogin.isKerberosCredentialExists(rangerPrincipal, rangerkeytab)){
+               if(!StringUtils.isEmpty(authType) && 
KERBEROS_TYPE.equalsIgnoreCase(authType.trim()) && 
SecureClientLogin.isKerberosCredentialExists(rangerPrincipal, rangerkeytab)){
                        if(service != null && service.getConfigs() != null){
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_PRINCIPAL, rangerPrincipal);
                                
service.getConfigs().put(HadoopConfigHolder.RANGER_KEYTAB, rangerkeytab);
@@ -343,7 +343,7 @@ public class ServiceMgr {
 
                URL pluginJarPath = 
getClass().getClassLoader().getResource(dirPath);
 
-               if(pluginJarPath != null && 
pluginJarPath.getProtocol().equals("file")) {
+               if(pluginJarPath != null && 
"file".equals(pluginJarPath.getProtocol())) {
                        try {
                                File[] dirFiles = new 
File(pluginJarPath.toURI()).listFiles();
 

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java 
b/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
index 0122e6b..9eb8f1f 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
@@ -267,7 +267,7 @@ public class SessionMgr {
                } else if 
(strRoleList.contains(RangerConstants.ROLE_KEY_ADMIN)) {
                        userSession.setKeyAdmin(true);
                        userSession.setUserAdmin(false);
-               } else if (strRoleList.size() == 1 && 
strRoleList.get(0).equals(RangerConstants.ROLE_USER)) {
+               } else if (strRoleList.size() == 1 && 
RangerConstants.ROLE_USER.equals(strRoleList.get(0))) {
                        userSession.setKeyAdmin(false);
                        userSession.setUserAdmin(false);
                }

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgr.java 
b/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgr.java
index 3542da2..c2fac0b 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgr.java
@@ -105,7 +105,7 @@ public class XAuditMgr extends XAuditMgrBase {
 
        @Override
        public VXAccessAuditList searchXAccessAudits(SearchCriteria 
searchCriteria) {
-               if (rangerBizUtil.getAuditDBType().equalsIgnoreCase("solr")) {
+               if ("solr".equalsIgnoreCase(rangerBizUtil.getAuditDBType())) {
                        return 
solrAccessAuditsService.searchXAccessAudits(searchCriteria);
                } else {
                        return super.searchXAccessAudits(searchCriteria);
@@ -114,7 +114,7 @@ public class XAuditMgr extends XAuditMgrBase {
 
        @Override
        public VXLong getXAccessAuditSearchCount(SearchCriteria searchCriteria) 
{
-               if (rangerBizUtil.getAuditDBType().equalsIgnoreCase("solr")) {
+               if ("solr".equalsIgnoreCase(rangerBizUtil.getAuditDBType())) {
                        return 
solrAccessAuditsService.getXAccessAuditSearchCount(searchCriteria);
                } else {
                        return super.getXAccessAuditSearchCount(searchCriteria);

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java 
b/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
index 39d28a1..4a02e26 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
@@ -975,22 +975,22 @@ public class AppConstants extends RangerCommonEnums {
                if (label == null) {
                        return 0;
                }
-               if (label.equalsIgnoreCase("Unknown")) {
+               if ("Unknown".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_UNKNOWN; // ASSET_UNKNOWN
                }
-               if (label.equalsIgnoreCase("HDFS")) {
+               if ("HDFS".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_HDFS; // ASSET_HDFS
                }
-               if (label.equalsIgnoreCase("HBase")) {
+               if ("HBase".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_HBASE; // ASSET_HBASE
                }
-               if (label.equalsIgnoreCase("Hive")) {
+               if ("Hive".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_HIVE; // ASSET_HIVE
                }
-               if (label.equalsIgnoreCase("Knox")) {
+               if ("Knox".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_KNOX; // ASSET_KNOX
                }
-               if (label.equalsIgnoreCase("Storm")) {
+               if ("Storm".equalsIgnoreCase(label)) {
                        return AppConstants.ASSET_STORM; // ASSET_STORM
                }
                return 0;
@@ -1018,37 +1018,37 @@ public class AppConstants extends RangerCommonEnums {
                if (label == null) {
                        return 0;
                }
-               if (label.equalsIgnoreCase("Unknown")) {
+               if ("Unknown".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_UNKNOWN; // 
RESOURCE_UNKNOWN
                }
-               if (label.equalsIgnoreCase("Path")) {
+               if ("Path".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_PATH; // RESOURCE_PATH
                }
-               if (label.equalsIgnoreCase("Database")) {
+               if ("Database".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_DB; // RESOURCE_DB
                }
-               if (label.equalsIgnoreCase("Table")) {
+               if ("Table".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_TABLE; // RESOURCE_TABLE
                }
-               if (label.equalsIgnoreCase("Column Family")) {
+               if ("Column Family".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_COL_FAM; // 
RESOURCE_COL_FAM
                }
-               if (label.equalsIgnoreCase("Column")) {
+               if ("Column".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_COLUMN; // RESOURCE_COLUMN
                }
-               if (label.equalsIgnoreCase("VIEW")) {
+               if ("VIEW".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_VIEW; // RESOURCE_VIEW
                }
-               if (label.equalsIgnoreCase("UDF")) {
+               if ("UDF".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_UDF; // RESOURCE_UDF
                }
-               if (label.equalsIgnoreCase("View Column")) {
+               if ("View Column".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_VIEW_COL; // 
RESOURCE_VIEW_COL
                }
-               if (label.equalsIgnoreCase("Topology")) {
+               if ("Topology".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_TOPOLOGY; // 
RESOURCE_TOPOLOGY
                }
-               if (label.equalsIgnoreCase("Service")) {
+               if ("Service".equalsIgnoreCase(label)) {
                        return AppConstants.RESOURCE_SERVICE_NAME; // 
RESOURCE_SERVICE_NAME
                }
                return 0;
@@ -1058,100 +1058,100 @@ public class AppConstants extends RangerCommonEnums {
                if (label == null) {
                        return 0;
                }
-               if (label.equalsIgnoreCase("Unknown")) {
+               if ("Unknown".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_UNKNOWN; // 
XA_PERM_TYPE_UNKNOWN
                }
-               if (label.equalsIgnoreCase("Reset")) {
+               if ("Reset".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_RESET; // 
XA_PERM_TYPE_RESET
                }
-               if (label.equalsIgnoreCase("Read")) {
+               if ("Read".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_READ; // 
XA_PERM_TYPE_READ
                }
-               if (label.equalsIgnoreCase("Write")) {
+               if ("Write".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_WRITE; // 
XA_PERM_TYPE_WRITE
                }
-               if (label.equalsIgnoreCase("Create")) {
+               if ("Create".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_CREATE; // 
XA_PERM_TYPE_CREATE
                }
-               if (label.equalsIgnoreCase("Delete")) {
+               if ("Delete".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_DELETE; // 
XA_PERM_TYPE_DELETE
                }
-               if (label.equalsIgnoreCase("Admin")) {
+               if ("Admin".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_ADMIN; // 
XA_PERM_TYPE_ADMIN
                }
-               if (label.equalsIgnoreCase("Obfuscate")) {
+               if ("Obfuscate".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_OBFUSCATE; // 
XA_PERM_TYPE_OBFUSCATE
                }
-               if (label.equalsIgnoreCase("Mask")) {
+               if ("Mask".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_MASK; // 
XA_PERM_TYPE_MASK
                }
-               if (label.equalsIgnoreCase("Execute")) {
+               if ("Execute".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_EXECUTE; // 
XA_PERM_TYPE_EXECUTE
                }
-               if (label.equalsIgnoreCase("Select")) {
+               if ("Select".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_SELECT; // 
XA_PERM_TYPE_SELECT
                }
-               if (label.equalsIgnoreCase("Update")) {
+               if ("Update".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_UPDATE; // 
XA_PERM_TYPE_UPDATE
                }
-               if (label.equalsIgnoreCase("Drop")) {
+               if ("Drop".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_DROP; // 
XA_PERM_TYPE_DROP
                }
-               if (label.equalsIgnoreCase("Alter")) {
+               if ("Alter".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_ALTER; // 
XA_PERM_TYPE_ALTER
                }
-               if (label.equalsIgnoreCase("Index")) {
+               if ("Index".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_INDEX; // 
XA_PERM_TYPE_INDEX
                }
-               if (label.equalsIgnoreCase("Lock")) {
+               if ("Lock".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_LOCK; // 
XA_PERM_TYPE_LOCK
                }
-               if (label.equalsIgnoreCase("All")) {
+               if ("All".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_ALL; // 
XA_PERM_TYPE_ALL
                }
-               if(label.equalsIgnoreCase("Allow")) {
+               if("Allow".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_ALLOW; 
//XA_PERM_TYPE_ALLOW
                }
-               if(label.equalsIgnoreCase("submitTopology")) {
+               if("submitTopology".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_SUBMIT_TOPOLOGY; 
//XA_PERM_TYPE_SUBMIT_TOPOLOGY
                }
-               if(label.equalsIgnoreCase("fileUpload")) {
+               if("fileUpload".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_FILE_UPLOAD; 
//XA_PERM_TYPE_FILE_UPLOAD
                }
-               if(label.equalsIgnoreCase("getNimbusConf")) {
+               if("getNimbusConf".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_NIMBUS; 
//XA_PERM_TYPE_GET_NIMBUS
                }
-               if(label.equalsIgnoreCase("getClusterInfo")) {
+               if("getClusterInfo".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_CLUSTER_INFO; 
//XA_PERM_TYPE_GET_CLUSTER_INFO
                }
-               if(label.equalsIgnoreCase("fileDownload")) {
+               if("fileDownload".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_FILE_DOWNLOAD; 
//XA_PERM_TYPE_FILE_DOWNLOAD
                }
-               if(label.equalsIgnoreCase("killTopology")) {
+               if("killTopology".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_KILL_TOPOLOGY; 
//XA_PERM_TYPE_KILL_TOPOLOGY
                }
-               if(label.equalsIgnoreCase("rebalance")) {
+               if("rebalance".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_REBALANCE; 
//XA_PERM_TYPE_REBALANCE
                }
-               if(label.equalsIgnoreCase("activate")) {
+               if("activate".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_ACTIVATE; 
//XA_PERM_TYPE_ACTIVATE
                }
-               if(label.equalsIgnoreCase("deactivate")) {
+               if("deactivate".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_DEACTIVATE; 
//XA_PERM_TYPE_DEACTIVATE
                }
-               if(label.equalsIgnoreCase("getTopologyConf")) {
+               if("getTopologyConf".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_TOPOLOGY_CONF; 
//XA_PERM_TYPE_GET_TOPOLOGY_CONF
                }
-               if(label.equalsIgnoreCase("getTopology")) {
+               if("getTopology".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_TOPOLOGY; 
//XA_PERM_TYPE_GET_TOPOLOGY
                }
-               if(label.equalsIgnoreCase("getUserTopology")) {
+               if("getUserTopology".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_USER_TOPOLOGY; 
//XA_PERM_TYPE_GET_USER_TOPOLOGY
                }
-               if(label.equalsIgnoreCase("getTopologyInfo")) {
+               if("getTopologyInfo".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_GET_TOPOLOGY_INFO; 
//XA_PERM_TYPE_GET_TOPOLOGY_INFO
                }
-               if(label.equalsIgnoreCase("uploadNewCredentials")) {
+               if("uploadNewCredentials".equalsIgnoreCase(label)) {
                        return AppConstants.XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL; 
//XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL
                }
                return 0;
@@ -1161,10 +1161,10 @@ public class AppConstants extends RangerCommonEnums {
                if (label == null) {
                        return 0;
                }
-               if (label.equalsIgnoreCase("Inclusion")) {
+               if ("Inclusion".equalsIgnoreCase(label)) {
                        return AppConstants.POLICY_INCLUSION; // 
POLICY_INCLUSION
                }
-               if (label.equalsIgnoreCase("Exclusion")) {
+               if ("Exclusion".equalsIgnoreCase(label)) {
                        return AppConstants.POLICY_EXCLUSION; // 
POLICY_EXCLUSION
                }
                return 0;

