X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=ONAP-PAP-REST%2Fsrc%2Fmain%2Fjava%2Forg%2Fonap%2Fpolicy%2Fpap%2Fxacml%2Frest%2Fhandler%2FDeleteHandler.java;fp=ONAP-PAP-REST%2Fsrc%2Fmain%2Fjava%2Forg%2Fonap%2Fpolicy%2Fpap%2Fxacml%2Frest%2Fhandler%2FDeleteHandler.java;h=f71af87ccec2c47fda425f09034c9df16882958d;hb=4c38ea083e71d3be81b57a2c865572837fb72379;hp=e2c3482398aece9dbb0e439be240ee2a6a4f0aff;hpb=5e8b7f573f0f7f08be242ee017ecf1243317f1b5;p=policy%2Fengine.git diff --git a/ONAP-PAP-REST/src/main/java/org/onap/policy/pap/xacml/rest/handler/DeleteHandler.java b/ONAP-PAP-REST/src/main/java/org/onap/policy/pap/xacml/rest/handler/DeleteHandler.java index e2c348239..f71af87cc 100644 --- a/ONAP-PAP-REST/src/main/java/org/onap/policy/pap/xacml/rest/handler/DeleteHandler.java +++ b/ONAP-PAP-REST/src/main/java/org/onap/policy/pap/xacml/rest/handler/DeleteHandler.java @@ -7,9 +7,9 @@ * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at - * + * * http://www.apache.org/licenses/LICENSE-2.0 - * + * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. @@ -66,18 +66,19 @@ public class DeleteHandler { public static final String UNKNOWN = "unknown"; private static final String REGEX = "[0-9a-zA-Z._]*"; - public void doAPIDeleteFromPAP(HttpServletRequest request, HttpServletResponse response) throws IOException, SQLException { + public void doAPIDeleteFromPAP(HttpServletRequest request, HttpServletResponse response) + throws IOException, SQLException { // get the request content into a String String json = null; java.util.Scanner scanner = new java.util.Scanner(request.getInputStream()); scanner.useDelimiter("\\A"); - json = scanner.hasNext() ? scanner.next() : ""; + json = scanner.hasNext() ? scanner.next() : ""; scanner.close(); PolicyLogger.info("JSON request from API to Delete Policy from the PAP: " + json); // convert Object sent as JSON into local object StdPAPPolicy policy = PolicyUtils.jsonStringToObject(json, StdPAPPolicy.class); String policyName = policy.getPolicyName(); - Boolean policyVersionDeleted = false; + boolean policyVersionDeleted = false; String removeXMLExtension; int currentVersion; String removeVersionExtension; @@ -96,7 +97,8 @@ public class DeleteHandler { try { jpaUtils = JPAUtils.getJPAUtilsInstance(XACMLPapServlet.getEmf()); } catch (Exception e) { - PolicyLogger.error(MessageCodes.EXCEPTION_ERROR, e, "XACMLPapServlet", " Could not create JPAUtils instance on the PAP"); + PolicyLogger.error(MessageCodes.EXCEPTION_ERROR, e, "XACMLPapServlet", + " Could not create JPAUtils instance on the PAP"); response.addHeader(ERROR, "jpautils"); response.addHeader("operation", "delete"); response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); @@ -111,51 +113,55 @@ public class DeleteHandler { } EntityManager em = XACMLPapServlet.getEmf().createEntityManager(); Query policyEntityQuery = null; - try{ - if(policyName.endsWith(".xml")){ + try { + if (policyName.endsWith(".xml")) { removeXMLExtension = policyName.replace(".xml", ""); - currentVersion = Integer.parseInt(removeXMLExtension.substring(removeXMLExtension.lastIndexOf('.')+1)); + currentVersion = + Integer.parseInt(removeXMLExtension.substring(removeXMLExtension.lastIndexOf('.') + 1)); removeVersionExtension = removeXMLExtension.substring(0, removeXMLExtension.lastIndexOf('.')); boolean queryCheck = true; - if(policy.getDeleteCondition().equalsIgnoreCase("All Versions")){ - if(policyName.contains("Config_")){ + if (policy.getDeleteCondition().equalsIgnoreCase("All Versions")) { + if (policyName.contains("Config_")) { splitPolicyName = removeVersionExtension.replace(".Config_", ":Config_"); - }else if(policyName.contains("Action_")){ + } else if (policyName.contains("Action_")) { splitPolicyName = removeVersionExtension.replace(".Action_", ":Action_"); - }else if(policyName.contains("Decision_")){ + } else if (policyName.contains("Decision_")) { splitPolicyName = removeVersionExtension.replace(".Decision_", ":Decision_"); } - if(splitPolicyName != null){ + if (splitPolicyName != null) { split = splitPolicyName.split(":"); - }else{ - PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + "Failed to delete the policy. Please, provide the valid policyname."); + } else { + PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + + "Failed to delete the policy. Please, provide the valid policyname."); response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); return; } - policyEntityQuery = em.createQuery("SELECT p FROM PolicyEntity p WHERE p.policyName