Red Hat Bugzilla – Bug 484268
length validation checks needed for TPS inputs added for TPS roles
Last modified: 2015-01-04 18:36:28 EST
Description of problem:
Version-Release number of selected component (if applicable):
Steps to Reproduce:
Fix attached in Bug 481670
Please see changes there.
builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others"
Transmitting file data ..........
Committed revision 211.
[builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others"
Transmitting file data .
Committed revision 212.
Please provide the STR for this bug.
Not sure quite how to reproduce a bug per se.
You could try to create several users with more than 256 characters in the full name. At that point, the user name (if it is even allowed) will be truncated.
The most important thing though is that the system should be able to function normally -- ie. check the error logs for any segmentation faults. If no segmentation faults or fatal errors occur, then no memory overrun has occurred.
Created about 40 tps users having 257 characters in the first name, error logs did not show any segmentation faults. Seeing couple of issues related to this 1) CA List Certificate UI is not shown well, it would be nice if the long string is truncated (https://bugzilla.redhat.com/show_bug.cgi?id=511939). 2) When tried to login to tps agent/admin with this user credential, SSL layer is not accepting this certificate properly (https://bugzilla.redhat.com/show_bug.cgi?id=511946) .