Collection syntax change because of Sonar 93/55693/2
authorInstrumental <jonathan.gathman@att.com>
Tue, 3 Jul 2018 12:51:17 +0000 (07:51 -0500)
committerInstrumental <jonathan.gathman@att.com>
Tue, 3 Jul 2018 17:06:59 +0000 (12:06 -0500)
Issue-ID: AAF-386
Change-Id: I8ba8d8561d03e680ddc90a81b8db0339814c65fa
Signed-off-by: Instrumental <jonathan.gathman@att.com>
145 files changed:
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Approval.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Approver.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/CacheChange.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Cred.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/MiscID.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/MonthData.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/NS.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Notification.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Perm.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/Role.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/helpers/UserRole.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/reports/ExpiringNext.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/update/ExpiringP2.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/update/NotifyApprovals.java
auth/auth-batch/src/main/java/org/onap/aaf/auth/update/NotifyCredExpiring.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/AbsCassDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/CachedDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/CassAccess.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/Loader.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cached/CachedUserRoleDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/ArtiDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/CacheInfoDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/HistoryDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/LocateDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/Namespace.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/NsDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/OAuthTokenDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/PermDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/cass/RoleDAO.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/hl/Function.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/hl/PermLookup.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/dao/hl/Question.java
auth/auth-cass/src/main/java/org/onap/aaf/auth/direct/DirectAAFLocator.java
auth/auth-cass/src/test/java/org/onap/aaf/auth/dao/JU_Cached.java
auth/auth-cass/src/test/java/org/onap/aaf/auth/dao/JU_CassAccess.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/AAF_CM.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/ca/CA.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/cert/RDN.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/facade/FacadeImpl.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/mapper/Mapper2_0.java
auth/auth-certman/src/main/java/org/onap/aaf/auth/cm/service/CMService.java
auth/auth-certman/src/test/java/org/onap/aaf/auth/cm/ca/JU_AppCA.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/AAFcli.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/BaseCmd.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/Cmd.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/ns/ListUsersContact.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/ns/ListUsersInRole.java
auth/auth-cmd/src/main/java/org/onap/aaf/auth/cmd/ns/ListUsersWithPerm.java
auth/auth-cmd/src/test/java/org/onap/aaf/auth/cmd/test/ns/JU_List.java
auth/auth-cmd/src/test/java/org/onap/aaf/auth/cmd/test/role/JU_List.java
auth/auth-core/src/main/java/org/onap/aaf/auth/local/TextIndex.java
auth/auth-core/src/main/java/org/onap/aaf/auth/org/Organization.java
auth/auth-core/src/main/java/org/onap/aaf/auth/org/OrganizationFactory.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/Acceptor.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/CachingFileAccess.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/Match.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/RouteReport.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/Routes.java
auth/auth-core/src/main/java/org/onap/aaf/auth/rserv/TypedCode.java
auth/auth-core/src/main/java/org/onap/aaf/auth/validation/Validator.java
auth/auth-core/src/test/java/org/onap/aaf/auth/layer/test/JU_Result.java
auth/auth-core/src/test/java/org/onap/aaf/auth/local/test/JU_DataFile.java
auth/auth-core/src/test/java/org/onap/aaf/auth/rserv/test/JU_CachingFileAccess.java
auth/auth-deforg/src/main/java/org/onap/aaf/org/DefaultOrg.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/Page.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/ApiDocs.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/CMArtifactShow.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/CredDetail.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/NsDetail.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/NsHistory.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/NssShow.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/PendingRequestsShow.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/PermDetail.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/PermGrantForm.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/PermHistory.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/PermsShow.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/RequestDetail.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/RoleDetail.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/RoleDetailAction.java
auth/auth-gui/src/main/java/org/onap/aaf/auth/gui/pages/RoleHistory.java
auth/auth-locate/src/main/java/org/onap/aaf/auth/locate/facade/LocateFacadeImpl.java
auth/auth-locate/src/test/java/org/onap/aaf/auth/locate/service/JU_LocateServiceImplTest.java
auth/auth-locate/src/test/java/org/onap/aaf/auth/locate/validation/JU_LocateValidatorTest.java
auth/auth-service/src/main/java/org/onap/aaf/auth/service/AuthzCassServiceImpl.java
auth/auth-service/src/main/java/org/onap/aaf/auth/service/api/API_History.java
auth/auth-service/src/main/java/org/onap/aaf/auth/service/mapper/Mapper_2_0.java
auth/auth-service/src/test/java/org/onap/aaf/auth/service/validation/test/JU_ServiceValidator.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/AAFPermission.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/TestConnectivity.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/cert/AAFListedCertIdentity.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/v2_0/AAFCon.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/v2_0/AAFLocator.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/v2_0/AbsAAFLocator.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/v2_0/AbsAAFLur.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/configure/Agent.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/configure/ArtifactDir.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/configure/PlaceArtifactInKeystore.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/oauth/TokenClient.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/oauth/TokenClientFactory.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/oauth/TokenMgr.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/oauth/TokenPerm.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/persist/Persist.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/sso/AAFSSO.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/aaf/test/JU_AAFPermission.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/aaf/v2_0/test/JU_AAFLocator.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/cm/test/JU_Factory.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/oauth/test/JU_OAuthTest.java
cadi/aaf/src/test/java/org/onap/aaf/client/sample/Sample.java
cadi/client/src/main/java/org/onap/aaf/cadi/http/HClient.java
cadi/client/src/main/java/org/onap/aaf/cadi/locator/PropertyLocator.java
cadi/core/src/main/java/org/onap/aaf/cadi/AbsUserCache.java
cadi/core/src/main/java/org/onap/aaf/cadi/CadiWrap.java
cadi/core/src/main/java/org/onap/aaf/cadi/Capacitor.java
cadi/core/src/main/java/org/onap/aaf/cadi/PropAccess.java
cadi/core/src/main/java/org/onap/aaf/cadi/Symm.java
cadi/core/src/main/java/org/onap/aaf/cadi/User.java
cadi/core/src/main/java/org/onap/aaf/cadi/config/Config.java
cadi/core/src/main/java/org/onap/aaf/cadi/config/SecurityInfoC.java
cadi/core/src/main/java/org/onap/aaf/cadi/config/UsersDump.java
cadi/core/src/main/java/org/onap/aaf/cadi/filter/CadiFilter.java
cadi/core/src/main/java/org/onap/aaf/cadi/taf/HttpEpiTaf.java
cadi/core/src/main/java/org/onap/aaf/cadi/taf/cert/X509Taf.java
cadi/core/src/main/java/org/onap/aaf/cadi/taf/dos/DenialOfServiceTaf.java
cadi/core/src/main/java/org/onap/aaf/cadi/util/Pool.java
cadi/core/src/main/java/org/onap/aaf/cadi/wsse/XReader.java
cadi/core/src/test/java/org/onap/aaf/cadi/test/JU_AbsUserCache.java
cadi/core/src/test/java/org/onap/aaf/cadi/test/JU_User.java
cadi/core/src/test/java/org/onap/aaf/cadi/util/test/JU_Pool.java
cadi/core/src/test/java/org/onap/aaf/cadi/util/test/JU_Vars.java
misc/env/src/main/java/org/onap/aaf/misc/env/StoreImpl.java
misc/env/src/main/java/org/onap/aaf/misc/env/impl/AbsTrans.java
misc/env/src/main/java/org/onap/aaf/misc/env/impl/BasicEnv.java
misc/env/src/main/java/org/onap/aaf/misc/env/jaxb/JAXBmar.java
misc/env/src/main/java/org/onap/aaf/misc/env/jaxb/JAXBumar.java
misc/env/src/main/java/org/onap/aaf/misc/env/util/Pool.java
misc/env/src/main/java/org/onap/aaf/misc/env/util/RefreshableThreadObject.java
misc/rosetta/src/main/java/org/onap/aaf/misc/rosetta/InXML.java
misc/rosetta/src/main/java/org/onap/aaf/misc/rosetta/JaxInfo.java
misc/rosetta/src/main/java/org/onap/aaf/misc/rosetta/JaxSet.java
misc/rosetta/src/main/java/org/onap/aaf/misc/rosetta/OutXML.java
misc/rosetta/src/main/java/org/onap/aaf/misc/rosetta/XmlEscape.java
misc/xgen/src/main/java/org/onap/aaf/misc/xgen/CacheGen.java
misc/xgen/src/test/java/org/onap/aaf/misc/xgen/html/JU_HTML4GenTest.java
misc/xgen/src/test/java/org/onap/aaf/misc/xgen/html/JU_HTML5GenTest.java
misc/xgen/src/test/java/org/onap/aaf/misc/xgen/xml/JU_XMLGenTest.java