LIKE :pName and p.scope=:pScope"); - }else if(policy.getDeleteCondition().equalsIgnoreCase("Current Version")) { - if(policyName.contains("Config_")){ + policyEntityQuery = em.createQuery( + "SELECT p FROM PolicyEntity p WHERE p.policyName LIKE :pName and p.scope=:pScope"); + } else if (policy.getDeleteCondition().equalsIgnoreCase("Current Version")) { + if (policyName.contains("Config_")) { splitPolicyName = policyName.replace(".Config_", ":Config_"); - }else if(policyName.contains("Action_")){ + } else if (policyName.contains("Action_")) { splitPolicyName = policyName.replace(".Action_", ":Action_"); - }else if(policyName.contains("Decision_")){ + } else if (policyName.contains("Decision_")) { splitPolicyName = policyName.replace(".Decision_", ":Decision_"); } split = splitPolicyName.split(":"); queryCheck = false; - policyEntityQuery = em.createQuery("SELECT p FROM PolicyEntity p WHERE p.policyName=:pName and p.scope=:pScope"); + policyEntityQuery = em.createQuery( + "SELECT p FROM PolicyEntity p WHERE p.policyName=:pName and p.scope=:pScope"); } - if(queryCheck){ - policyEntityQuery.setParameter("pName", "%"+split[1]+"%"); - }else{ + if (queryCheck) { + policyEntityQuery.setParameter("pName", "%" + split[1] + "%"); + } else { policyEntityQuery.setParameter("pName", split[1]); } policyEntityQuery.setParameter("pScope", split[0]); List peResult = policyEntityQuery.getResultList(); - if(!peResult.isEmpty()){ + if (!peResult.isEmpty()) { Query getPolicyVersion = em.createQuery("Select p from PolicyVersion p where p.policyName=:pname"); getPolicyVersion.setParameter("pname", removeVersionExtension.replace(".", File.separator)); List pvResult = getPolicyVersion.getResultList(); @@ -163,97 +169,106 @@ public class DeleteHandler { int newVersion = 0; em.getTransaction().begin(); Class.forName(papDbDriver); - con = DriverManager.getConnection(papDbUrl,papDbUser,papDbPassword); + con = DriverManager.getConnection(papDbUrl, papDbUser, papDbPassword); - if(policy.getDeleteCondition().equalsIgnoreCase("All Versions")){ + if (policy.getDeleteCondition().equalsIgnoreCase("All Versions")) { boolean groupCheck = checkPolicyGroupEntity(con, peResult); - if(!groupCheck){ - for(Object peData : peResult){ + if (!groupCheck) { + for (Object peData : peResult) { policyEntity = (PolicyEntity) peData; status = deletePolicyEntityData(em, policyEntity); } - }else{ + } else { status = POLICY_IN_PDP; } - if(status.equals(ERROR)){ - PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + "Exception Occured while deleting the Entity from Database."); - response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); - return; - }else if(status.equals(POLICY_IN_PDP)){ - PolicyLogger.error(MessageCodes.GENERAL_WARNING + "Policy can't be deleted, it is active in PDP Groups."); - response.addHeader(ERROR, POLICY_IN_PDP); - response.setStatus(HttpServletResponse.SC_CONFLICT); - return; - }else{ - try{ - policyVersionDeleted = true; - em.remove(pVersion); - }catch(Exception e){ - logger.error(e.getMessage(),e); - policyVersionDeleted = false; - } + switch (status) { + case ERROR: + PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + + "Exception Occured while deleting the Entity from Database."); + response.addHeader(ERROR, UNKNOWN); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); + return; + case POLICY_IN_PDP: + PolicyLogger.error(MessageCodes.GENERAL_WARNING + + "Policy can't be deleted, it is active in PDP Groups."); + response.addHeader(ERROR, POLICY_IN_PDP); + response.setStatus(HttpServletResponse.SC_CONFLICT); + return; + default: + try { + policyVersionDeleted = true; + em.remove(pVersion); + } catch (Exception e) { + logger.error(e.getMessage(), e); + policyVersionDeleted = false; + } + break; } - }else if(policy.getDeleteCondition().equalsIgnoreCase("Current Version")){ + } else if (policy.getDeleteCondition().equalsIgnoreCase("Current Version")) { boolean groupCheck = checkPolicyGroupEntity(con, peResult); - if(!groupCheck){ + if (!groupCheck) { policyEntity = (PolicyEntity) peResult.get(0); status = deletePolicyEntityData(em, policyEntity); - }else{ + } else { status = POLICY_IN_PDP; } - if(ERROR.equals(status)){ - PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + "Exception Occured while deleting the Entity from Database."); + if (ERROR.equals(status)) { + PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + + "Exception Occured while deleting the Entity from Database."); response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); return; - }else