update anonymous inner classes with lambdas
[aaf/authz.git] / auth / auth-batch / src / main / java / org / onap / aaf / auth / batch / reports / Expiring.java
index 7ed26ce..11eacd4 100644 (file)
@@ -63,7 +63,6 @@ public class Expiring extends Batch {
        private static final String EXPIRED_OWNERS = "ExpiredOwners";
        private int minOwners;
        private Map<String, CSV.Writer> writerList;
-       private File logDir;
        private ExpireRange expireRange;
        private Date deleteDate;
        
@@ -87,15 +86,13 @@ public class Expiring extends Batch {
 
             // Create Intermediate Output 
             writerList = new HashMap<>();
-            logDir = new File(logDir());
-            logDir.mkdirs();
             
             expireRange = new ExpireRange(trans.env().access());
             String sdate = Chrono.dateOnlyStamp(expireRange.now);
             for( List<Range> lr : expireRange.ranges.values()) {
                for(Range r : lr ) {
                        if(writerList.get(r.name())==null) {
-                       File file = new File(logDir,r.name() + sdate +CSV);
+                       File file = new File(logDir(),r.name() + sdate +CSV);
                        CSV csv = new CSV(file);
                        CSV.Writer cw = csv.writer(false);
                        cw.row(INFO,r.name(),Chrono.dateOnlyStamp(expireRange.now),r.reportingLevel());
@@ -116,7 +113,7 @@ public class Expiring extends Batch {
     @Override
     protected void run(AuthzTrans trans) {
                try {
-                       File file = new File(logDir, EXPIRED_OWNERS + Chrono.dateOnlyStamp(expireRange.now) + CSV);
+                       File file = new File(logDir(), EXPIRED_OWNERS + Chrono.dateOnlyStamp(expireRange.now) + CSV);
                        final CSV ownerCSV = new CSV(file);
 
                        Map<String, Set<UserRole>> owners = new TreeMap<String, Set<UserRole>>();
@@ -196,18 +193,15 @@ public class Expiring extends Batch {
                        }
                        
                        trans.info().log("Checking for Expired X509s");
-                       X509.load(trans, session, new Visitor<X509>() {
-                               @Override
-                               public void visit(X509 x509) {
-                                       try {
-                                               for(Certificate cert : Factory.toX509Certificate(x509.x509)) {
-                                                       writeAnalysis(trans, x509, (X509Certificate)cert);
-                                               }
-                                       } catch (CertificateException | IOException e) {
-                                               trans.error().log(e, "Error Decrypting X509");
+                       X509.load(trans, session, x509 -> {
+                               try {
+                                       for(Certificate cert : Factory.toX509Certificate(x509.x509)) {
+                                               writeAnalysis(trans, x509, (X509Certificate)cert);
                                        }
-                                       
+                               } catch (CertificateException | IOException e) {
+                                       trans.error().log(e, "Error Decrypting X509");
                                }
+
                        });
                } catch (FileNotFoundException e) {
                        trans.info().log(e);