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java 
b/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
index 22d4b89..1392421 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
@@ -160,7 +160,7 @@ public class PropertiesUtil extends 
PropertyPlaceholderConfigurer {
                if(path!=null && alias!=null){
                        String 
xaDBPassword=CredentialReader.getDecryptedString(path.trim(),alias.trim());
                        if(xaDBPassword!=null&& !xaDBPassword.trim().isEmpty() 
&&
-                                       
!xaDBPassword.trim().equalsIgnoreCase("none")){
+                                       
!"none".equalsIgnoreCase(xaDBPassword.trim())){
                                propertiesMap.put("ranger.jpa.jdbc.password", 
xaDBPassword);
                                props.put("ranger.jpa.jdbc.password", 
xaDBPassword);
                        }else{
@@ -174,7 +174,7 @@ public class PropertiesUtil extends 
PropertyPlaceholderConfigurer {
                if(path!=null && alias!=null){
                        String 
auditDBPassword=CredentialReader.getDecryptedString(path.trim(), alias.trim());
                        if(auditDBPassword!=null&& 
!auditDBPassword.trim().isEmpty() &&
-                                       
!auditDBPassword.trim().equalsIgnoreCase("none")){
+                                       
!"none".equalsIgnoreCase(auditDBPassword.trim())){
                                
propertiesMap.put("ranger.jpa.audit.jdbc.password", auditDBPassword);
                                props.put("ranger.jpa.audit.jdbc.password", 
auditDBPassword);
                        }else{
@@ -184,14 +184,14 @@ public class PropertiesUtil extends 
PropertyPlaceholderConfigurer {
        }
        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.authentication.method")){
                String 
authenticationMethod=propertiesMap.get("ranger.authentication.method");
-               if(authenticationMethod!=null && 
(authenticationMethod.equalsIgnoreCase("ACTIVE_DIRECTORY")||authenticationMethod.equalsIgnoreCase("AD"))){
+               if(authenticationMethod!=null && 
("ACTIVE_DIRECTORY".equalsIgnoreCase(authenticationMethod)||"AD".equalsIgnoreCase(authenticationMethod))){
                        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.credential.provider.path") && 
propertiesMap.containsKey("ranger.ldap.ad.binddn.credential.alias")){
                                String 
path=propertiesMap.get("ranger.credential.provider.path");
                                String 
alias=propertiesMap.get("ranger.ldap.ad.binddn.credential.alias");
                                if(path!=null && alias!=null){
                                        String 
bindDNPassword=CredentialReader.getDecryptedString(path.trim(), alias.trim());
                                        if(bindDNPassword!=null&& 
!bindDNPassword.trim().isEmpty() &&
-                                                       
!bindDNPassword.trim().equalsIgnoreCase("none")){
+                                                       
!"none".equalsIgnoreCase(bindDNPassword.trim())){
                                                
propertiesMap.put("ranger.ldap.ad.bind.password", bindDNPassword);
                                                