index 7963b02..58aa206 100644 (file)
@@ -114,7 +114,7 @@ public class Approval implements CacheChange.Data  {
                                                if(person!=null) {
                                                ln = byApprover.get(person);
                                                        if(ln==null) {
-                                                               ln = new ArrayList<Approval>();
+                                                               ln = new ArrayList<>();
                                                                byApprover.put(app.getApprover(), ln);
                                                        }
                                                        ln.add(app);
@@ -125,7 +125,7 @@ public class Approval implements CacheChange.Data  {
                                                if(person!=null) {
                                                        ln = byUser.get(person);
                                                        if(ln==null) {
-                                                               ln = new ArrayList<Approval>();
+                                                               ln = new ArrayList<>();
                                                                byUser.put(app.getUser(), ln);
                                                        }
                                                        ln.add(app);
@@ -134,7 +134,7 @@ public class Approval implements CacheChange.Data  {
                                                if(ticket!=null) {
                                                        ln = byTicket.get(ticket);
                                                        if(ln==null) {
-                                                               ln = new ArrayList<Approval>();
+                                                               ln = new ArrayList<>();
                                                                byTicket.put(app.getTicket(), ln);
                                                        }
                                                ln.add(app);
index 6043e43..127daac 100644 (file)
@@ -35,7 +35,7 @@ public class Approver {
        public Approver(String approver, Organization org) {
                this.name = approver;
                this.org = org;
-               userRequests = new HashMap<String, Integer>();
+               userRequests = new HashMap<>();
        }
        
        public void addRequest(String user) {
index 02f34d2..0c82184 100644 (file)
@@ -28,7 +28,7 @@ public class CacheChange<T extends CacheChange.Data> {
        private List<T> removed;
        
        public CacheChange() {
-               removed = new ArrayList<T>();
+               removed = new ArrayList<>();
        }
        
        interface Data {
index 1131aca..56fbbba 100644 (file)
@@ -43,8 +43,8 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class Cred  {
-    public static final TreeMap<String,Cred> data = new TreeMap<String,Cred>();
-    public static final TreeMap<String,List<Cred>> byNS = new TreeMap<String,List<Cred>>();
+    public static final TreeMap<String,Cred> data = new TreeMap<>();
+    public static final TreeMap<String,List<Cred>> byNS = new TreeMap<>();
 
        public final String id;
        public final List<Instance> instances;
@@ -52,7 +52,7 @@ public class Cred  {
        
        public Cred(String id) {
                this.id = id;
-               instances = new ArrayList<Instance>();
+               instances = new ArrayList<>();
                ns=Question.domain2ns(id);
        }
        
@@ -93,7 +93,7 @@ public class Cred  {
 
        
        public Set<Integer> types() {
-               Set<Integer> types = new HashSet<Integer>();
+               Set<Integer> types = new HashSet<>();
                for(Instance i : instances) {
                        types.add(i.type);
                }
@@ -155,7 +155,7 @@ public class Cred  {
                                
                                List<Cred> lscd = byNS.get(cred.ns);
                                if(lscd==null) {
-                                       byNS.put(cred.ns, (lscd=new ArrayList<Cred>()));
+                                       byNS.put(cred.ns, (lscd=new ArrayList<>()));
                                }
                                boolean found = false;
                                for(Cred c : lscd) {
index 1438ffd..d92a448 100644 (file)
@@ -36,7 +36,7 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class MiscID  {
-       public static final TreeMap<String,MiscID> data = new TreeMap<String,MiscID>();
+       public static final TreeMap<String,MiscID> data = new TreeMap<>();
        /*
        Sample Record
        aad890|mj9030|20040902|20120207
index 13a4c92..d633770 100644 (file)
@@ -36,8 +36,7 @@ import java.util.Set;
 import java.util.TreeMap;
 
 public class MonthData {
-    public final Map<Integer,Set<Row>> data = 
-               new TreeMap<Integer,Set<Row>>();
+    public final Map<Integer,Set<Row>> data = new TreeMap<>();
        private File f;
     
     public MonthData(String env) throws IOException {
@@ -69,7 +68,7 @@ public class MonthData {
     public void add(int yr_mon, String target, long total, long adds, long drops) {
                Set<Row> row = data.get(yr_mon);
                if(row==null) {
-                       data.put(yr_mon, (row=new HashSet<Row>()));
+                       data.put(yr_mon, (row=new HashSet<>()));
                }
                row.add(new Row(target,total,adds,drops));
        }
index 5dde889..172768c 100644 (file)
@@ -36,7 +36,7 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class NS implements Comparable<NS> {
-       public final static Map<String,NS> data = new TreeMap<String,NS>();
+       public final static Map<String,NS> data = new TreeMap<>();
 
        public final String name, description, parent;
        public final int scope,type;
index 9614bb1..57ff5c6 100644 (file)
@@ -71,7 +71,7 @@ public class Notification {
        }
 
 
-    public static final TreeMap<String,List<Notification>> data = new TreeMap<String,List<Notification>>();
+    public static final TreeMap<String,List<Notification>> data = new TreeMap<>();
     public static final Date now = new Date();
     
     public final String user;
@@ -113,7 +113,7 @@ public class Notification {
                                Notification not = creator.create(row);
                                List<Notification> ln = data.get(not.user);
                                if(ln==null) {
-                                       ln = new ArrayList<Notification>();
+                                       ln = new ArrayList<>();
                                        data.put(not.user, ln);
                                }
                                ln.add(not);
index 51a7098..469284a 100644 (file)
@@ -38,9 +38,9 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class Perm implements Comparable<Perm> {
-    public static final TreeMap<Perm,Set<String>> data = new TreeMap<Perm,Set<String>>();
-    public static final TreeMap<String,Perm> keys = new TreeMap<String,Perm>();
-       private static List<Perm> deletePerms = new ArrayList<Perm>();
+    public static final TreeMap<Perm,Set<String>> data = new TreeMap<>();
+    public static final TreeMap<String,Perm> keys = new TreeMap<>();
+       private static List<Perm> deletePerms = new ArrayList<>();
 
        public final String ns, type, instance, action,description;
        private String fullType = null, fullPerm = null, encode = null;
index f48544b..a173c4f 100644 (file)
@@ -39,10 +39,10 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class Role implements Comparable<Role> {
-    public static final TreeMap<Role,Set<String>> data = new TreeMap<Role,Set<String>>();
-    public static final TreeMap<String,Role> keys = new TreeMap<String,Role>();
-    public static final TreeMap<String,Role> byName = new TreeMap<String,Role>();
-       private static List<Role> deleteRoles = new ArrayList<Role>();
+    public static final TreeMap<Role,Set<String>> data = new TreeMap<>();
+    public static final TreeMap<String,Role> keys = new TreeMap<>();
+    public static final TreeMap<String,Role> byName = new TreeMap<>();
+       private static List<Role> deleteRoles = new ArrayList<>();
 
        public final String ns, name, description;
        private String full, encode;
@@ -51,7 +51,7 @@ public class Role implements Comparable<Role> {
        public Role(String full) {
                ns = name = description = "";
                this.full = full;
-               perms = new HashSet<String>();
+               perms = new HashSet<>();
        }
        
        public Role(String ns, String name, String description,Set<String> perms) {
index 9f366c8..a289fe0 100644 (file)
@@ -44,10 +44,10 @@ import com.datastax.driver.core.SimpleStatement;
 import com.datastax.driver.core.Statement;
 
 public class UserRole implements Cloneable, CacheChange.Data  {
-       public static final List<UserRole> data = new ArrayList<UserRole>();
-    public static final TreeMap<String,List<UserRole>> byUser = new TreeMap<String,List<UserRole>>();
-    public static final TreeMap<String,List<UserRole>> byRole = new TreeMap<String,List<UserRole>>();
-       private final static CacheChange<UserRole> cache = new CacheChange<UserRole>(); 
+       public static final List<UserRole> data = new ArrayList<>();
+    public static final TreeMap<String,List<UserRole>> byUser = new TreeMap<>();
+    public static final TreeMap<String,List<UserRole>> byRole = new TreeMap<>();
+       private final static CacheChange<UserRole> cache = new CacheChange<>(); 
        private static PrintStream urDelete=System.out,urRecover=System.err;
        private static int totalLoaded;
        private static int deleted;
@@ -109,14 +109,14 @@ public class UserRole implements Cloneable, CacheChange.Data  {
                                
                                List<UserRole> lur = byUser.get(ur.urdd.user);
                                if(lur==null) {
-                                       lur = new ArrayList<UserRole>();
+                                       lur = new ArrayList<>();
                                        byUser.put(ur.urdd.user, lur);
                                }
                                lur.add(ur);
                                
