Some fixes for minor checkstyle issues.
Issue-ID: POLICY-1221
Change-Id: I86577f47283a6fa97be25d7550ed9c2d7ec026a9
Signed-off-by: liamfallon <liam.fallon@est.tech>
  * @author Ram Krishna Verma (ram.krishna.verma@ericsson.com)
  */
 public class DistributionParameterGroup implements ParameterGroup {
+    // @formatter:off
     private String name;
     private RestServerParameters restServerParameters;
     private Map<String, ReceptionHandlerParameters> receptionHandlerParameters;
-    private Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters =
-            new LinkedHashMap<>();
-    private Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters =
-            new LinkedHashMap<>();
-    private Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters =
-            new LinkedHashMap<>();
-
-
+    private Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters
+        = new LinkedHashMap<>();
+    private Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters
+        = new LinkedHashMap<>();
+    private Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters
+        = new LinkedHashMap<>();
+    // @formatter:on
 
     /**
      * Create the distribution parameter group.
      * @param name the parameter group name
      */
     public DistributionParameterGroup(final String name, final RestServerParameters restServerParameters,
-            final Map<String, ReceptionHandlerParameters> receptionHandlerParameters,
-            final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters,
-            final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters,
-            final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
+        final Map<String, ReceptionHandlerParameters> receptionHandlerParameters,
+        final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters,
+        final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters,
+        final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
         this.name = name;
         this.restServerParameters = restServerParameters;
         this.receptionHandlerParameters = receptionHandlerParameters;
     /**
      * Sets the reception handler configuration parameter map.
      *
-     * @param eventInputParameters the reception handler configuration parameters
+     * @param receptionHandlerConfigurationParameters the reception handler configuration parameters
      */
     public void setReceptionHandlerConfigurationParameters(
-            final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters) {
+        final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters) {
         this.receptionHandlerConfigurationParameters = receptionHandlerConfigurationParameters;
     }
 
      * @param policyForwarderConfigurationParameters the policy forwarder configuration parameters
      */
     public void setPolicyForwarderConfigurationParameters(
-            final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters) {
+        final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters) {
         this.policyForwarderConfigurationParameters = policyForwarderConfigurationParameters;
     }
 
      * @param policyDecoderConfigurationParameters the policyDecoderConfigurationParameters to set
      */
     public void setPolicyDecoderConfigurationParameters(
-            final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
+        final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
         this.policyDecoderConfigurationParameters = policyDecoderConfigurationParameters;
     }
 
         }
         if (restServerParameters == null) {
             validationResult.setResult("restServerParameters", ValidationStatus.INVALID,
-                    "must have restServerParameters to configure distribution rest server");
+                "must have restServerParameters to configure distribution rest server");
         } else {
             validationResult.setResult("restServerParameters", restServerParameters.validate());
         }
     private void validateReceptionHandlers(final GroupValidationResult validationResult) {
         if (receptionHandlerParameters == null || receptionHandlerParameters.size() == 0) {
             validationResult.setResult("receptionHandlerParameters", ValidationStatus.INVALID,
-                    "must have at least one reception handler");
+                "must have at least one reception handler");
         } else {
             for (final Entry<String, ReceptionHandlerParameters> nestedGroupEntry : receptionHandlerParameters
-                    .entrySet()) {
+                .entrySet()) {
                 validationResult.setResult("receptionHandlerParameters", nestedGroupEntry.getKey(),
-                        nestedGroupEntry.getValue().validate());
+                    nestedGroupEntry.getValue().validate());
             }
         }
     }
 
     private void validateForwarderConfigurations(final GroupValidationResult validationResult) {
-        for (final Entry<String, PolicyForwarderConfigurationParameterGroup> configurationParameters : 
-                policyForwarderConfigurationParameters.entrySet()) {
+        // @formatter:off
+        for (final Entry<String, PolicyForwarderConfigurationParameterGroup> configurationParameters :
+            policyForwarderConfigurationParameters.entrySet()) {
             validationResult.setResult("policyForwarderConfigurationParameters", configurationParameters.getKey(),
-                    configurationParameters.getValue().validate());
+                configurationParameters.getValue().validate());
         }
+        // @formatter:on
     }
 
     private void validateDecoderConfigurations(final GroupValidationResult validationResult) {
+        // @formatter:off
         for (final Entry<String, PolicyDecoderConfigurationParameterGroup> configurationParameters :
-                policyDecoderConfigurationParameters.entrySet()) {
+            policyDecoderConfigurationParameters.entrySet()) {
             validationResult.setResult("policyDecoderConfigurationParameters", configurationParameters.getKey(),
-                    configurationParameters.getValue().validate());
+                configurationParameters.getValue().validate());
         }
+        // @formatter:on
     }
 }
 
 package org.onap.policy.distribution.main.rest;
 
 import static org.junit.Assert.assertEquals;
-import static org.junit.Assert.assertTrue;
 
 import java.security.KeyManagementException;
 import java.security.NoSuchAlgorithmException;
 import org.onap.policy.common.logging.flexlogger.FlexLogger;
 import org.onap.policy.common.logging.flexlogger.Logger;
 import org.onap.policy.distribution.main.PolicyDistributionException;
-import org.onap.policy.distribution.main.parameters.CommonTestData;
-import org.onap.policy.distribution.main.parameters.RestServerParameters;
 import org.onap.policy.distribution.main.startstop.Main;
 