props.put("ranger.ldap.ad.bind.password", bindDNPassword);
                                        }else{
@@ -203,14 +203,14 @@ public class PropertiesUtil extends 
PropertyPlaceholderConfigurer {
        }
        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.authentication.method")){
                String 
authenticationMethod=propertiesMap.get("ranger.authentication.method");
-               if(authenticationMethod!=null && 
(authenticationMethod.equalsIgnoreCase("LDAP"))){
+               if(authenticationMethod!=null && 
("LDAP".equalsIgnoreCase(authenticationMethod))){
                        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.credential.provider.path") && 
propertiesMap.containsKey("ranger.ldap.binddn.credential.alias")){
                                String 
path=propertiesMap.get("ranger.credential.provider.path");
                                String 
alias=propertiesMap.get("ranger.ldap.binddn.credential.alias");
                                if(path!=null && alias!=null){
                                        String 
bindDNPassword=CredentialReader.getDecryptedString(path.trim(), alias.trim());
                                        if(bindDNPassword!=null&& 
!bindDNPassword.trim().isEmpty() &&
-                                                       
!bindDNPassword.trim().equalsIgnoreCase("none")){
+                                                       
!"none".equalsIgnoreCase(bindDNPassword.trim())){
                                                
propertiesMap.put("ranger.ldap.bind.password", bindDNPassword);
                                                
props.put("ranger.ldap.bind.password", bindDNPassword);
                                        }else{
@@ -222,14 +222,14 @@ public class PropertiesUtil extends 
PropertyPlaceholderConfigurer {
        }
        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.audit.source.type")){
                String auditStore=propertiesMap.get("ranger.audit.source.type");
-               if(auditStore!=null && (auditStore.equalsIgnoreCase("solr"))){
+               if(auditStore!=null && ("solr".equalsIgnoreCase(auditStore))){
                        if(propertiesMap!=null && 
propertiesMap.containsKey("ranger.credential.provider.path") && 
propertiesMap.containsKey("ranger.solr.audit.credential.alias")){
                                String 
path=propertiesMap.get("ranger.credential.provider.path");
                                String 
alias=propertiesMap.get("ranger.solr.audit.credential.alias");
                                if(path!=null && alias!=null){
                                        String 
solrAuditPassword=CredentialReader.getDecryptedString(path.trim(), 
alias.trim());
                                        if(solrAuditPassword!=null&& 
!solrAuditPassword.trim().isEmpty() &&
-                                                       
!solrAuditPassword.trim().equalsIgnoreCase("none")){
+                                                       
!"none".equalsIgnoreCase(solrAuditPassword.trim())){
                                                
propertiesMap.put("ranger.solr.audit.user.password", solrAuditPassword);
                                                
props.put("ranger.solr.audit.user.password", solrAuditPassword);
                                        }else{

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java 
b/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
index c6be50e..92b0e03 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
@@ -296,13 +296,13 @@ public class RangerSearchUtil extends SearchUtil {
                                if (fieldValue != null) {
                                        if (searchField.getCustomCondition() == 
null) {
                                                whereClause.append(" and 
").append(searchField.getFieldName());
-                                               if 
(searchField.getSearchType().equals(SearchField.SEARCH_TYPE.LESS_THAN)) {
+                                               if 
(SearchField.SEARCH_TYPE.LESS_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("< 
:");
-                                               } else if 
(searchField.getSearchType().equals(SearchField.SEARCH_TYPE.LESS_EQUAL_THAN)) {
+                                               } else if 
(SearchField.SEARCH_TYPE.LESS_EQUAL_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("<= 
:");
-                                               } else if 
(searchField.getSearchType().equals(SearchField.SEARCH_TYPE.GREATER_THAN)) {
+                                               } else if 
(SearchField.SEARCH_TYPE.GREATER_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("> 
:");
-                                               } else if 
(searchField.getSearchType().equals(SearchField.SEARCH_TYPE.GREATER_EQUAL_THAN))
 {
+                                               } else if 
(SearchField.SEARCH_TYPE.GREATER_EQUAL_THAN.equals(searchField.getSearchType()))
 {
                                                        whereClause.append(">= 
:");
                                                }
                                                
whereClause.append(searchField.getClientFieldName());
@@ -408,7 +408,7 @@ public class RangerSearchUtil extends SearchUtil {
                        String sortType = searchCriteria.getSortType();
                        String querySortType = "asc";
                        if (sortType != null) {
-                               if (sortType.equalsIgnoreCase("asc") || 
sortType.equalsIgnoreCase("desc")) {
+                               if ("asc".equalsIgnoreCase(sortType) || 
"desc".equalsIgnoreCase(sortType)) {
                                        querySortType = sortType;
                                } else {
                                        logger.error("Invalid sortType. 
sortType=" + sortType);

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/SearchGroup.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/SearchGroup.java 
b/security-admin/src/main/java/org/apache/ranger/common/SearchGroup.java
index 00935f3..78df09e 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/SearchGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/SearchGroup.java
@@ -55,7 +55,7 @@ public class SearchGroup {
                for (SearchValue value : values) {
                        count++;
                        if (count > 0) {
-                               if (condition.equals(CONDITION.AND)) {
+                               if (CONDITION.AND.equals(condition)) {
                                        whereClause.append(" AND ");
                                } else {
                                        whereClause.append(" OR ");
@@ -89,7 +89,7 @@ public class SearchGroup {
                for (SearchGroup searchGroup : searchGroups) {
                        count++;
                        if (count > 0) {
-                               if (condition.equals(CONDITION.AND)) {
+                               if (CONDITION.AND.equals(condition)) {
                                        whereClause.append(" AND ");
                                } else {
                                        whereClause.append(" OR ");

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java 
b/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
index 0723ee9..fe253ef 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
@@ -395,8 +395,8 @@ public class SearchUtil {
                        String sortType = searchCriteria.getSortType();
                        String querySortType = "asc";
                        if (sortType != null) {
-                               if (sortType.equalsIgnoreCase("asc")
-                                               || 
sortType.equalsIgnoreCase("desc")) {
+                               if ("asc".equalsIgnoreCase(sortType)
+                                               || 
"desc".equalsIgnoreCase(sortType)) {
                                        querySortType = sortType;
                                } else {
                                        logger.error("Invalid sortType. 
sortType=" + sortType);
@@ -589,17 +589,13 @@ public class SearchUtil {
                                        if (searchField.getCustomCondition() == 
null) {
                                                whereClause.append(" and 
").append(
                                                                
searchField.getFieldName());
-                                               if 
(searchField.getSearchType().equals(
-                                                               
SearchField.SEARCH_TYPE.LESS_THAN)) {
+                                               if 
(SearchField.SEARCH_TYPE.LESS_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("< 
:");
-                                               } else if 
(searchField.getSearchType().equals(
-                                                               
SearchField.SEARCH_TYPE.LESS_EQUAL_THAN)) {
+                                               } else if 
(SearchField.SEARCH_TYPE.LESS_EQUAL_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("<= 
:");
-                                               } else if 
(searchField.getSearchType().equals(
-                                                               
SearchField.SEARCH_TYPE.GREATER_THAN)) {
+                                               } else if 
(SearchField.SEARCH_TYPE.GREATER_THAN.equals(searchField.getSearchType())) {
                                                        whereClause.append("> 
:");
-                                               } else if 
(searchField.getSearchType().equals(
-                                                               
SearchField.SEARCH_TYPE.GREATER_EQUAL_THAN)) {
+                                               } else if 
(SearchField.SEARCH_TYPE.GREATER_EQUAL_THAN.equals(searchField.getSearchType()))
 {
                                                        whereClause.append(">= 
:");
                                                }
                                                
whereClause.append(searchField.getClientFieldName());