if(POLICY_IN_PDP.equals(status)){ - PolicyLogger.error(MessageCodes.GENERAL_WARNING + "Policy can't be deleted, it is active in PDP Groups."); + } else if (POLICY_IN_PDP.equals(status)) { + PolicyLogger.error(MessageCodes.GENERAL_WARNING + + "Policy can't be deleted, it is active in PDP Groups."); response.addHeader(ERROR, POLICY_IN_PDP); response.setStatus(HttpServletResponse.SC_CONFLICT); return; - }else{ - if(currentVersion > 1){ - if(!peResult.isEmpty()){ - for(Object object : peResult){ + } else { + if (currentVersion > 1) { + if (!peResult.isEmpty()) { + for (Object object : peResult) { policyEntity = (PolicyEntity) object; String policyEntityName = policyEntity.getPolicyName().replace(".xml", ""); - int policyEntityVersion = Integer.parseInt(policyEntityName.substring(policyEntityName.lastIndexOf('.')+1)); - if(policyEntityVersion > newVersion){ - newVersion = policyEntityVersion-1; + int policyEntityVersion = Integer.parseInt( + policyEntityName.substring(policyEntityName.lastIndexOf('.') + 1)); + if (policyEntityVersion > newVersion) { + newVersion = policyEntityVersion - 1; } } } pVersion.setActiveVersion(newVersion); pVersion.setHigherVersion(newVersion); - try{ + try { policyVersionDeleted = true; em.persist(pVersion); - }catch(Exception e){ - logger.error(e.getMessage(),e); + } catch (Exception e) { + logger.error(e.getMessage(), e); policyVersionDeleted = false; } - }else{ - try{ + } else { + try { policyVersionDeleted = true; em.remove(pVersion); - }catch(Exception e){ - logger.error(e.getMessage(),e); + } catch (Exception e) { + logger.error(e.getMessage(), e); policyVersionDeleted = false; } } } } - }else{ - PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + "Failed to delete the policy for an unknown reason. Check the file system and other logs for further information."); + } else { + PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + + "Failed to delete the policy for an unknown reason. Check the file system and other logs" + + " for further information."); response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); return; } } em.getTransaction().commit(); - }catch(Exception e){ + } catch (Exception e) { em.getTransaction().rollback(); PolicyLogger.error(MessageCodes.EXCEPTION_ERROR, e, "XACMLPapServlet", " ERROR"); response.addHeader(ERROR, "deleteDB"); @@ -261,7 +276,7 @@ public class DeleteHandler { return; } finally { em.close(); - if(con != null){ + if (con != null) { con.close(); } } @@ -270,43 +285,44 @@ public class DeleteHandler { response.setStatus(HttpServletResponse.SC_OK); response.addHeader("successMapKey", "success"); response.addHeader("operation", "delete"); - return; } else { - PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + "Failed to delete the policy for an unknown reason. Check the file system and other logs for further information."); + PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + + "Failed to delete the policy for an unknown reason. Check the file system and other logs for " + + "further information."); response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); - return; + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); } } - public static String deletePolicyEntityData(EntityManager em, PolicyEntity policyEntity){ + public static String deletePolicyEntityData(EntityManager em, PolicyEntity policyEntity) { PolicyElasticSearchController controller = new PolicyElasticSearchController(); PolicyRestAdapter policyData = new PolicyRestAdapter(); String policyName = policyEntity.getPolicyName(); - try{ - if(policyName.contains("Config_")){ + try { + if (policyName.contains("Config_")) { em.remove(policyEntity.getConfigurationData()); - }else if(policyName.contains("Action_")){ + } else if (policyName.contains("Action_")) { em.remove(policyEntity.getActionBodyEntity()); } String searchPolicyName = policyEntity.getScope() + "." + policyEntity.getPolicyName(); policyData.setNewFileName(searchPolicyName); controller.deleteElk(policyData); em.remove(policyEntity); - }catch(Exception e){ - logger.error(e.getMessage(),e); + } catch (Exception e) { + logger.error(e.getMessage(), e); return ERROR; } return "success"; } - public static boolean checkPolicyGroupEntity(Connection con, List peResult) throws SQLException{ - for(Object peData : peResult){ + public static boolean checkPolicyGroupEntity(Connection con, List peResult) throws SQLException { + for (Object peData : peResult) { PolicyEntity policyEntity = (PolicyEntity) peData; - try(Statement