                                lur = byRole.get(ur.urdd.role);
                                if(lur==null) {
-                                       lur = new ArrayList<UserRole>();
+                                       lur = new ArrayList<>();
                                        byRole.put(ur.urdd.role, lur);
                                }
                                lur.add(ur);
index 2412f49..8e0257f 100644 (file)
@@ -73,7 +73,7 @@ public class ExpiringNext extends Batch {
         Date earliestUR = gc.getTime();
         Date earliestCred = gc.getTime();
         // Run for Roles
-        List<String> expiring = new ArrayList<String>();
+        List<String> expiring = new ArrayList<>();
         
         trans.info().log("Checking for Expired UserRoles");
        for(UserRole ur : UserRole.data) {
index f568b33..79e127d 100644 (file)
@@ -89,7 +89,7 @@ public class ExpiringP2 extends Batch {
                String line,prev="";
                try {
                        UserRole ur;
-                       Map<String,Count> tally = new HashMap<String,Count>();
+                       Map<String,Count> tally = new HashMap<>();
                        int count=0;
                        try {
                                while((line=urDeleteF.readLine())!=null) {
index 3314694..9653662 100644 (file)
@@ -103,7 +103,7 @@ public class NotifyApprovals extends Batch {
 
                Message msg = new Message();
                int emailCount = 0;
-               List<Approval> pending = new ArrayList<Approval>();
+               List<Approval> pending = new ArrayList<>();
                boolean isOwner,isSupervisor;
                for(Entry<String, List<Approval>> es : Approval.byApprover.entrySet()) {
                        isOwner = isSupervisor = false;
index bdf8347..c9f04f7 100644 (file)
@@ -128,12 +128,12 @@ public class NotifyCredExpiring extends Batch {
                Date tooLate = new Date(now);
                
                // Temp structures
-               Map<String,Cred> lastCred = new HashMap<String,Cred>();
-               Map<String,List<LastCred>> ownerCreds = new TreeMap<String,List<LastCred>>();
+               Map<String,Cred> lastCred = new HashMap<>();
+               Map<String,List<LastCred>> ownerCreds = new TreeMap<>();
                Date last;
                
 
-               List<LastCred> noOwner = new ArrayList<LastCred>();
+               List<LastCred> noOwner = new ArrayList<>();
                ownerCreds.put(UNKNOWN_ID,noOwner);
 
                // Get a list of ONLY the ones needing email by Owner
@@ -148,7 +148,7 @@ public class NotifyCredExpiring extends Batch {
                                                        String owner = ur.user();
                                                        List<LastCred> llc = ownerCreds.get(owner);
                                                        if(llc==null) {
-                                                               ownerCreds.put(owner, (llc=new ArrayList<LastCred>()));
+                                                               ownerCreds.put(owner, (llc=new ArrayList<>()));
                                                        }
                                                        llc.add(new LastCred(c,last));
                                                }
index 89fb12f..b5a950d 100644 (file)
@@ -71,8 +71,8 @@ public abstract class AbsCassDAO<TRANS extends TransStore,DATA> {
        protected Class<DATA> dataClass;
        private final String name;
 //     private static Slot sessionSlot; // not used since 2015
-       private static final ArrayList<AbsCassDAO<? extends TransStore,?>.PSInfo> psinfos = new ArrayList<AbsCassDAO<? extends TransStore,?>.PSInfo>();
-       private static final List<Object> EMPTY = new ArrayList<Object>(0);
+       private static final ArrayList<AbsCassDAO<? extends TransStore,?>.PSInfo> psinfos = new ArrayList<>();
+       private static final List<Object> EMPTY = new ArrayList<>(0);
        private static final Deque<ResetRequest> resetDeque = new ConcurrentLinkedDeque<ResetRequest>();
        private static boolean resetTrigger = false;
        private static long nextAvailableReset = 0;
@@ -288,7 +288,7 @@ public abstract class AbsCassDAO<TRANS extends TransStore,DATA> {
 /// TEST CODE for Exception                            
 //                             boolean force = true; 
 //                             if(force) {
-//                                     Map<InetSocketAddress, Throwable> misa = new HashMap<InetSocketAddress,Throwable>();
+//                                     Map<InetSocketAddress, Throwable> misa = new HashMap<>();
 //                                     //misa.put(new InetSocketAddress(444),new Exception("no host was tried"));
 //                                     misa.put(new InetSocketAddress(444),new Exception("Connection has been closed"));
 //                                     throw new com.datastax.driver.core.exceptions.NoHostAvailableException(misa);
@@ -338,7 +338,7 @@ public abstract class AbsCassDAO<TRANS extends TransStore,DATA> {
                        return Result.ok((List<DATA>)EMPTY); // Result sets now .emptyList(true);
                } else {
                        DATA d;
-                       List<DATA> data = indata==null?new ArrayList<DATA>(rows.size()):indata;
+                       List<DATA> data = indata==null?new ArrayList<>(rows.size()):indata;
                        
                        for(Row row : rows) {
                                try {
index 017f878..f468dba 100644 (file)
@@ -64,7 +64,7 @@ public class CachedDAO<TRANS extends Trans,D extends DAO<TRANS,DATA>,DATA extend
 
        public void add(DATA data)  {
                String key = keyFromObjs(dao.keyFrom(data));
-               List<DATA> list = new ArrayList<DATA>();
+               List<DATA> list = new ArrayList<>();
                list.add(data);
                super.add(key,list);
        }
index e70bffb..c213a04 100644 (file)
@@ -44,7 +44,7 @@ public class CassAccess {
        public static final String CASSANDRA_CLUSTERS_USER_NAME = "cassandra.clusters.user";
        public static final String CASSANDRA_CLUSTERS_PASSWORD = "cassandra.clusters.password";
        public static final String CASSANDRA_RESET_EXCEPTIONS = "cassandra.reset.exceptions";
-       private static final List<Resettable> resetExceptions = new ArrayList<Resettable>();
+       private static final List<Resettable> resetExceptions = new ArrayList<>();
        public static final String ERR_ACCESS_MSG = "Accessing Backend";
        private static Builder cb = null;
 
@@ -181,7 +181,7 @@ public class CassAccess {
                                        }
                                }
                                if(split.length>1) {
-                                       messages=new ArrayList<String>();
+                                       messages=new ArrayList<>();
                                        for(int i=1;i<split.length;++i) {
                                                String str = split[i];
                                                int start = str.startsWith("\"")?1:0;
index 485eabc..0042316 100644 (file)
@@ -143,7 +143,7 @@ public abstract class Loader<DATA> {
                if(l<0) {
                    return null;
                }
-               Set<String> set = new HashSet<String>(l);
+               Set<String> set = new HashSet<>(l);
                for(int i=0;i<l;++i) {
                        set.add(readString(is,buff));
                }
@@ -155,7 +155,7 @@ public abstract class Loader<DATA> {
                if(l<0) {
                    return null;
                }
-               List<String> list = new ArrayList<String>(l);
+               List<String> list = new ArrayList<>(l);
                for(int i=0;i<l;++i) {
                        list.add(Loader.readString(is,buff));
                }
@@ -187,7 +187,7 @@ public abstract class Loader<DATA> {
                if(l<0) {
                    return null;
                }
-               Map<String,String> map = new HashMap<String,String>(l);
+               Map<String,String> map = new HashMap<>(l);
                for(int i=0;i<l;++i) {
                        String key = readString(is,buff);
                        map.put(key,readString(is,buff));
index dce2bea..100c81d 100644 (file)
@@ -91,7 +91,7 @@ public class CachedUserRoleDAO extends CachedDAO<AuthzTrans,UserRoleDAO, UserRol
                                if(user.equals(trans.user())) {
                                        Result<List<Data>> rrbu = readByUser(trans, user);
                                        if(rrbu.isOK()) {
-                                               List<Data> ld = new ArrayList<Data>(1);
+                                               List<Data> ld = new ArrayList<>(1);
                                                for(Data d : rrbu.value) {
                                                        if(d.role.equals(role)) {
                                                                ld.add(d);
index 391b55b..a6fbeca 100644 (file)
@@ -82,18 +82,18 @@ public class ArtiDAO extends CassDAOImpl<AuthzTrans,ArtiDAO.Data> {
 //      // Getters
                public Set<String> type(boolean mutable) {
                        if (type == null) {
-                               type = new HashSet<String>();
+                               type = new HashSet<>();
                        } else if (mutable && !(type instanceof HashSet)) {
-                               type = new HashSet<String>(type);
+                               type = new HashSet<>(type);
                        }
                        return type;
                }
 