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/ServiceUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/ServiceUtil.java 
b/security-admin/src/main/java/org/apache/ranger/common/ServiceUtil.java
index 7f471b0..6ad56d2 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/ServiceUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/ServiceUtil.java
@@ -352,24 +352,24 @@ public class ServiceUtil {
                        String                            resType   = 
e.getKey();
                        String                            resString = 
getResourceString(res.getValues());
 
-                       if(resType.equalsIgnoreCase("path")) {
+                       if("path".equalsIgnoreCase(resType)) {
                                ret.setName(resString);
                                
ret.setIsRecursive(Boolean.TRUE.equals(res.getIsRecursive()) ? 
RangerCommonEnums.BOOL_TRUE : RangerCommonEnums.BOOL_FALSE);
-                       } else if(resType.equalsIgnoreCase("table")) {
+                       } else if("table".equalsIgnoreCase(resType)) {
                                ret.setTables(resString);
                                
ret.setTableType(Boolean.TRUE.equals(res.getIsExcludes()) ? 
RangerCommonEnums.POLICY_EXCLUSION : RangerCommonEnums.POLICY_INCLUSION);
-                       } else if(resType.equalsIgnoreCase("column-family")) {
+                       } else if("column-family".equalsIgnoreCase(resType)) {
                                ret.setColumnFamilies(resString);
-                       } else if(resType.equalsIgnoreCase("column")) {
+                       } else if("column".equalsIgnoreCase(resType)) {
                                ret.setColumns(resString);
                                
ret.setColumnType(Boolean.TRUE.equals(res.getIsExcludes()) ? 
RangerCommonEnums.POLICY_EXCLUSION : RangerCommonEnums.POLICY_INCLUSION);
-                       } else if(resType.equalsIgnoreCase("database")) {
+                       } else if("database".equalsIgnoreCase(resType)) {
                                ret.setDatabases(resString);
-                       } else if(resType.equalsIgnoreCase("udf")) {
+                       } else if("udf".equalsIgnoreCase(resType)) {
                                ret.setUdfs(resString);
-                       } else if(resType.equalsIgnoreCase("topology")) {
+                       } else if("topology".equalsIgnoreCase(resType)) {
                                ret.setTopologies(resString);
-                       } else if(resType.equalsIgnoreCase("service")) {
+                       } else if("service".equalsIgnoreCase(resType)) {
                                ret.setServices(resString);
                        }
                }
@@ -814,24 +814,24 @@ public class ServiceUtil {
                        String                            resType   = 
e.getKey();
                        String                            resString = 
getResourceString(res.getValues());
 
-                       if(resType.equalsIgnoreCase("path")) {
+                       if("path".equalsIgnoreCase(resType)) {
                                ret.setResourceName(resString);
                                
ret.setIsRecursive(Boolean.TRUE.equals(res.getIsRecursive()) ? true : false);
-                       } else if(resType.equalsIgnoreCase("table")) {
+                       } else if("table".equalsIgnoreCase(resType)) {
                                ret.setTables(resString);
                                
ret.setTableType(Boolean.TRUE.equals(res.getIsExcludes()) ? 
toVxPolicyIncExc(RangerCommonEnums.POLICY_EXCLUSION):toVxPolicyIncExc(RangerCommonEnums.POLICY_INCLUSION));
-                       } else if(resType.equalsIgnoreCase("column-family")) {
+                       } else if("column-family".equalsIgnoreCase(resType)) {
                                ret.setColumnFamilies(resString);
-                       } else if(resType.equalsIgnoreCase("column")) {
+                       } else if("column".equalsIgnoreCase(resType)) {
                                ret.setColumns(resString);
                                
ret.setColumnType(Boolean.TRUE.equals(res.getIsExcludes()) ? 
toVxPolicyIncExc(RangerCommonEnums.POLICY_EXCLUSION):toVxPolicyIncExc(RangerCommonEnums.POLICY_INCLUSION));
-                       } else if(resType.equalsIgnoreCase("database")) {
+                       } else if("database".equalsIgnoreCase(resType)) {
                                ret.setDatabases(resString);
-                       } else if(resType.equalsIgnoreCase("udf")) {
+                       } else if("udf".equalsIgnoreCase(resType)) {
                                ret.setUdfs(resString);
-                       } else if(resType.equalsIgnoreCase("topology")) {
+                       } else if("topology".equalsIgnoreCase(resType)) {
                                ret.setTopologies(resString);
-                       } else if(resType.equalsIgnoreCase("service")) {
+                       } else if("service".equalsIgnoreCase(resType)) {
                                ret.setServices(resString);
                        }
                }
@@ -1087,7 +1087,7 @@ public class ServiceUtil {
                                if (vXPermObj.getPermList() != null) {
                                        for (String perm : 
vXPermObj.getPermList()) {
                                                if ( 
AppConstants.getEnumFor_XAPermType(perm) != 0 ) {
-                                                       if 
(perm.equalsIgnoreCase("Admin")) {
+                                                       if 
("Admin".equalsIgnoreCase(perm)) {
                                                                
delegatedAdmin=true;
                                                                if (assetType 
!= RangerCommonEnums.ASSET_HBASE) {
                                                                        
continue;
@@ -1280,7 +1280,7 @@ public class ServiceUtil {
                                        if(vXPermObj.getPermList() != null) {
                                                for (String perm : 
vXPermObj.getPermList()) {
                                                        if ( 
AppConstants.getEnumFor_XAPermType(perm) != 0 ) {
-                                                               if 
(perm.equalsIgnoreCase("Admin")) {
+                                                               if 
("Admin".equalsIgnoreCase(perm)) {
                                                                        
delegatedAdmin=true;
                                                                        if 
(assetType!=null && assetType.intValue() != RangerCommonEnums.ASSET_HBASE) {
                                                                                
continue;
@@ -1412,7 +1412,7 @@ public class ServiceUtil {
                                        try {
                                                LdapName ln = new LdapName(dn);
                                                for (Rdn rdn : ln.getRdns()) {
-                                                       if 
(rdn.getType().equalsIgnoreCase("CN")) {
+                                                       if 
("CN".equalsIgnoreCase(rdn.getType())) {
                                                                commonName = 
rdn.getValue() + "";
                                                                break;
                                                        }

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java 
b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java
index aab8669..045e07c 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java
@@ -70,7 +70,7 @@ public class StringUtil implements Serializable {
        }
 
        public boolean isEmptyOrWildcardAsterisk(String str) {
-               return isEmpty(str) || str.equals(WILDCARD_ASTERISK);
+               return isEmpty(str) || WILDCARD_ASTERISK.equals(str);
        }
 
        public boolean equals(String str1, String str2) {

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java 
b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
index e3b878b..fddfda3 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
@@ -54,7 +54,7 @@ public class RangerDaoManager extends RangerDaoManagerBase {
                        logger.debug("RangerDaoManager.getEntityManager(" + 
persistenceContextUnit + ")");
                }
 
-               if (persistenceContextUnit.equalsIgnoreCase("loggingPU")) {
+               if ("loggingPU".equalsIgnoreCase(persistenceContextUnit)) {
                        return loggingEM;
                }
                return getEntityManager();