st = con.createStatement(); - ResultSet rs = st.executeQuery("Select * from PolicyGroupEntity where policyid = '"+policyEntity.getPolicyId()+"'")){ + try (Statement st = con.createStatement(); + ResultSet rs = st.executeQuery( + "Select * from PolicyGroupEntity where policyid = '" + policyEntity.getPolicyId() + "'")) { boolean gEntityList = rs.next(); - if(gEntityList){ + if (gEntityList) { return true; } } @@ -314,15 +330,16 @@ public class DeleteHandler { return false; } - public void doAPIDeleteFromPDP(HttpServletRequest request, HttpServletResponse response, ONAPLoggingContext loggingContext) throws IOException { + public void doAPIDeleteFromPDP(HttpServletRequest request, HttpServletResponse response, + ONAPLoggingContext loggingContext) throws IOException { String policyName = request.getParameter("policyName"); String groupId = request.getParameter("groupId"); String responseString = null; - if(groupId != null && !groupId.matches(REGEX) ){ + if (groupId != null && !groupId.matches(REGEX)) { response.setStatus(HttpServletResponse.SC_BAD_REQUEST); - response.addHeader("error",ERROR); + response.addHeader("error", ERROR); response.addHeader("message", "Group Id is not valid"); return; } @@ -334,7 +351,7 @@ public class DeleteHandler { try { group = XACMLPapServlet.getPAPEngine().getGroup(groupId); } catch (PAPException e) { - PolicyLogger.error("Exception occured While PUT operation is performing for PDP Group"+e); + PolicyLogger.error("Exception occured While PUT operation is performing for PDP Group" + e); } if (group == null) { String message = "Unknown groupId '" + groupId + "'."; @@ -348,7 +365,8 @@ public class DeleteHandler { } else { loggingContext.setServiceName("API:PAP.deletPolicyFromPDPGroup"); if (policyName.contains("xml")) { - PolicyLogger.debug("The full file name including the extension was provided for policyName.. continue."); + PolicyLogger + .debug("The full file name including the extension was provided for policyName.. continue."); } else { String message = XACMLErrorConstants.ERROR_DATA_ISSUE + "Invalid policyName... " + "policyName must be the full name of the file to be deleted including version and extension"; @@ -359,7 +377,7 @@ public class DeleteHandler { return; } RemoveGroupPolicy removePolicy = new RemoveGroupPolicy((StdPDPGroup) group); - PDPPolicy policy = group.getPolicy(policyName); + PDPPolicy policy = group.getPolicy(policyName); if (policy != null) { if ((policy.getId().contains("Config_MS_")) || (policy.getId().contains("BRMS_Param"))) { @@ -380,35 +398,39 @@ public class DeleteHandler { return; } } - if (responseString.equals("success")) { - loggingContext.transactionEnded(); - PolicyLogger.info("Policy successfully deleted!"); - PolicyLogger.audit("Policy successfully deleted!"); - response.setStatus(HttpServletResponse.SC_OK); - response.addHeader("successMapKey", "success"); - response.addHeader("operation", "delete"); - return; - } else if (responseString.equals("No Group")) { - String message = XACMLErrorConstants.ERROR_DATA_ISSUE + "Group update had bad input."; - PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + " Group update had bad input."); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); - response.addHeader(ERROR, "groupUpdate"); - response.addHeader("message", message); - return; - } else if (responseString.equals("DB Error")) { - PolicyLogger.error(MessageCodes.ERROR_PROCESS_FLOW + " Error while updating group in the database"); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); - response.addHeader(ERROR, "deleteDB"); - return; - } else { - PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + " Failed to delete the policy for an unknown reason. Check the file system and other logs for further information."); - response.addHeader(ERROR, UNKNOWN); - response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR ); - return; + switch (responseString) { + case "success": + loggingContext.transactionEnded(); + PolicyLogger.info("Policy successfully deleted!"); + PolicyLogger.audit("Policy successfully deleted!"); + response.setStatus(HttpServletResponse.SC_OK); + response.addHeader("successMapKey", "success"); + response.addHeader("operation", "delete"); + break; + case "No Group": + String message = XACMLErrorConstants.ERROR_DATA_ISSUE + "Group update had bad input."; + PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + " Group update had bad input."); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); + response.addHeader(ERROR, "groupUpdate"); + response.addHeader("message", message); + break; + case "DB Error": + PolicyLogger.error(MessageCodes.ERROR_PROCESS_FLOW + " Error while updating group in the database"); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); + response.addHeader(ERROR, "deleteDB"); + break; + default: + PolicyLogger.error(MessageCodes.ERROR_UNKNOWN + + " Failed to delete the policy for an unknown reason. Check the file system and other logs " + + "for " + + "further information."); + response.addHeader(ERROR, UNKNOWN); + response.