                public Set<String> sans(boolean mutable) {
                        if (sans == null) {
-                               sans = new HashSet<String>();
+                               sans = new HashSet<>();
                        } else if (mutable && !(sans instanceof HashSet)) {
-                               sans = new HashSet<String>(sans);
+                               sans = new HashSet<>(sans);
                        }
                        return sans;
                }
@@ -199,7 +199,7 @@ public class ArtiDAO extends CassDAOImpl<AuthzTrans,ArtiDAO.Data> {
                        data.mechid = readString(is,buff);
                        data.machine = readString(is,buff);
                        int size = is.readInt();
-                       data.type = new HashSet<String>(size);
+                       data.type = new HashSet<>(size);
                        for(int i=0;i<size;++i) {
                                data.type.add(readString(is,buff));
                        }
@@ -213,7 +213,7 @@ public class ArtiDAO extends CassDAOImpl<AuthzTrans,ArtiDAO.Data> {
                        data.expires = l<0?null:new Date(l);
                        data.renewDays = is.readInt();
                        size = is.readInt();
-                       data.sans = new HashSet<String>(size);
+                       data.sans = new HashSet<>(size);
                        for(int i=0;i<size;++i) {
                                data.sans.add(readString(is,buff));
                        }
index 66ab734..6d9900b 100644 (file)
@@ -63,7 +63,7 @@ import com.datastax.driver.core.exceptions.DriverException;
 public class CacheInfoDAO extends CassDAOImpl<AuthzTrans,CacheInfoDAO.Data> implements CIDAO<AuthzTrans> {
 
        private static final String TABLE = "cache";
-       public static final Map<String,Date[]> info = new ConcurrentHashMap<String,Date[]>();
+       public static final Map<String,Date[]> info = new ConcurrentHashMap<>();
 
        private static CacheUpdate cacheUpdate;
        
@@ -217,7 +217,7 @@ public class CacheInfoDAO extends CassDAOImpl<AuthzTrans,CacheInfoDAO.Data> impl
                        }
                        public void add(int[] ints) {
                                if(set==null) {
-                                       set = new HashSet<Integer>();
+                                       set = new HashSet<>();
                                        
                                        for(int i=0;i<raw.length;++i) {
                                                set.add(raw[i]);
@@ -275,7 +275,7 @@ public class CacheInfoDAO extends CassDAOImpl<AuthzTrans,CacheInfoDAO.Data> impl
                                                        start = System.nanoTime();
                                                        trans = env.newTransNoAvg();
                                                        cc = new CacheClear(trans);
-                                                       gather = new HashMap<String,IntHolder>();
+                                                       gather = new HashMap<>();
                                                }
                                                IntHolder prev = gather.get(data.table);
                                                if(prev==null) {
index 0cfc1dc..13af879 100644 (file)
@@ -82,13 +82,6 @@ public class HistoryDAO extends CassDAOImpl<AuthzTrans, HistoryDAO.Data> {
                public String target;
                public String subject;
                public String  memo;
-//             Map<String, String>  detail = null;
-//             public Map<String, String>  detail() {
-//                     if(detail == null) {
-//                             detail = new HashMap<String, String>();
-//                     }
-//                     return detail;
-//             }
                public ByteBuffer reconstruct;
        }
        
@@ -106,7 +99,6 @@ public class HistoryDAO extends CassDAOImpl<AuthzTrans, HistoryDAO.Data> {
                        data.target = row.getString(4);
                        data.subject = row.getString(5);
                        data.memo = row.getString(6);
-//                     data.detail = row.getMap(6, String.class, String.class);
                        data.reconstruct = row.getBytes(7);
                        return data;
                }
index bdf2748..4778331 100644 (file)
@@ -81,9 +81,9 @@ public class LocateDAO extends CassDAOImpl<AuthzTrans,LocateDAO.Data> {
          // Getters
                public Set<String> subprotocol(boolean mutable) {
                        if (subprotocol == null) {
-                               subprotocol = new HashSet<String>();
+                               subprotocol = new HashSet<>();
                        } else if (mutable && !(subprotocol instanceof HashSet)) {
-                               subprotocol = new HashSet<String>(subprotocol);
+                               subprotocol = new HashSet<>(subprotocol);
                        }
                        return subprotocol;
                }
@@ -191,7 +191,7 @@ public class LocateDAO extends CassDAOImpl<AuthzTrans,LocateDAO.Data> {
                        data.protocol = readString(is,buff);
                        
                        int size = is.readInt();
-                       data.subprotocol = new HashSet<String>(size);
+                       data.subprotocol = new HashSet<>(size);
                        for(int i=0;i<size;++i) {
                                data.subprotocol.add(readString(is,buff));
                        }
index 4b1ff14..11ee4bc 100644 (file)
@@ -56,7 +56,7 @@ public class Namespace implements Bytification {
                type = ndd.type;
                parent = ndd.parent;
                if(ndd.attrib!=null && !ndd.attrib.isEmpty()) {
-                       attrib = new ArrayList<Pair<String,String>>();
+                       attrib = new ArrayList<>();
                        for( Entry<String, String> entry : ndd.attrib.entrySet()) {
                                attrib.add(new Pair<String,String>(entry.getKey(),entry.getValue()));
                        }
@@ -71,7 +71,7 @@ public class Namespace implements Bytification {
                type = ndd.type;
                parent = ndd.parent;
                if(ndd.attrib!=null && !ndd.attrib.isEmpty()) {
-                       attrib = new ArrayList<Pair<String,String>>();
+                       attrib = new ArrayList<>();
                        for( Entry<String, String> entry : ndd.attrib.entrySet()) {
                                attrib.add(new Pair<String,String>(entry.getKey(),entry.getValue()));
                        }
index 567246d..0789054 100644 (file)
@@ -110,9 +110,9 @@ public class NsDAO extends CassDAOImpl<AuthzTrans,NsDAO.Data> {
 //        // Getters
                public Map<String,String> attrib(boolean mutable) {
                        if (attrib == null) {
-                               attrib = new HashMap<String,String>();
+                               attrib = new HashMap<>();
                        } else if (mutable && !(attrib instanceof HashMap)) {
-                               attrib = new HashMap<String,String>(attrib);
+                               attrib = new HashMap<>(attrib);
                        }
                        return attrib;
                }
@@ -255,7 +255,7 @@ public class NsDAO extends CassDAOImpl<AuthzTrans,NsDAO.Data> {
 //// TEST CODE for Exception                           
 //                     boolean force = true; 
 //                     if(force) {
-//                             throw new com.datastax.driver.core.exceptions.NoHostAvailableException(new HashMap<InetSocketAddress,Throwable>());
+//                             throw new com.datastax.driver.core.exceptions.NoHostAvailableException(new HashMap<>());
 ////                           throw new com.datastax.driver.core.exceptions.AuthenticationException(new InetSocketAddress(9999),"Sample Message");
 //                     }
 ////END TEST CODE
@@ -376,7 +376,7 @@ public class NsDAO extends CassDAOImpl<AuthzTrans,NsDAO.Data> {
        }
     
        public Result<Map<String,String>> readAttribByNS(AuthzTrans trans, String ns) {
-               Map<String,String> map = new HashMap<String,String>();
+               Map<String,String> map = new HashMap<>();
                TimeTaken tt = trans.start("readAttribByNS " + ns, Env.REMOTE);
                try {
                        ResultSet rs = getSession(trans).execute("SELECT key,value FROM " 
@@ -399,7 +399,7 @@ public class NsDAO extends CassDAOImpl<AuthzTrans,NsDAO.Data> {
        }
 
        public Result<Set<String>> readNsByAttrib(AuthzTrans trans, String key) {
-               Set<String> set = new HashSet<String>();
+               Set<String> set = new HashSet<>();
                TimeTaken tt = trans.start("readNsBykey " + key, Env.REMOTE);
                try {
                        ResultSet rs = getSession(trans).execute("SELECT ns FROM " 
index e1375b8..4fe3aaa 100644 (file)
@@ -80,9 +80,9 @@ public class OAuthTokenDAO extends CassDAOImpl<AuthzTrans,OAuthTokenDAO.Data> {
 