 /**
 public class TestHttpsDistributionRestServer {
 
     private static final Logger LOGGER = FlexLogger.getLogger(TestDistributionRestServer.class);
-    private static final String NOT_ALIVE = "not alive";
     private static final String ALIVE = "alive";
     private static final String SELF = "self";
     private static final String NAME = "Policy SSD";
     private static String KEYSTORE = System.getProperty("user.dir") + "/src/test/resources/ssl/policy-keystore";
 
     @Test
-    public void testHealthCheckSuccess() throws PolicyDistributionException, InterruptedException,
-        KeyManagementException, NoSuchAlgorithmException {
+    public void testHealthCheckSuccess()
+        throws PolicyDistributionException, InterruptedException, KeyManagementException, NoSuchAlgorithmException {
         final String reportString = "Report [name=Policy SSD, url=self, healthy=true, code=200, message=alive]";
         final Main main = startDistributionService();
         final HealthCheckReport report = performHealthCheck();
         main.shutdown();
     }
 
-    private HealthCheckReport performHealthCheck() throws InterruptedException, KeyManagementException,
-        NoSuchAlgorithmException {
+    private HealthCheckReport performHealthCheck()
+        throws InterruptedException, KeyManagementException, NoSuchAlgorithmException {
         HealthCheckReport response = null;
 
-        TrustManager[] noopTrustManager = new TrustManager[]{
-            new X509TrustManager() {
+        TrustManager[] noopTrustManager = new TrustManager[] { new X509TrustManager() {
 
-                @Override
-                public X509Certificate[] getAcceptedIssuers() {
-                    return new X509Certificate[0];
-                }
+            @Override
+            public X509Certificate[] getAcceptedIssuers() {
+                return new X509Certificate[0];
+            }
 
-                @Override
-                public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
-                }
+            @Override
+            public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
+            }
 
-                @Override
-                public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
-                }
+            @Override
+            public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
             }
-        };
+        } };
 
         SSLContext sc = SSLContext.getInstance("TLSv1.2");
         sc.init(null, noopTrustManager, new SecureRandom());
-        final ClientBuilder clientBuilder =
-            ClientBuilder.newBuilder().sslContext(sc).hostnameVerifier((host, session) -> true);
+        final ClientBuilder clientBuilder = ClientBuilder.newBuilder().sslContext(sc)
+            .hostnameVerifier((host, session) -> true);
         final Client client = clientBuilder.build();
         final HttpAuthenticationFeature feature = HttpAuthenticationFeature.basic("healthcheck", "zb!XztG34");
         client.register(feature);
     }
 
     private void validateReport(final String name, final String url, final boolean healthy, final int code,
-            final String message, final String reportString, final HealthCheckReport report) {
+        final String message, final String reportString, final HealthCheckReport report) {
         assertEquals(name, report.getName());
         assertEquals(url, report.getUrl());
         assertEquals(healthy, report.isHealthy());
 
 package org.onap.policy.distribution.main.rest;
 
 import static org.junit.Assert.assertEquals;
-import static org.junit.Assert.assertTrue;
 
 import java.security.KeyManagementException;
 import java.security.NoSuchAlgorithmException;
 import org.onap.policy.common.logging.flexlogger.FlexLogger;
 import org.onap.policy.common.logging.flexlogger.Logger;
 import org.onap.policy.distribution.main.PolicyDistributionException;
-import org.onap.policy.distribution.main.parameters.CommonTestData;
-import org.onap.policy.distribution.main.parameters.RestServerParameters;
 import org.onap.policy.distribution.main.startstop.Main;
 
 /**
     private static String KEYSTORE = System.getProperty("user.dir") + "/src/test/resources/ssl/policy-keystore";
 
     @Test
-    public void testHealthCheckSuccess() throws PolicyDistributionException, InterruptedException,
-        KeyManagementException, NoSuchAlgorithmException {
+    public void testHealthCheckSuccess()
+        throws PolicyDistributionException, InterruptedException, KeyManagementException, NoSuchAlgorithmException {
         final String reportString = "StatisticsReport [code=200, totalDistributionCount=0, distributionSuccessCount=0, "
-                                    + "distributionFailureCount=0, totalDownloadCount=0, "
-                                    + "downloadSuccessCount=0, downloadFailureCount=0]";
+            + "distributionFailureCount=0, totalDownloadCount=0, " + "downloadSuccessCount=0, downloadFailureCount=0]";
         final Main main = startDistributionService();
         final StatisticsReport report = performStatisticCheck();
         validateReport(200, 0, 0, 0, 0, 0, 0, reportString, report);
         main.shutdown();
     }
 