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java 
b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
index d718441..db20a14 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
@@ -203,167 +203,167 @@ public abstract class RangerDaoManagerBase {
        }
 
        public BaseDao<?> getDaoForClassName(String className) {
-               if (className.equals("XXDBBase")) {
+               if ("XXDBBase".equals(className)) {
                        return getXXDBBase();
                }
-               if (className.equals("XXAuthSession")) {
+               if ("XXAuthSession".equals(className)) {
                        return getXXAuthSession();
                }
-               if (className.equals("XXPortalUser")) {
+               if ("XXPortalUser".equals(className)) {
                        return getXXPortalUser();
                }
-               if (className.equals("XXPortalUserRole")) {
+               if ("XXPortalUserRole".equals(className)) {
                        return getXXPortalUserRole();
                }
-               if (className.equals("XXAsset")) {
+               if ("XXAsset".equals(className)) {
                        return getXXAsset();
                }
-               if (className.equals("XXResource")) {
+               if ("XXResource".equals(className)) {
                        return getXXResource();
                }
-               if (className.equals("XXCredentialStore")) {
+               if ("XXCredentialStore".equals(className)) {
                        return getXXCredentialStore();
                }
-               if (className.equals("XXGroup")) {
+               if ("XXGroup".equals(className)) {
                        return getXXGroup();
                }
-               if (className.equals("XXUser")) {
+               if ("XXUser".equals(className)) {
                        return getXXUser();
                }
-               if (className.equals("XXGroupUser")) {
+               if ("XXGroupUser".equals(className)) {
                        return getXXGroupUser();
                }
-               if (className.equals("XXGroupGroup")) {
+               if ("XXGroupGroup".equals(className)) {
                        return getXXGroupGroup();
                }
-               if (className.equals("XXPermMap")) {
+               if ("XXPermMap".equals(className)) {
                        return getXXPermMap();
                }
-               if (className.equals("XXAuditMap")) {
+               if ("XXAuditMap".equals(className)) {
                        return getXXAuditMap();
                }
-               if (className.equals("XXPolicyExportAudit")) {
+               if ("XXPolicyExportAudit".equals(className)) {
                        return getXXPolicyExportAudit();
                }
-               if (className.equals("XXTrxLog")) {
+               if ("XXTrxLog".equals(className)) {
                        return getXXTrxLog();
                }
-               if (className.equals("XXAccessAudit")) {
+               if ("XXAccessAudit".equals(className)) {
                        return getXXAccessAudit();
                }
-               if (className.equals("XXPolicy")) {
+               if ("XXPolicy".equals(className)) {
                        return getXXPolicy();
                }
-               if (className.equals("XXService")) {
+               if ("XXService".equals(className)) {
                        return getXXService();
                }
-               if (className.equals("XXPolicyItem")) {
+               if ("XXPolicyItem".equals(className)) {
                        return getXXPolicyItem();
                }
-               if (className.equals("XXServiceDef")) {
+               if ("XXServiceDef".equals(className)) {
                        return getXXServiceDef();
                }
-               if (className.equals("XXServiceConfigDef")) {
+               if ("XXServiceConfigDef".equals(className)) {
                        return getXXServiceConfigDef();
                }
-               if (className.equals("XXResourceDef")) {
+               if ("XXResourceDef".equals(className)) {
                        return getXXResourceDef();
                }
-               if (className.equals("XXAccessTypeDef")) {
+               if ("XXAccessTypeDef".equals(className)) {
                        return getXXAccessTypeDef();
                }
-               if (className.equals("XXAccessTypeDefGrants")) {
+               if ("XXAccessTypeDefGrants".equals(className)) {
                        return getXXAccessTypeDefGrants();
                }
-               if (className.equals("XXPolicyConditionDef")) {
+               if ("XXPolicyConditionDef".equals(className)) {
                        return getXXPolicyConditionDef();
                }
-               if (className.equals("XXEnumDef")) {
+               if ("XXEnumDef".equals(className)) {
                        return getXXEnumDef();
                }
-               if (className.equals("XXEnumElementDef")) {
+               if ("XXEnumElementDef".equals(className)) {
                        return getXXEnumElementDef();
                }
-               if (className.equals("XXServiceConfigMap")) {
+               if ("XXServiceConfigMap".equals(className)) {
                        return getXXServiceConfigMap();
                }
-               if (className.equals("XXPolicyResource")) {
+               if ("XXPolicyResource".equals(className)) {
                        return getXXPolicyResource();
                }
-               if (className.equals("XXPolicyResourceMap")) {
+               if ("XXPolicyResourceMap".equals(className)) {
                        return getXXPolicyResourceMap();
                }
-               if (className.equals("XXPolicyItemAccess")) {
+               if ("XXPolicyItemAccess".equals(className)) {
                        return getXXPolicyItemAccess();
                }
-               if (className.equals("XXPolicyItemCondition")) {
+               if ("XXPolicyItemCondition".equals(className)) {
                        return getXXPolicyItemCondition();
                }
-               if (className.equals("XXPolicyItemUserPerm")) {
+               if ("XXPolicyItemUserPerm".equals(className)) {
                        return getXXPolicyItemUserPerm();
                }
-               if (className.equals("XXPolicyItemGroupPerm")) {
+               if ("XXPolicyItemGroupPerm".equals(className)) {
                        return getXXPolicyItemGroupPerm();
                }
-               if (className.equals("XXDataHist")) {
+               if ("XXDataHist".equals(className)) {
                        return getXXDataHist();
                }
-               if (className.equals("XXPolicyWithAssignedId")) {
+               if ("XXPolicyWithAssignedId".equals(className)) {
                        return getXXPolicyWithAssignedId();
                }
-               if (className.equals("XXServiceWithAssignedId")) {
+               if ("XXServiceWithAssignedId".equals(className)) {
                        return getXXServiceWithAssignedId();
                }
-               if (className.equals("XXModuleDef")) {
+               if ("XXModuleDef".equals(className)) {
                        return getXXModuleDef();
                }
-               if (className.equals("XXUserPermission")) {
+               if ("XXUserPermission".equals(className)) {
                        return getXXUserPermission();
                }
-               if (className.equals("XXGroupPermission")) {
+               if ("XXGroupPermission".equals(className)) {
                        return getXXGroupPermission();
                }
-               if (className.equals("XXServiceDefWithAssignedId")) {
+               if ("XXServiceDefWithAssignedId".equals(className)) {
                        return getXXServiceDefWithAssignedId();
                }
 
-               if (className.equals("XXTagDef")) {
+               if ("XXTagDef".equals(className)) {
                        return getXXTagDef();
                }
-               if (className.equals("XXTagAttributeDef")) {
+               if ("XXTagAttributeDef".equals(className)) {
                        return getXXTagAttributeDef();
                }
-               if (className.equals("XXServiceResource")) {
+               if ("XXServiceResource".equals(className)) {
                        return getXXServiceResource();
                }
-               if (className.equals("XXServiceResourceElement")) {
+               if ("XXServiceResourceElement".equals(className)) {
                        return getXXServiceResourceElement();
                }
-               if (className.equals("XXServiceResourceElementValue")) {
+               if ("XXServiceResourceElementValue".equals(className)) {
                        return getXXServiceResourceElementValue();
                }
-               if (className.equals("XXTag")) {
+               if ("XXTag".equals(className)) {
                        return getXXTag();
                }
-               if (className.equals("XXTagAttribute")) {
+               if ("XXTagAttribute".equals(className)) {
                        return getXXTagAttribute();
                }
-               if (className.equals("XXTagResourceMap")) {
+               if ("XXTagResourceMap".equals(className)) {
                        return getXXTagResourceMap();
                }
-               if (className.equals("XXDataMaskTypeDef")) {
+               if ("XXDataMaskTypeDef".equals(className)) {
                        return getXXDataMaskTypeDef();
                }
-               if (className.equals("XXPolicyItemDataMaskInfo")) {
+               if ("XXPolicyItemDataMaskInfo".equals(className)) {
                        return getXXPolicyItemDataMaskInfo();
                }
-               if (className.equals("XXPolicyItemRowFilterInfo")) {
+               if ("XXPolicyItemRowFilterInfo".equals(className)) {
                        return getXXPolicyItemRowFilterInfo();
                }
-               if (className.equals("XXServiceVersionInfo")) {
+               if ("XXServiceVersionInfo".equals(className)) {
                        return getXXServiceVersionInfo();
                }
-               if (className.equals("XXPluginInfo")) {
+               if ("XXPluginInfo".equals(className)) {
                        return getXXPluginInfo();
                }
                logger.error("No DaoManager found for className=" + className, 
new Throwable());