                public Set<String> scopes(boolean mutable) {
                        if (scopes == null) {
-                               scopes = new HashSet<String>();
+                               scopes = new HashSet<>();
                        } else if (mutable && !(scopes instanceof HashSet)) {
-                               scopes = new HashSet<String>(scopes);
+                               scopes = new HashSet<>(scopes);
                        }
                        return scopes;
                }
index 860b7ea..0ecdd98 100644 (file)
@@ -216,9 +216,9 @@ public class PermDAO extends CassDAOImpl<AuthzTrans,PermDAO.Data> {
         // Getters
         public Set<String> roles(boolean mutable) {
             if (roles == null) {
-                roles = new HashSet<String>();
+                roles = new HashSet<>();
             } else if (mutable && !(roles instanceof HashSet)) {
-                roles = new HashSet<String>(roles);
+                roles = new HashSet<>(roles);
             }
             return roles;
         }
index da7d7a2..974f73f 100644 (file)
@@ -90,9 +90,9 @@ public class RoleDAO extends CassDAOImpl<AuthzTrans,RoleDAO.Data> {
         // Getters
                public Set<String> perms(boolean mutable) {
                        if (perms == null) {
-                               perms = new HashSet<String>();
+                               perms = new HashSet<>();
                        } else if (mutable && !(perms instanceof HashSet)) {
-                               perms = new HashSet<String>(perms);
+                               perms = new HashSet<>(perms);
                        }
                        return perms;
                }
index b7b17c9..24f9f88 100644 (file)
@@ -117,7 +117,7 @@ public class Function {
        public static final String FOP_PERM = "perm";
        public static final String FOP_ROLE = "role";
        public static final String FOP_USER_ROLE = "user_role";
-       private static final List<Identity> NO_ADDL_APPROVE = new ArrayList<Identity>();
+       private static final List<Identity> NO_ADDL_APPROVE = new ArrayList<>();
        private static final String ROOT_NS = Define.ROOT_NS();
        // First Action should ALWAYS be "write", see "CreateRole"
        public final Question q;
@@ -134,7 +134,7 @@ public class Function {
                        if (result.notOK()) {
                                if (sb == null) {
                                        sb = new StringBuilder();
-                                       ao = new ArrayList<String>();
+                                       ao = new ArrayList<>();
                                }
                                sb.append(result.details);
                                sb.append('\n');
@@ -333,7 +333,7 @@ public class Function {
                        if (rrdc.isOKhasData()) {
                                for (RoleDAO.Data rdd : rrdc.value) {
                                        // Remove old Role from Perms, save them off
-                                       List<PermDAO.Data> lpdd = new ArrayList<PermDAO.Data>();
+                                       List<PermDAO.Data> lpdd = new ArrayList<>();
                                        for(String p : rdd.perms(false)) {
                                                Result<PermDAO.Data> rpdd = PermDAO.Data.decode(trans,q,p);
                                                if(rpdd.isOKhasData()) {
@@ -387,7 +387,7 @@ public class Function {
                        if (rpdc.isOKhasData()) {
                                for (PermDAO.Data pdd : rpdc.value) {
                                        // Remove old Perm from Roles, save them off
-                                       List<RoleDAO.Data> lrdd = new ArrayList<RoleDAO.Data>();
+                                       List<RoleDAO.Data> lrdd = new ArrayList<>();
                                        
                                        for(String rl : pdd.roles(false)) {
                                                Result<RoleDAO.Data> rrdd = RoleDAO.Data.decode(trans,q,rl);
@@ -447,11 +447,11 @@ public class Function {
                pd.action = Question.ASTERIX;
                pd.description = "AAF Namespace Write Access";
 
-               rd.perms = new HashSet<String>();
+               rd.perms = new HashSet<>();
                rd.perms.add(pd.encode());
                eb.log(q.roleDAO.create(trans, rd));
 
-               pd.roles = new HashSet<String>();
+               pd.roles = new HashSet<>();
                pd.roles.add(rd.encode());
                eb.log(q.permDAO.create(trans, pd));
        }
@@ -469,11 +469,11 @@ public class Function {
                pd.action = Question.READ;
                pd.description = "AAF Namespace Read Access";
 
-               rd.perms = new HashSet<String>();
+               rd.perms = new HashSet<>();
                rd.perms.add(pd.encode());
                eb.log(q.roleDAO.create(trans, rd));
 
-               pd.roles = new HashSet<String>();
+               pd.roles = new HashSet<>();
                pd.roles.add(rd.encode());
                eb.log(q.permDAO.create(trans, pd));
        }
@@ -825,7 +825,7 @@ public class Function {
                                    continue;
                                }
                                // Remove old Perm from Roles, save them off
-                               List<RoleDAO.Data> lrdd = new ArrayList<RoleDAO.Data>();
+                               List<RoleDAO.Data> lrdd = new ArrayList<>();
                                
                                for(String rl : pdd.roles(false)) {
                                        Result<RoleDAO.Data> rrdd = RoleDAO.Data.decode(trans,q,rl);
@@ -891,7 +891,7 @@ public class Function {
                                    continue;
                                }
                                // Remove old Role from Perms, save them off
-                               List<PermDAO.Data> lpdd = new ArrayList<PermDAO.Data>();
+                               List<PermDAO.Data> lpdd = new ArrayList<>();
                                for(String p : rdd.perms(false)) {
                                        Result<PermDAO.Data> rpdd = PermDAO.Data.decode(trans,q,p);
                                        if(rpdd.isOKhasData()) {
@@ -1439,7 +1439,7 @@ public class Function {
                }
                Date now = new Date();
                List<UserRoleDAO.Data> list = rurdd.value;
-               List<String> rv = new ArrayList<String>(list.size()); // presize
+               List<String> rv = new ArrayList<>(list.size()); // presize
                for (UserRoleDAO.Data urdd : rurdd.value) {
                        if (includeExpired || urdd.expires.after(now)) {
                                rv.add(urdd.user);
@@ -1471,7 +1471,7 @@ public class Function {
                        Organization org = trans.org();
                        // For Reapproval, only check Owners.. Do Supervisors, etc, separately
                        List<Identity> approvers = op.equals(FUTURE_OP.A)?NO_ADDL_APPROVE:org.getApprovers(trans, user);
-                       List<Identity> owners = new ArrayList<Identity>();
+                       List<Identity> owners = new ArrayList<>();
                        if (nsd != null) {
                                Result<List<UserRoleDAO.Data>> rrbr = q.userRoleDAO
                                                .readByRole(trans, nsd.name + Question.DOT_OWNER);
index 615d6b3..1544aab 100644 (file)
@@ -59,7 +59,7 @@ class PermLookup {
                PermLookup lp=null;
                Map<String, PermLookup> permMap = trans.get(Question.PERMS, null);
                if (permMap == null) {
-                       trans.put(Question.PERMS, permMap = new HashMap<String, PermLookup>());
+                       trans.put(Question.PERMS, permMap = new HashMap<>());
                } else {
                        lp = permMap.get(user);
                }
@@ -78,7 +78,7 @@ class PermLookup {
                if(userRoles==null) {
                        userRoles = q.userRoleDAO.readByUser(trans,user);
                        if(userRoles.isOKhasData()) {
-                               List<UserRoleDAO.Data> lurdd = new ArrayList<UserRoleDAO.Data>();
+                               List<UserRoleDAO.Data> lurdd = new ArrayList<>();
                                Date now = new Date();
                                for(UserRoleDAO.Data urdd : userRoles.value) {
                                        if(urdd.expires.after(now)) { // Remove Expired
@@ -104,7 +104,7 @@ class PermLookup {
                if(roles==null) {
                        Result<List<UserRoleDAO.Data>> rur = getUserRoles();
                        if(rur.isOK()) {
-                               List<RoleDAO.Data> lrdd = new ArrayList<RoleDAO.Data>();
+                               List<RoleDAO.Data> lrdd = new ArrayList<>();
                                for (UserRoleDAO.Data urdata : rur.value) {
                                        // Gather all permissions from all Roles
                                            if(urdata.ns==null || urdata.rname==null) {
@@ -130,7 +130,7 @@ class PermLookup {
                if(permNames==null) {
                        Result<List<RoleDAO.Data>> rlrd = getRoles();
                        if (rlrd.isOK()) {
-                               Set<String> pns = new TreeSet<String>();
+                               Set<String> pns = new TreeSet<>();
                                for (RoleDAO.Data rdata : rlrd.value) {
                                        pns.addAll(rdata.perms(false));
                                }
@@ -149,7 +149,7 @@ class PermLookup {
                        // Jonathan 8/12/2013
                        Result<Set<String>> rss = getPermNames();
                        if(rss.isOK()) {
-                               List<PermDAO.Data> lpdd = new ArrayList<PermDAO.Data>();
+                               List<PermDAO.Data> lpdd = new ArrayList<>();
                                for (String perm : rss.value) {
                                        if(lookup) {
                                                Result<String[]> ap = PermDAO.Data.decodeToArray(trans, q, perm);
index 95041ea..5354842 100644 (file)
@@ -235,7 +235,7 @@ public class Question {
                        nss = null;
                } else {
                        // Setup a TreeSet to check on Namespaces to 
-                       nss = new TreeSet<String>();
+                       nss = new TreeSet<>();
                        PermLookup fUser = PermLookup.get(trans, this, forUser);
                        Result<Set<String>> forUpn = fUser.getPermNames();
                        if(forUpn.notOK()) {
@@ -252,7 +252,7 @@ public class Question {
                        }
                }
 