-    private StatisticsReport performStatisticCheck() throws InterruptedException, KeyManagementException,
-        NoSuchAlgorithmException {
+    private StatisticsReport performStatisticCheck()
+        throws InterruptedException, KeyManagementException, NoSuchAlgorithmException {
         StatisticsReport response = null;
 
-        TrustManager[] noopTrustManager = new TrustManager[]{
-            new X509TrustManager() {
+        TrustManager[] noopTrustManager = new TrustManager[] { new X509TrustManager() {
 
-                @Override
-                public X509Certificate[] getAcceptedIssuers() {
-                    return new X509Certificate[0];
-                }
+            @Override
+            public X509Certificate[] getAcceptedIssuers() {
+                return new X509Certificate[0];
+            }
 
-                @Override
-                public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
-                }
+            @Override
+            public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
+            }
 
-                @Override
-                public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
-                }
+            @Override
+            public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
             }
-        };
+        } };
 
         SSLContext sc = SSLContext.getInstance("TLSv1.2");
         sc.init(null, noopTrustManager, new SecureRandom());
-        final ClientBuilder clientBuilder =
-            ClientBuilder.newBuilder().sslContext(sc).hostnameVerifier((host, session) -> true);
+        final ClientBuilder clientBuilder = ClientBuilder.newBuilder().sslContext(sc)
+            .hostnameVerifier((host, session) -> true);
         final Client client = clientBuilder.build();
         final HttpAuthenticationFeature feature = HttpAuthenticationFeature.basic("healthcheck", "zb!XztG34");
         client.register(feature);
     }
 
     private void validateReport(final int code, final int total, final int successCount, final int failureCount,
-            final int download, final int downloadSuccess, final int downloadFailure, final String reportString, 
-            final StatisticsReport report) {
+        final int download, final int downloadSuccess, final int downloadFailure, final String reportString,
+        final StatisticsReport report) {
         assertEquals(code, report.getCode());
         assertEquals(total, report.getTotalDistributionCount());
         assertEquals(successCount, report.getDistributionSuccessCount());
 
 
 package org.onap.policy.distribution.reception.handling.sdc.exceptions;
 
-
 /**
  * Exception during download from Pssd.
  */
      */
     public ArtifactDownloadException(final String message) {
         super(message);
-       
+
     }
-    
+
     /**
      * Constructor for creating PssdDownloadException using message and exception.
      *
      * @param message The message to dump
-     * @param e the exception that caused this exception to be thrown
+     * @param ex the exception that caused this exception to be thrown
      */
     public ArtifactDownloadException(final String message, final Exception ex) {
         super(message, ex);
-       
+
     }
 }
 
 
 package org.onap.policy.distribution.reception.handling.sdc.exceptions;
 
-
 /**
  * Exception during artifact installation.
  */
      */
     public ArtifactInstallerException(final String message) {
         super(message);
-       
+
     }
-    
+
     /**
      * Constructor for creating ArtifactInstallerException using message and exception.
      *
      * @param message The message to dump
-     * @param e the exception that caused this exception to be thrown
+     * @param ex the exception that caused this exception to be thrown
      */
     public ArtifactInstallerException(final String message, final Exception ex) {
         super(message, ex);
-       
+
     }
 }
 
 
 package org.onap.policy.distribution.reception.handling.sdc.exceptions;
 
-
 /**
  * Exception of the Pssd controller.
  */
      */
     public PssdControllerException(final String message) {
         super(message);
-       
+
     }
-    
+
     /**
      * Constructor for creating PssdControllerException using message and exception.
      *
      * @param message The message to dump
-     * @param e the exception that caused this exception to be thrown
+     * @param ex the exception that caused this exception to be thrown
      */
     public PssdControllerException(final String message, final Exception ex) {
         super(message, ex);
-       
+
     }
 }
 
 
 package org.onap.policy.distribution.reception.handling.sdc.exceptions;
 
-
 /**
  * Exception of the Pssd controller.
  */
      */
     public PssdParametersException(final String message) {
         super(message);
-       
+
     }
-    
+
     /**
      * Constructor for creating PssdParametersException using message and exception.
      *
      * @param message The message to dump
-     * @param e the exception that caused this exception to be thrown
+     * @param ex the exception that caused this exception to be thrown
      */
     public PssdParametersException(final String message, final Exception ex) {
         super(message, ex);
-       
+
     }
 }
 
 import org.junit.Test;
 
 /**
- * Class to perform unit test of {@link PluginTerminationException}
+ * Class to perform unit test of {@link PluginTerminationException}.
  *
  * @author Ram Krishna Verma (ram.krishna.verma@ericsson.com)
  */
     @Test
     public void testPluginTerminationExceptionStringThrowable() {
         final Exception cause = new IllegalArgumentException();
-        final PluginTerminationException pluginTerminationException =
-                new PluginTerminationException("error message", cause);
+        final PluginTerminationException pluginTerminationException = new PluginTerminationException("error message",
+            cause);
         assertEquals("error message", pluginTerminationException.getMessage());
         assertEquals(cause, pluginTerminationException.getCause());
     }