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAuditBase.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAuditBase.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAuditBase.java
index 8efcfc3..76da309 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAuditBase.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAuditBase.java
@@ -647,10 +647,10 @@ public class XXAccessAuditBase extends XXDBBase 
implements java.io.Serializable
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("auditType") ) {
+               if( "auditType".equals(fieldName) ) {
                        return "CommonEnums.AssetType";
                }
-               if( fieldName.equals("accessResult") ) {
+               if( "accessResult".equals(fieldName) ) {
                        return "CommonEnums.AccessResult";
                }
                return null;

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
index 158c966..ac42ceb 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
@@ -279,10 +279,10 @@ public class XXAsset extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("activeStatus") ) {
+               if( "activeStatus".equals(fieldName) ) {
                        return "CommonEnums.ActiveStatus";
                }
-               if( fieldName.equals("assetType") ) {
+               if( "assetType".equals(fieldName) ) {
                        return "CommonEnums.AssetType";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
index 95c2bf6..5f51278 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
@@ -220,7 +220,7 @@ public class XXAuditMap extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("auditType") ) {
+               if( "auditType".equals(fieldName) ) {
                        return "CommonEnums.XAAuditType";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
index deedc87..c277158 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
@@ -460,16 +460,16 @@ public class XXAuthSession extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("authStatus") ) {
+               if( "authStatus".equals(fieldName) ) {
                        return "CommonEnums.AuthStatus";
                }
-               if( fieldName.equals("authType") ) {
+               if( "authType".equals(fieldName) ) {
                        return "CommonEnums.AuthType";
                }
-               if( fieldName.equals("authProvider") ) {
+               if( "authProvider".equals(fieldName) ) {
                        return "CommonEnums.AuthType";
                }
-               if( fieldName.equals("deviceType") ) {
+               if( "deviceType".equals(fieldName) ) {
                        return "CommonEnums.DeviceType";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
index 04aedbd..dc95b58 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
@@ -292,10 +292,10 @@ public class XXGroup extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("status") ) {
+               if( "status".equals(fieldName) ) {
                        return "CommonEnums.ActiveStatus";
                }
-               if( fieldName.equals("groupType") ) {
+               if( "groupType".equals(fieldName) ) {
                        return "CommonEnums.XAGroupType";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
index 7c6b96c..b53d153 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
@@ -385,13 +385,13 @@ public class XXPermMap extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("permFor") ) {
+               if( "permFor".equals(fieldName) ) {
                        return "CommonEnums.XAPermForType";
                }
-               if( fieldName.equals("permType") ) {
+               if( "permType".equals(fieldName) ) {
                        return "CommonEnums.XAPermType";
                }
-               if( fieldName.equals("isRecursive") ) {
+               if( "isRecursive".equals(fieldName) ) {
                        return "CommonEnums.BooleanValue";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
index f7df09e..89b180d 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
@@ -369,10 +369,10 @@ public class XXPortalUser extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("status") ) {
+               if( "status".equals(fieldName) ) {
                        return "CommonEnums.ActivationStatus";
                }
-               if( fieldName.equals("userSource") ) {
+               if( "userSource".equals(fieldName) ) {
                        return "CommonEnums.UserSource";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
index 97f52c4..2f5e400 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
@@ -180,7 +180,7 @@ public class XXPortalUserRole extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("status") ) {
+               if( "status".equals(fieldName) ) {
                        return "CommonEnums.ActiveStatus";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
index e571a4f..a47a530 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
@@ -694,25 +694,25 @@ public class XXResource extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("resourceType") ) {
+               if( "resourceType".equals(fieldName) ) {
                        return "CommonEnums.ResourceType";
                }
-               if( fieldName.equals("isEncrypt") ) {
+               if( "isEncrypt".equals(fieldName) ) {
                        return "CommonEnums.BooleanValue";
                }
-               if( fieldName.equals("isRecursive") ) {
+               if( "isRecursive".equals(fieldName) ) {
                        return "CommonEnums.BooleanValue";
                }
-               if( fieldName.equals("resourceStatus") ) {
+               if( "resourceStatus".equals(fieldName) ) {
                        return "CommonEnums.ActiveStatus";
                }
-               if( fieldName.equals("tableType") ) {
+               if( "tableType".equals(fieldName) ) {
                        return "CommonEnums.PolicyType";
                }
-               if( fieldName.equals("columnType") ) {
+               if( "columnType".equals(fieldName) ) {
                        return "CommonEnums.PolicyType";
                }
-               if( fieldName.equals("assetType") ) {
+               if( "assetType".equals(fieldName) ) {
                        return "CommonEnums.AssetType";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
index ceea47b..4ef5262 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
@@ -516,7 +516,7 @@ public class XXTrxLog extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("objectClassType") ) {
+               if( "objectClassType".equals(fieldName) ) {
                        return "CommonEnums.ClassTypes";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java 
b/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
index 512c567..4720095 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
@@ -251,7 +251,7 @@ public class XXUser extends XXDBBase implements 
java.io.Serializable {
                return true;
        }
        public static String getEnumName(String fieldName ) {
-               if( fieldName.equals("status") ) {
+               if( "status".equals(fieldName) ) {
                        return "CommonEnums.ActiveStatus";
                }
                //Later TODO

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/patch/cliutil/DbToSolrMigrationUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/patch/cliutil/DbToSolrMigrationUtil.java
 
b/security-admin/src/main/java/org/apache/ranger/patch/cliutil/DbToSolrMigrationUtil.java
index 1ddd367..89d5f4d 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/patch/cliutil/DbToSolrMigrationUtil.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/patch/cliutil/DbToSolrMigrationUtil.java
@@ -390,13 +390,13 @@ public class DbToSolrMigrationUtil extends BaseLoader {
                                        .getProperty("ranger.solr.url");
                }
 
-               if (zkHosts != null && !zkHosts.trim().equals("")
-                               && !zkHosts.trim().equalsIgnoreCase("none")) {
+               if (zkHosts != null && !"".equals(zkHosts.trim())
+                               && !"none".equalsIgnoreCase(zkHosts.trim())) {
                        zkHosts = zkHosts.trim();
                        String collectionName = PropertiesUtil
                                        .getProperty(SOLR_COLLECTION_NAME);
                        if (collectionName == null
-                                       || 
collectionName.equalsIgnoreCase("none")) {
+                                       || 
"none".equalsIgnoreCase(collectionName)) {
                                collectionName = DEFAULT_COLLECTION_NAME;
                        }
 
@@ -420,7 +420,7 @@ public class DbToSolrMigrationUtil extends BaseLoader {
                        }
                } else {
                        if (solrURL == null || solrURL.isEmpty()
-                                       || solrURL.equalsIgnoreCase("none")) {
+                                       || "none".equalsIgnoreCase(solrURL)) {
                                logger.fatal("Solr ZKHosts and URL for Audit 
are empty. Please set property "
                                                + SOLR_ZK_HOSTS
                                                + " or "