-               List<PermDAO.Data> rlpUser = new ArrayList<PermDAO.Data>();
+               List<PermDAO.Data> rlpUser = new ArrayList<>();
                Result<PermDAO.Data> rpdd;
                PermDAO.Data pdd;
                for(String pn : plPermNames.value) {
@@ -298,7 +298,7 @@ public class Question {
                        return Result.err(rlrd);
                }
                // Using Set to avoid duplicates
-               Set<String> permNames = new HashSet<String>();
+               Set<String> permNames = new HashSet<>();
                if (rlrd.isOKhasData()) {
                        for (RoleDAO.Data drr : rlrd.value) {
                                permNames.addAll(drr.perms(false));
@@ -307,7 +307,7 @@ public class Question {
 
                // Note: It should be ok for a Valid user to have no permissions -
                // Jonathan 8/12/2013
-               List<PermDAO.Data> perms = new ArrayList<PermDAO.Data>();
+               List<PermDAO.Data> perms = new ArrayList<>();
                for (String perm : permNames) {
                        Result<PermDAO.Data> pr = PermDAO.Data.decode(trans, this, perm);
                        if (pr.notOK()) {
@@ -744,7 +744,7 @@ public class Question {
                                // Bug noticed 6/22. Sorting on the result can cause Concurrency Issues.         
                                List<CredDAO.Data> cddl;
                                if(result.value.size() > 1) {
-                                       cddl = new ArrayList<CredDAO.Data>(result.value.size());
+                                       cddl = new ArrayList<>(result.value.size());
                                        for(CredDAO.Data old : result.value) {
                                                if(old.type==CredDAO.BASIC_AUTH || old.type==CredDAO.BASIC_AUTH_SHA256) {
                                                        cddl.add(old);
@@ -1039,7 +1039,7 @@ public class Question {
 
        public static synchronized boolean specialLogOn(AuthzTrans trans, String id) {
                if (specialLog == null) {
-                       specialLog = new HashSet<String>();
+                       specialLog = new HashSet<>();
                }
                boolean rc = specialLog.add(id);
                if(rc) {
index b854def..586ae4d 100644 (file)
@@ -84,7 +84,7 @@ public class DirectAAFLocator extends AbsAAFLocator<AuthzTrans> {
                AuthzTrans trans = env.newTransNoAvg();
                Result<List<Data>> rl = ldao.readByName(trans, name);
                if(rl.isOK()) {
-                       LinkedList<EP> epl = new LinkedList<EP>();
+                       LinkedList<EP> epl = new LinkedList<>();
                        for(Data d : rl.value) {
 //                             if(myhostname!=null && d.port==myport && d.hostname.equals(myhostname)) {
 //                                     continue;
index e942f3f..31a9372 100644 (file)
@@ -75,7 +75,7 @@ public class JU_Cached {
        @Test
        public void testInvalidate(){
                Cached<Trans, DataStub> cached = new Cached<Trans, DataStub>(ciDaoMock, name, 5, 30000L);
-               cached.add("test", new ArrayList<DataStub>());
+               cached.add("test", new ArrayList<>());
                cached.invalidate("test");
                cached.invalidate("test1");
        }
index c73371e..525450a 100644 (file)
@@ -51,7 +51,7 @@ public class JU_CassAccess {
        public static final String CASSANDRA_RESET_EXCEPTIONS = "cassandra.reset.exceptions";
        public static final String LATITUDE = "LATITUDE";
        public static final String LONGITUDE = "LONGITUDE";
-       //private static final List<Resettable> resetExceptions = new ArrayList<Resettable>();
+       //private static final List<Resettable> resetExceptions = new ArrayList<>();
        public static final String ERR_ACCESS_MSG = "Accessing Backend";
        private static Builder cb = null;
        @Mock
index 17a42fc..a9a9b4e 100644 (file)
@@ -71,7 +71,7 @@ import com.datastax.driver.core.Cluster;
 public class AAF_CM extends AbsService<AuthzEnv, AuthzTrans> {
 
        private static final String USER_PERMS = "userPerms";
-       private static final Map<String,CA> certAuths = new TreeMap<String,CA>();
+       private static final Map<String,CA> certAuths = new TreeMap<>();
        public Facade1_0 facade1_0; // this is the default Facade
        public Facade1_0 facade1_0_XML; // this is the XML Facade
        public Map<String, Dated> cacheUser;
index ac3e1a5..e840ef5 100644 (file)
@@ -51,7 +51,7 @@ public abstract class CA {
        private static final String CM_TRUST_CAS = "cm_trust_cas";
        protected static final String CM_BACKUP_CAS = "cm_backup_cas";
 
-       public static final Set<String> EMPTY = Collections.unmodifiableSet(new HashSet<String>());
+       public static final Set<String> EMPTY = Collections.unmodifiableSet(new HashSet<>());
 
        
        private final String name;
index 564a4b5..b109ffc 100644 (file)
@@ -66,7 +66,7 @@ public class RDN {
         * @throws CertException
         */
        public static List<RDN> parse(final char delim, final String dnString ) throws CertException {
-               List<RDN> lrnd = new ArrayList<RDN>();
+               List<RDN> lrnd = new ArrayList<>();
                StringBuilder sb = new StringBuilder();
                boolean inQuotes = false;
                for(int i=0;i<dnString.length();++i) {
index 51a905a..794f63a 100644 (file)
@@ -365,7 +365,7 @@ public abstract class FacadeImpl<REQ,CERT,ARTIFACTS,ERROR> extends org.onap.aaf.
                jks.load(null, cap);
                
                // Get the Cert(s)... Might include Trust store
-               List<String> lcerts = new ArrayList<String>();
+               List<String> lcerts = new ArrayList<>();
                lcerts.add(cr.asCertString());
                for(String s : trustChain) {
                        lcerts.add(s);
index 76f7d9b..62a656f 100644 (file)
@@ -205,7 +205,7 @@ public class Mapper2_0 implements Mapper<BaseRequest,CertInfo,Artifacts,Error> {
         */
        @Override
        public List<ArtiDAO.Data> toArtifact(AuthzTrans trans, Artifacts artifacts) {
-               List<ArtiDAO.Data> ladd = new ArrayList<ArtiDAO.Data>();
+               List<ArtiDAO.Data> ladd = new ArrayList<>();
                for(Artifact arti : artifacts.getArtifact()) {
                        ArtiDAO.Data data = new ArtiDAO.Data();
                        data.mechid = arti.getMechid();
index ea65659..dee788e 100644 (file)
@@ -125,7 +125,7 @@ public class CMService {
                        }
 
                        List<String> notes = null;
-                       List<String> fqdns = new ArrayList<String>(req.value.fqdns);
+                       List<String> fqdns = new ArrayList<>(req.value.fqdns);
                        
                        
                        String email = null;
@@ -161,7 +161,7 @@ public class CMService {
                                                for(String cn : req.value.fqdns) {
                                                        try {
                                                                InetAddress[] ias = InetAddress.getAllByName(cn);
-                                                               Set<String> potentialSanNames = new HashSet<String>();
+                                                               Set<String> potentialSanNames = new HashSet<>();
                                                                for(InetAddress ia1 : ias) {
                                                                        InetAddress ia2 = InetAddress.getByAddress(ia1.getAddress());
                                                                        if(primary==null && ias.length==1 && trans.ip().equals(ia1.getHostAddress())) {
@@ -261,7 +261,7 @@ public class CMService {
 //                                                     }
 //                                             },
 //                                             new AAFPermission(ca.getPermType(), ca.getName(), SANS))) {
-//                                     if(notes==null) {notes = new ArrayList<String>();}
+//                                     if(notes==null) {notes = new ArrayList<>();}
 //                                     notes.add("Warning: Subject Alternative Names only allowed by Permission: Get CSO Exception.");
 //                                     return Result.err(Status.ERR_Denied, "%s must have a CSO Exception to work with SAN",trans.user());
 //                             }
index d81ea9b..1ab0f4b 100644 (file)
@@ -242,7 +242,7 @@ public class JU_AppCA {
                                
                        }
                };
-               X509andChain xac = new X509andChain(cert, new ArrayList<String>());
+               X509andChain xac = new X509andChain(cert, new ArrayList<>());
                when(localCA.sign(Mockito.any(Trans.class), Mockito.any(CSRMeta.class))).thenReturn(xac);
                certDAO = mock(CachedCertDAO.class, CALLS_REAL_METHODS);
        }
index 7e25084..1a60f68 100644 (file)
@@ -69,7 +69,7 @@ public class AAFcli {
        private List<Cmd> cmds;
 
        // Lex State
-       private ArrayList<Integer> expect = new ArrayList<Integer>();
+       private ArrayList<Integer> expect = new ArrayList<>();
        private boolean verbose = true;
        private int delay;
        private SecurityInfoC<HttpURLConnection> si;
@@ -113,7 +113,7 @@ public class AAFcli {
                /*
                 * Create Cmd Tree
                 */
-               cmds = new ArrayList<Cmd>();
+               cmds = new ArrayList<>();
 
