You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Daniel Gergely (JIRA)" <ji...@apache.org> on 2016/03/31 15:24:25 UTC
[jira] [Created] (AMBARI-15646) Audit Log Code Cleanup & Safety
Daniel Gergely created AMBARI-15646:
---------------------------------------
Summary: Audit Log Code Cleanup & Safety
Key: AMBARI-15646
URL: https://issues.apache.org/jira/browse/AMBARI-15646
Project: Ambari
Issue Type: Bug
Components: ambari-server
Reporter: Daniel Gergely
Assignee: Daniel Gergely
As a follow-up to AMBARI-15241, there are concerns brought up in review which should be addressed but didn't need to hold up the feature being committed. These can be further broken out to into separate Jiras if needed:
- When initializing a ThreadLocal, you can specify an initial value. This code is unnecessary:
{code}
private ThreadLocal<DateFormat> dateFormatThreadLocal = new ThreadLocal<>();
if(dateFormatThreadLocal.get() == null) {
//2016-03-11T10:42:36.376Z
dateFormatThreadLocal.set(new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss.SSSX"));
}
{code}
- There are no tests for a majority of events and event creators.
- Using a multibinder is fine to be able to inject a {{Set<Foo>}}, but it's not clear to developers adding code that this is what must be done.
-- We either need to document the super interface to make it clear how to have new creators bound
-- Or annotate creators with an annotation which then be automatically picked up by the {{AuditLoggerModule}} and bound without the need to explicitly define each creator.
- {code}
// binding for audit event creators
Multibinder<RequestAuditEventCreator> auditLogEventCreatorBinder = Multibinder.newSetBinder(binder(), RequestAuditEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(DefaultEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ComponentEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ServiceEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(UnauthorizedEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ConfigurationChangeEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(UserEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(GroupEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(MemberEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(PrivilegeEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(BlueprintExportEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ServiceConfigDownloadEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(BlueprintEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ViewInstanceEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ViewPrivilegeEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(RepositoryEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(RepositoryVersionEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(AlertGroupEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(AlertTargetEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(HostEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(UpgradeEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(UpgradeItemEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(RecommendationIgnoreEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(ValidationIgnoreEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(CredentialEventCreator.class);
auditLogEventCreatorBinder.addBinding().to(RequestEventCreator.class);
bind(RequestAuditLogger.class).to(RequestAuditLoggerImpl.class);
{code}
- Event creators have nested invocations which is not only hard to read, but can potentially cause NPE's; it's a dangerous practice. As an example:
{code:title=AlertGroupEventCreator}
String.valueOf(request.getBody().getNamedPropertySets().iterator().next().getProperties().get(PropertyHelper.getPropertyId("AlertGroup", "name")));
{code}
-- Additionally, this references properties by building them, instead of by their registration in the property provider. If the property name ever changed, this could easily be missed.
- Some of the {{auditLog}} methods check to ensure that the logger is enabled first. This is very good, as building objects which won't be logged is a waste and potential performance problem. However, not all of them do. All {{auditLog}} methods should check this first, and return if not enabled. You can do this using AOP or just brute-force every method.
{code}
private void auditLog(HostRoleCommandEntity commandEntity, Long requestId) {
if(!auditLogger.isEnabled()) {
return;
}
{code}
- The temporary status caches in {{ActionDBAccessorImpl}} are never cleared.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)