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/patch/cliutil/MetricUtil.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/patch/cliutil/MetricUtil.java 
b/security-admin/src/main/java/org/apache/ranger/patch/cliutil/MetricUtil.java
index 3fe34be..d1ab0d0 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/patch/cliutil/MetricUtil.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/patch/cliutil/MetricUtil.java
@@ -93,7 +93,7 @@ public class MetricUtil extends BaseLoader  {
                        if (args.length != 2) {
                                System.out.println("type: Incorrect Arguments 
usage : -type policies | audits | usergroup | services | database | 
contextenrichers | denyconditions");
                        } else {
-                               if (!(args[0].equalsIgnoreCase("-type")) || 
!(args[1].equalsIgnoreCase("policies") || args[1].equalsIgnoreCase("audits") || 
args[1].equalsIgnoreCase("usergroup") || args[1].equalsIgnoreCase("services") 
|| args[1].equalsIgnoreCase("database") || 
args[1].equalsIgnoreCase("contextenrichers") || 
args[1].equalsIgnoreCase("denyconditions"))) {
+                               if (!("-type".equalsIgnoreCase(args[0])) || 
!("policies".equalsIgnoreCase(args[1]) || "audits".equalsIgnoreCase(args[1]) || 
"usergroup".equalsIgnoreCase(args[1]) || "services".equalsIgnoreCase(args[1]) 
|| "database".equalsIgnoreCase(args[1]) || 
"contextenrichers".equalsIgnoreCase(args[1]) || 
"denyconditions".equalsIgnoreCase(args[1]))) {
                                        System.out.println("type: Incorrect 
Arguments usage : -type policies | audits | usergroup | services | database | 
contextenrichers | denyconditions");
                                } else {
                                        metricType = args[1];
@@ -447,7 +447,7 @@ public class MetricUtil extends BaseLoader  {
                                PList<RangerPolicy> policiestype = 
svcStore.getPaginatedPolicies(policyFilter1);
                                long count = policiestype.getTotalCount();
                                if (count != 0) {
-                                       if 
(!serviceName.equalsIgnoreCase("tag")) {
+                                       if 
(!"tag".equalsIgnoreCase(serviceName)) {
                                                
servicesforPolicyType.put(serviceName, count);
                                        } else {
                                                tagCount = count;

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 
b/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java
index 6176319..b9f1832 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java
@@ -308,7 +308,7 @@ public class ServiceREST {
 
                        String forceDeleteStr = 
request.getParameter("forceDelete");
                        boolean forceDelete = false;
-                       if(!StringUtils.isEmpty(forceDeleteStr) && 
forceDeleteStr.equalsIgnoreCase("true")) {
+                       if(!StringUtils.isEmpty(forceDeleteStr) && 
"true".equalsIgnoreCase(forceDeleteStr)) {
                                forceDelete = true;
                        }
                        
@@ -502,11 +502,11 @@ public class ServiceREST {
                                bizUtil.hasKMSPermissions("Service", 
xxServiceDef.getImplclassname());
                        }
                        if(session != null && session.isSpnegoEnabled()){
-                               if (session.isKeyAdmin() && 
!xxServiceDef.getImplclassname().equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME))
 {
+                               if (session.isKeyAdmin() && 
!EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(xxServiceDef.getImplclassname()))
 {
                                        throw 
restErrorUtil.createRESTException("KeyAdmin can create/update/delete only KMS ",
                                                        
MessageEnums.OPER_NO_PERMISSION);
                                }
-                               if ((!session.isKeyAdmin() && 
!session.isUserAdmin()) && 
xxServiceDef.getImplclassname().equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME))
 {
+                               if ((!session.isKeyAdmin() && 
!session.isUserAdmin()) && 
EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(xxServiceDef.getImplclassname()))
 {
                                        throw 
restErrorUtil.createRESTException("User cannot create/update/delete KMS 
Service",
                                                        
MessageEnums.OPER_NO_PERMISSION);
                                }
@@ -2790,13 +2790,13 @@ public class ServiceREST {
                        XXServiceDef xServiceDef = 
daoManager.getXXServiceDef().getById(xService.getType());
 
                        if (isAdmin) {
-                               if 
(xServiceDef.getImplclassname().equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME))
 {
+                               if 
(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(xServiceDef.getImplclassname()))
 {
                                        throw restErrorUtil.createRESTException(
                                                        "KMS 
Policies/Services/Service-Defs are not accessible for user '" + userName + "'.",
                                                        
MessageEnums.OPER_NO_PERMISSION);
                                }
                        } else if (isKeyAdmin) {
-                               if 
(!xServiceDef.getImplclassname().equals(EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME))
 {
+                               if 
(!EmbeddedServiceDefsUtil.KMS_IMPL_CLASS_NAME.equals(xServiceDef.getImplclassname()))
 {
                                        throw restErrorUtil.createRESTException(
                                                        "Only KMS 
Policies/Services/Service-Defs are accessible for user '" + userName + "'.",
                                                        
MessageEnums.OPER_NO_PERMISSION);

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/handler/RangerAuthenticationProvider.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/handler/RangerAuthenticationProvider.java
 
b/security-admin/src/main/java/org/apache/ranger/security/handler/RangerAuthenticationProvider.java
index 3fdd5c2..5a4d639 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/handler/RangerAuthenticationProvider.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/handler/RangerAuthenticationProvider.java
@@ -99,7 +99,7 @@ public class RangerAuthenticationProvider implements 
AuthenticationProvider {
                        rangerAuthenticationMethod="NONE";
                }
                if (authentication != null && rangerAuthenticationMethod != 
null) {
-                       if 
(rangerAuthenticationMethod.equalsIgnoreCase("LDAP")) {
+                       if 
("LDAP".equalsIgnoreCase(rangerAuthenticationMethod)) {
                                authentication = 
getLdapAuthentication(authentication);
                                if (authentication!=null && 
authentication.isAuthenticated()) {
                                        return authentication;
@@ -110,7 +110,7 @@ public class RangerAuthenticationProvider implements 
AuthenticationProvider {
                                        }
                                }
                        }
-                       if 
(rangerAuthenticationMethod.equalsIgnoreCase("ACTIVE_DIRECTORY")) {
+                       if 
("ACTIVE_DIRECTORY".equalsIgnoreCase(rangerAuthenticationMethod)) {
                                authentication = 
getADBindAuthentication(authentication);
                                if (authentication != null && 
authentication.isAuthenticated()) {
                                        return authentication;
@@ -121,14 +121,14 @@ public class RangerAuthenticationProvider implements 
AuthenticationProvider {
                                        }
                                }
                        }
-                       if 
(rangerAuthenticationMethod.equalsIgnoreCase("UNIX")) {
+                       if 
("UNIX".equalsIgnoreCase(rangerAuthenticationMethod)) {
                 boolean isPAMAuthEnabled = 
PropertiesUtil.getBooleanProperty("ranger.pam.authentication.enabled", false);
                 authentication= (isPAMAuthEnabled ? 
getPamAuthentication(authentication) : getUnixAuthentication(authentication));
                                if (authentication != null && 
authentication.isAuthenticated()) {
                                        return authentication;
                                }
                        }
-                       if (rangerAuthenticationMethod.equalsIgnoreCase("PAM")) 
{
+                       if ("PAM".equalsIgnoreCase(rangerAuthenticationMethod)) 
{
                                authentication = 
getPamAuthentication(authentication);
                                if (authentication != null && 
authentication.isAuthenticated()) {
                                        return authentication;