                Role role = new Role(this);
                cmds.add(new Help(this, cmds));
@@ -358,7 +358,7 @@ public class AAFcli {
 
        private String[] argEval(String line) {
                StringBuilder sb = new StringBuilder();
-               ArrayList<String> arr = new ArrayList<String>();
+               ArrayList<String> arr = new ArrayList<>();
                boolean start = true;
                char quote = 0;
                char last = 0;
index 0bfefd2..7079fed 100644 (file)
@@ -34,12 +34,12 @@ public class BaseCmd<CMD extends Cmd> extends Cmd  {
 
        public BaseCmd(AAFcli aafcli, String name, Param ... params) {
                super(aafcli, null, name, params);
-               cmds = new ArrayList<Cmd>();
+               cmds = new ArrayList<>();
        }
        
        public BaseCmd(CMD parent, String name, Param ... params) {
                super(parent.aafcli, parent, name, params);
-               cmds = new ArrayList<Cmd>();
+               cmds = new ArrayList<>();
        }
 
        
index 7f41650..71643cd 100644 (file)
@@ -73,7 +73,7 @@ public abstract class Cmd {
        private int required;
        protected final Cmd parent;
        protected final List<Cmd> children;
-       private final static ConcurrentHashMap<Class<?>,RosettaDF<?>> dfs = new ConcurrentHashMap<Class<?>,RosettaDF<?>>();
+       private final static ConcurrentHashMap<Class<?>,RosettaDF<?>> dfs = new ConcurrentHashMap<>();
        public final AAFcli aafcli;
        protected Access access;
        private AuthzEnv env;
@@ -95,7 +95,7 @@ public abstract class Cmd {
                if(parent!=null) {
                        parent.children.add(this);
                }
-               children = new ArrayList<Cmd>();
+               children = new ArrayList<>();
                this.params = params;
                this.name = name;
                required=0;
index 1c988e3..01017e0 100644 (file)
@@ -67,7 +67,7 @@ public class ListUsersContact extends Cmd {
                                Future<Nss> fn = client.read("/authz/nss/"+ns,getDF(Nss.class));
                                if(fn.get(AAFcli.timeout())) {
                                        if(fn.value!=null) {
-                                               Set<String> uset = detail?null:new HashSet<String>();
+                                               Set<String> uset = detail?null:new HashSet<>();
                                                for(Ns n : fn.value.getNs()) {
                                                        Future<Roles> fr = client.read("/authz/roles/ns/"+n.getName(), getDF(Roles.class));
                                                        if(fr.get(AAFcli.timeout())) {
index 2ee8bd2..e49a6e9 100644 (file)
@@ -67,7 +67,7 @@ public class ListUsersInRole extends Cmd {
                                Future<Nss> fn = client.read("/authz/nss/"+ns,getDF(Nss.class));
                                if(fn.get(AAFcli.timeout())) {
                                        if(fn.value!=null) {
-                                               Set<String> uset = detail?null:new HashSet<String>();
+                                               Set<String> uset = detail?null:new HashSet<>();
                                                for(Ns n : fn.value.getNs()) {
                                                        Future<Roles> fr = client.read("/authz/roles/ns/"+n.getName(), getDF(Roles.class));
                                                        if(fr.get(AAFcli.timeout())) {
index 97ccf56..1a4ed7a 100644 (file)
@@ -67,7 +67,7 @@ public class ListUsersWithPerm extends Cmd {
                                Future<Nss> fn = client.read("/authz/nss/"+ns,getDF(Nss.class));
                                if(fn.get(AAFcli.timeout())) {
                                        if(fn.value!=null) {
-                                               Set<String> uset = detail?null:new HashSet<String>();
+                                               Set<String> uset = detail?null:new HashSet<>();
                                                
                                                for(Ns n : fn.value.getNs()) {
                                                        Future<Perms> fp = client.read("/authz/perms/ns/"+n.getName()+(aafcli.isDetailed()?"?ns":"")
index 3edce8d..a6d2130 100644 (file)
@@ -61,7 +61,7 @@ public class JU_List {
        private class NssStub extends Nss {
                public void addNs(Nss.Ns ns) {  
                        if (this.ns == null) {
-                   this.ns = new ArrayList<Nss.Ns>();
+                   this.ns = new ArrayList<>();
                }
                        this.ns.add(ns);
                }
@@ -69,21 +69,21 @@ public class JU_List {
                private class NsStub extends Ns{
                        public void addAttrib(Nss.Ns.Attrib attrib) {
                    if ( this.attrib == null) {
-                       this.attrib = new ArrayList<Nss.Ns.Attrib>();
+                       this.attrib = new ArrayList<>();
                    }
                    this.attrib.add(attrib);
                }
                        
                        public void addResponsible(String str) {
                    if (this.responsible == null) {
-                       this.responsible = new ArrayList<String>();
+                       this.responsible = new ArrayList<>();
                    }
                    this.responsible.add(str);
                }
                        
                        public void addAdmin(String str) {
                    if (this.admin == null) {
-                       this.admin = new ArrayList<String>();
+                       this.admin = new ArrayList<>();
                    }
                    this.admin.add(str);
                }
index 0c85fc3..84b3caa 100644 (file)
@@ -87,7 +87,7 @@ public class JU_List {
        private class RolesStub extends Roles {
                public void addRole(aaf.v2_0.Role role) {
                        if (this.role == null) {
-                               this.role = new ArrayList<aaf.v2_0.Role>();
+                               this.role = new ArrayList<>();
                        }
                        this.role.add(role);
                }
@@ -97,7 +97,7 @@ public class JU_List {
                
                public void addPerms(Pkey perms) {
                if (this.perms == null) {
-                   this.perms = new ArrayList<Pkey>();
+                   this.perms = new ArrayList<>();
                }
                this.perms.add(perms); 
            }
index 6ef6a76..39225f7 100644 (file)
@@ -89,7 +89,7 @@ public class TextIndex {
                        }
                }
                
-               List<Integer> entries = new ArrayList<Integer>();
+               List<Integer> entries = new ArrayList<>();
                for(int i=min;i<=max;++i) {
                        ttok.pos(i*REC_SIZE);
                        tib.rewind();
@@ -127,7 +127,7 @@ public class TextIndex {
        public void create(final Trans trans,final DataFile data, int maxLine, char delim, int fieldOffset, int skipLines) throws IOException {
                FileChannel fos;
                
-               List<Idx> list = new LinkedList<Idx>(); // Some hashcodes will double... DO NOT make a set
+               List<Idx> list = new LinkedList<>(); // Some hashcodes will double... DO NOT make a set
                TimeTaken tt2 = trans.start("Open Files", Env.SUB);
                RandomAccessFile raf=null;
                try {
index 8476e06..bbae00c 100644 (file)
@@ -307,11 +307,11 @@ public interface Organization {
        public static final Organization NULL = new Organization() 
        {
                private final GregorianCalendar gc = new GregorianCalendar(1900, 1, 1);
-               private final List<Identity> nullList = new ArrayList<Identity>();
-               private final Set<String> nullStringSet = new HashSet<String>();
+               private final List<Identity> nullList = new ArrayList<>();
+               private final Set<String> nullStringSet = new HashSet<>();
                private String[] nullStringArray = new String[0];
                private final Identity nullIdentity = new Identity() {
-                       List<String> nullUser = new ArrayList<String>();
+                       List<String> nullUser = new ArrayList<>();
                        @Override
                        public String type() {
                                return N_A;
index 57d37d0..f950703 100644 (file)
@@ -48,7 +48,7 @@ import org.onap.aaf.misc.env.impl.BasicEnv;
 public class OrganizationFactory {
        private static final String ORGANIZATION_DOT = "Organization.";
        private static Organization defaultOrg = null;
-       private static Map<String,Organization> orgs = new ConcurrentHashMap<String,Organization>();
+       private static Map<String,Organization> orgs = new ConcurrentHashMap<>();
        public static Organization init(BasicEnv env) throws OrganizationException {
                int idx = ORGANIZATION_DOT.length();
                Organization org,firstOrg = null;
index 1953694..82a226e 100644 (file)
@@ -41,7 +41,7 @@ class Acceptor<TRANS extends Trans>  {
        
        public Acceptor(List<Pair<String, Pair<HttpCode<TRANS,?>, List<Pair<String, Object>>>>> types) {
                this.types = types;
-               acceptable = new ArrayList<Pair<String, Pair<HttpCode<TRANS,?>, List<Pair<String, Object>>>>>();
+               acceptable = new ArrayList<>();
        }
        
        private boolean eval(HttpCode<TRANS,?> code, String str, List<String> props) {
@@ -128,7 +128,7 @@ class Acceptor<TRANS extends Trans>  {
                int cis,cie=-1,cend;
                int sis,sie,send;
                String name;
-               ArrayList<String> props = new ArrayList<String>();
+               ArrayList<String> props = new ArrayList<>();
                do {
                        // Clear these in case more than one Semi
                        props.clear(); // on loop, do not want mixed properties
index 5a03a09..bc563f3 100644 (file)
@@ -109,11 +109,11 @@ public class CachingFileAccess<TRANS extends Trans> extends HttpCode<TRANS, Void
        public CachingFileAccess(EnvJAXB env, String ... args) throws IOException {
                super(null,"Caching File Access");
                setEnv(env,args);
-               content = new ConcurrentSkipListMap<String,Content>(); // multi-thread changes possible
+               content = new ConcurrentSkipListMap<>(); // multi-thread changes possible
 