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); + break; } } - private String deletePolicyFromPDPGroup (OnapPDPGroup group, ONAPLoggingContext loggingContext){ + private String deletePolicyFromPDPGroup(OnapPDPGroup group, ONAPLoggingContext loggingContext) { PolicyDBDaoTransaction acPutTransaction = XACMLPapServlet.getDbDaoTransaction(); String response = null; loggingContext.setServiceName("API:PAP.DeleteHandler"); @@ -416,14 +438,16 @@ public class DeleteHandler { try { existingGroup = XACMLPapServlet.getPAPEngine().getGroup(group.getId()); } catch (PAPException e1) { - PolicyLogger.error("Exception occured While Deleting Policy From PDP Group"+e1); + PolicyLogger.error("Exception occured While Deleting Policy From PDP Group" + e1); } - if (!(group instanceof StdPDPGroup) || existingGroup == null || !(group.getId().equals(existingGroup.getId()))) { + if (!(group instanceof StdPDPGroup) || existingGroup == null || + !(group.getId().equals(existingGroup.getId()))) { String existingID = null; - if(existingGroup != null){ + if (existingGroup != null) { existingID = existingGroup.getId(); } - PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + " Group update had bad input. id=" + existingID + " objectFromJSON="+group); + PolicyLogger.error(MessageCodes.ERROR_DATA_ISSUE + " Group update had bad input. id=" + existingID + + " objectFromJSON=" + group); loggingContext.transactionEnded(); PolicyLogger.audit("Transaction Failed - See Error.log"); response = "No Group"; @@ -432,19 +456,20 @@ public class DeleteHandler { // The Path on the PAP side is not carried on the RESTful interface with the AC // (because it is local to the PAP) // so we need to fill that in before submitting the group for update - ((StdPDPGroup)group).setDirectory(((StdPDPGroup)existingGroup).getDirectory()); - try{ + ((StdPDPGroup) group).setDirectory(((StdPDPGroup) existingGroup).getDirectory()); + try { acPutTransaction.updateGroup(group, "XACMLPapServlet.doDelete"); - } catch(Exception e){ - PolicyLogger.error(MessageCodes.ERROR_PROCESS_FLOW, e, "XACMLPapServlet", " Error while updating group in the database: " - +"group="+existingGroup.getId()); + } catch (Exception e) { + PolicyLogger.error(MessageCodes.ERROR_PROCESS_FLOW, e, "XACMLPapServlet", + " Error while updating group in the database: " + + "group=" + existingGroup.getId()); response = "DB Error"; return response; } try { XACMLPapServlet.getPAPEngine().updateGroup(group); } catch (PAPException e) { - PolicyLogger.error("Exception occured While Updating PDP Groups"+e); + PolicyLogger.error("Exception occured While Updating PDP Groups" + e); response = "error in updateGroup method"; } PolicyLogger.debug("Group '" + group.getId() + "' updated"); @@ -452,11 +477,11 @@ public class DeleteHandler { // Group changed, which might include changing the policies try { newgroup = existingGroup; - } catch (Exception e) { - PolicyLogger.error("Exception occured in Group Change Method"+e); + } catch (Exception e) { + PolicyLogger.error("Exception occured in Group Change Method" + e); response = "error in groupChanged method"; } - if (response==null){ + if (response == null) { response = "success"; loggingContext.transactionEnded(); PolicyLogger.audit("Policy successfully deleted!"); @@ -466,7 +491,7 @@ public class DeleteHandler { return response; } - public OnapPDPGroup getDeletedGroup(){ + public OnapPDPGroup getDeletedGroup() { return newgroup; } @@ -476,10 +501,11 @@ public class DeleteHandler { public static DeleteHandler getInstance() { try { - Class deleteHandler = Class.forName(XACMLProperties.getProperty("deletePolicy.impl.className", DeleteHandler.class.getName())); + Class deleteHandler = Class.forName( + XACMLProperties.getProperty("deletePolicy.impl.className", DeleteHandler.class.getName())); return (DeleteHandler) deleteHandler.newInstance(); } catch (Exception e) { - logger.error(e.getMessage(),e); + logger.error(e.getMessage(), e); } return null; }