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
index 8d9363a..580b6bc 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
@@ -82,7 +82,7 @@ ExceptionMappingAuthenticationFailureHandler {
                        String msg = exception.getMessage();
                        VXResponse vXResponse = new VXResponse();
                        if(msg!=null && !msg.isEmpty()){
-                               if(msg.equalsIgnoreCase("Bad credentials")){
+                               if("Bad credentials".equalsIgnoreCase(msg)){
                                        
vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
                                        vXResponse.setMsgDesc("The username or 
password you entered is incorrect..");
                                }else if(msg.contains("Could not get JDBC 
Connection; nested exception is java.sql.SQLException: Connections could not be 
acquired from the underlying database!")){
@@ -91,7 +91,7 @@ ExceptionMappingAuthenticationFailureHandler {
                                }else if(msg.contains("Communications link 
failure")){
                                        
vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
                                        vXResponse.setMsgDesc("Unable to 
connect to DB..");
-                               }else if(msg.equalsIgnoreCase("User is 
disabled")){
+                               }else if("User is 
disabled".equalsIgnoreCase(msg)){
                                        
vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
                                        vXResponse.setMsgDesc("The username or 
password you entered is disable..");
                                }
@@ -103,7 +103,7 @@ ExceptionMappingAuthenticationFailureHandler {
                        logger.info("Error while writing JSON in 
HttpServletResponse");
                }
        
-       if (ajaxRequestHeader != null && 
ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+       if (ajaxRequestHeader != null && 
"XMLHttpRequest".equalsIgnoreCase(ajaxRequestHeader)) {
 //         if (logger.isDebugEnabled()) {
 //             logger.debug("Forwarding AJAX login request failure to "
 //                     + ajaxLoginfailurePage);

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
index 948d328..66e45c7 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
@@ -123,7 +123,7 @@ SavedRequestAwareAuthenticationSuccessHandler {
                        if (logger.isDebugEnabled()) {
                            logger.debug("commence() X-Requested-With=" + 
ajaxRequestHeader);
                        }
-                       if (ajaxRequestHeader != null && 
ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+                       if (ajaxRequestHeader != null && 
"XMLHttpRequest".equalsIgnoreCase(ajaxRequestHeader)) {
                                // if (logger.isDebugEnabled()) {
                                // logger.debug("Forwarding AJAX login request 
success to "
                                // + ajaxLoginSuccessPage + " for user "

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
index e7e5f5d..d9c2bcf 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
@@ -121,7 +121,7 @@ public class RangerAuthenticationEntryPoint extends
                }
 
                if (ajaxRequestHeader != null
-                               && 
ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+                               && 
"XMLHttpRequest".equalsIgnoreCase(ajaxRequestHeader)) {
                        if (logger.isDebugEnabled()) {
                                logger.debug("commence() AJAX request. 
Authentication required. Returning "
                                                + ajaxReturnCode + ". URL=" + 
request.getRequestURI());

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKRBAuthenticationFilter.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKRBAuthenticationFilter.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKRBAuthenticationFilter.java
index c8d22aa..ec6d78d 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKRBAuthenticationFilter.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKRBAuthenticationFilter.java
@@ -195,7 +195,7 @@ public class RangerKRBAuthenticationFilter extends 
RangerKrbFilter {
                }
                String sessionUserName = request.getParameter(S_USER);
                String pathInfo = request.getPathInfo();
-               if(!StringUtils.isEmpty(sessionUserName) && 
sessionUserName.equalsIgnoreCase("keyadmin") && !StringUtils.isEmpty(pathInfo) 
&& pathInfo.contains("public/v2/api/service")){
+               if(!StringUtils.isEmpty(sessionUserName) && 
"keyadmin".equalsIgnoreCase(sessionUserName) && !StringUtils.isEmpty(pathInfo) 
&& pathInfo.contains("public/v2/api/service")){
                        LOG.info("Session will be created by : 
"+sessionUserName);
                        userName = sessionUserName;
                }
@@ -244,7 +244,7 @@ public class RangerKRBAuthenticationFilter extends 
RangerKrbFilter {
                        if(cookie != null){
                                for(Cookie c : cookie){
                                        String cname = c.getName();
-                                       if(cname != null && 
cname.equalsIgnoreCase("u"))
+                                       if(cname != null && 
"u".equalsIgnoreCase(cname))
                                        {
                                                int ustr = cname.indexOf("u=");
                                                if(ustr != -1){
@@ -253,7 +253,7 @@ public class RangerKRBAuthenticationFilter extends 
RangerKrbFilter {
                                                                userName = 
cname.substring(ustr+2, andStr);
                                                        }
                                                }
-                                       }else if(cname != null && 
cname.equalsIgnoreCase(AUTH_COOKIE_NAME)){
+                                       }else if(cname != null && 
AUTH_COOKIE_NAME.equalsIgnoreCase(cname)){
                                                int ustr = cname.indexOf("u=");
                                                if(ustr != -1){
                                                        int andStr = 
cname.indexOf("&", ustr);
@@ -295,7 +295,7 @@ public class RangerKRBAuthenticationFilter extends 
RangerKrbFilter {
        private boolean isSpnegoEnable(String authType){
                String principal = PropertiesUtil.getProperty(PRINCIPAL);
                String keytabPath = PropertiesUtil.getProperty(KEYTAB);
-               return ((!StringUtils.isEmpty(authType)) && 
authType.equalsIgnoreCase(KERBEROS_TYPE) && 
SecureClientLogin.isKerberosCredentialExists(principal, keytabPath));
+               return ((!StringUtils.isEmpty(authType)) && 
KERBEROS_TYPE.equalsIgnoreCase(authType) && 
SecureClientLogin.isKerberosCredentialExists(principal, keytabPath));
        }
        
        private Authentication getGrantedAuthority(Authentication 
authentication) {

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKrbFilter.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKrbFilter.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKrbFilter.java
index dbf6248..ca0d17e 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKrbFilter.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerKrbFilter.java
@@ -518,7 +518,7 @@ public class RangerKrbFilter implements Filter {
                    Collection<String> headerNames = 
httpResponse.getHeaderNames();
                    for(String headerName : headerNames){
                        String value = httpResponse.getHeader(headerName);
-                       if(headerName.equalsIgnoreCase("Set-Cookie") && 
value.startsWith("RANGERADMINSESSIONID")){
+                       if("Set-Cookie".equalsIgnoreCase(headerName) && 
value.startsWith("RANGERADMINSESSIONID")){
                            chk = false;
                            break;
                        }

http://git-wip-us.apache.org/repos/asf/ranger/blob/1d18e76d/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
----------------------------------------------------------------------
diff --git 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
index 7d8fdb2..ffb60b9 100644
--- 
a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
+++ 
b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
@@ -117,7 +117,7 @@ public class RangerSSOAuthenticationFilter implements 
Filter {
                HttpServletRequest httpRequest = 
(HttpServletRequest)servletRequest;
                if (httpRequest.getRequestedSessionId() != null && 
!httpRequest.isRequestedSessionIdValid()){
                        synchronized(httpRequest.getServletContext()){
-                               
if(httpRequest.getServletContext().getAttribute(httpRequest.getRequestedSessionId())
 != null && 
httpRequest.getServletContext().getAttribute(httpRequest.getRequestedSessionId()).toString().equals("locallogin")){
+                               
if(httpRequest.getServletContext().getAttribute(httpRequest.getRequestedSessionId())
 != null && 
"locallogin".equals(httpRequest.getServletContext().getAttribute(httpRequest.getRequestedSessionId()).toString())){
                                        ssoEnabled = false;
                                        
httpRequest.getSession().setAttribute("locallogin","true");
                                        
httpRequest.getServletContext().removeAttribute(httpRequest.getRequestedSessionId());

Reply via email to