Hi Harsha,

Looks good.

nit:

 366                 if(random.nextBoolean()) {
 367                     String[] tokens = line.split("\\s+");
 368                     if ((tokens.length == 4 || tokens.length == 3)) {

inverting the two if () (testing for the applicability of the line
first) would probably give a better chance that an existing
password is replaced, unless most lines are applicable.

best regards,

-- daniel

n 04/12/2017 18:27, Harsha Wardhana B wrote:
Hi All,

Please review and provide comments for fix for,

issue: https://bugs.openjdk.java.net/browse/JDK-8192909

having webrev at,

webrev : http://cr.openjdk.java.net/~hb/8192909/webrev.00/

Fix details: The test was failing intermittently because of duplicate entries for role in input password file. The duplicate entries get over-written by JMX agent, but the client was testing with stale entries for duplicated role. Also, the test now uses a single random number generator from test package (Utils.getRandomInstance) instead of two.

Regards

Harsha


Reply via email to