-               attachOnly = new HashSet<String>();     // short, unchanged
+               attachOnly = new HashSet<>();     // short, unchanged
 
-               typeMap = new TreeMap<String,String>(); // Structure unchanged after Construction
+               typeMap = new TreeMap<>(); // Structure unchanged after Construction
                typeMap.put("ico","image/icon");
                typeMap.put("html","text/html");
                typeMap.put("css","text/css");
@@ -540,7 +540,7 @@ public class CachingFileAccess<TRANS extends Trans> extends HttpCode<TRANS, Void
                public void run() {
                        int size = content.size();
                        if(size>maxSize) {
-                               ArrayList<Comp> scont = new ArrayList<Comp>(size);
+                               ArrayList<Comp> scont = new ArrayList<>(size);
                                Object[] entries = content.entrySet().toArray();
                                for(int i=0;i<size;++i) {
                                        scont.add(i, new Comp((Map.Entry<String,Content>)entries[i]));
index ac8b31c..e4eb239 100644 (file)
@@ -51,7 +51,7 @@ public class Match {
         */
        public Match(String path) {
                // IF DEBUG: System.out.print("\n[" + path + "]");
-               params = new HashMap<String,Integer>();
+               params = new HashMap<>();
                if(path!=null) {
                        String[] pa = path.split("/");
                        values = new byte[pa.length][];
index 5de2ebe..1c946e8 100644 (file)
@@ -28,6 +28,6 @@ public class RouteReport {
        public HttpMethods meth;
        public String path;
        public String desc;
-       public final List<String> contextTypes = new ArrayList<String>();
+       public final List<String> contextTypes = new ArrayList<>();
 
 }
index fefb8f3..7cfadf2 100644 (file)
@@ -80,7 +80,7 @@ public class Routes<TRANS extends Trans> {
        }
        
        public List<RouteReport> routeReport() {
-               ArrayList<RouteReport> ltr = new ArrayList<RouteReport>();
+               ArrayList<RouteReport> ltr = new ArrayList<>();
                for(int i=0;i<end;++i) {
                        ltr.add(routes[i].api());
                }
index 82b291c..4425886 100644 (file)
@@ -59,7 +59,7 @@ public class TypedCode<TRANS extends Trans> extends Content<TRANS> {
                private List<Pair<String, Pair<HttpCode<TRANS,?>,List<Pair<String, Object>>>>> types;
 
                public TypedCode() {
-                       types = new ArrayList<Pair<String,Pair<HttpCode<TRANS,?>,List<Pair<String,Object>>>>>();
+                       types = new ArrayList<>();
                }
                
                /**
@@ -88,7 +88,7 @@ public class TypedCode<TRANS extends Trans> extends Content<TRANS> {
                @Override
                protected Pair<String, Pair<HttpCode<TRANS,?>, List<Pair<String, Object>>>> types(HttpCode<TRANS,?> code, String str) {
                        Pair<String, Pair<HttpCode<TRANS,?>,List<Pair<String, Object>>>> type = null;
-                       ArrayList<Pair<String, Object>> props = new ArrayList<Pair<String,Object>>();
+                       ArrayList<Pair<String, Object>> props = new ArrayList<>();
                        // Want Q percentage is to be first in the array everytime.  If not listed, 1.0 is default
                        props.add(new Pair<String,Object>(Q,1f));
                        Pair<HttpCode<TRANS,?>, List<Pair<String,Object>>> cl = new Pair<HttpCode<TRANS,?>, List<Pair<String,Object>>>(code, props);
@@ -227,7 +227,7 @@ public class TypedCode<TRANS extends Trans> extends Content<TRANS> {
                
                public void api(RouteReport tr) {
                        // Need to build up a map, because Prop entries can be in several places.
-                       HashMap<HttpCode<?,?>,StringBuilder> psb = new HashMap<HttpCode<?,?>,StringBuilder>();
+                       HashMap<HttpCode<?,?>,StringBuilder> psb = new HashMap<>();
                        StringBuilder temp;
                        tr.desc = null;
                        
index 7078cf0..de20e47 100644 (file)
@@ -49,7 +49,7 @@ public class Validator {
        private StringBuilder msgs;
 
        static {
-               nsKeywords = new ArrayList<String>();
+               nsKeywords = new ArrayList<>();
                nsKeywords.add(".access");
                nsKeywords.add(".owner");
                nsKeywords.add(".admin");
index 3219e47..a172ad2 100644 (file)
@@ -73,7 +73,7 @@ public class JU_Result {
 
                Collection<String> col1 = new ArrayList();
                List<String> list1 = new ArrayList();
-               Set<String> set1 = new HashSet<String>();
+               Set<String> set1 = new HashSet<>();
                Integer[] R1 = new Integer[0];
                set1.add("derp");
                list1.add("test");
index d0094db..559b275 100644 (file)
@@ -46,7 +46,7 @@ public class JU_DataFile {
 //             File file = new File("../authz-batch/data/v1.dat");
 //             DataFile df = new DataFile(file,"r");
 //             int count = 0;
-//             List<String> list = new ArrayList<String>();
+//             List<String> list = new ArrayList<>();
 //             try {
 //                     df.open();
 //                     Token tok = df.new Token(1024000);
index e9c382d..3d1f006 100644 (file)
@@ -122,7 +122,7 @@ public class JU_CachingFileAccess {
 
        @Test
        public void testCleanupParams() {
-               NavigableMap<String,org.onap.aaf.auth.rserv.Content> content = new ConcurrentSkipListMap<String,org.onap.aaf.auth.rserv.Content>();
+               NavigableMap<String,org.onap.aaf.auth.rserv.Content> content = new ConcurrentSkipListMap<>();
                cachingFileAccess.cleanupParams(50, 500); //TODO: find right input
        }
 
@@ -170,7 +170,7 @@ public class JU_CachingFileAccess {
 
        @Test
        public void testInvalidate() {
-               //NavigableMap<String,org.onap.aaf.auth.rserv.Content> content = new ConcurrentSkipListMap<String,org.onap.aaf.auth.rserv.Content>();
+               //NavigableMap<String,org.onap.aaf.auth.rserv.Content> content = new ConcurrentSkipListMap<>();
                //Content con = mock(Content.class);
                //content.put("hello", con);
                cachingFileAccess.invalidate("hello");
index eefb273..dd4a826 100644 (file)
@@ -62,7 +62,7 @@ public class DefaultOrg implements Organization {
        public DefaultOrg(Env env, String realm) throws OrganizationException {
 
                this.realm = realm;
-               supportedRealms=new HashSet<String>();
+               supportedRealms=new HashSet<>();
                supportedRealms.add(realm);
                domain=FQI.reverseDomain(realm);
                atDomain = '@'+domain;
@@ -126,7 +126,7 @@ public class DefaultOrg implements Organization {
        }
 
        // Implement your own Delegation System
-       static final List<String> NULL_DELEGATES = new ArrayList<String>();
+       static final List<String> NULL_DELEGATES = new ArrayList<>();
 
        public Identities identities;
        private boolean dryRun;
@@ -135,7 +135,7 @@ public class DefaultOrg implements Organization {
        private final static Set<String> typeSet;
 
        static {
-               typeSet = new HashSet<String>();
+               typeSet = new HashSet<>();
                for(Types t : Types.values()) {
                        typeSet.add(t.name());
                }
@@ -251,7 +251,7 @@ public class DefaultOrg implements Organization {
        public Response notify(AuthzTrans trans, Notify type, String url, String[] identities, String[] ccs, String summary, Boolean urgent) {
                String system = trans.getProperty("CASS_ENV", "");
 
-               ArrayList<String> toList = new ArrayList<String>();
+               ArrayList<String> toList = new ArrayList<>();
                Identity identity;
                if (identities != null) {
                        for (String user : identities) {
@@ -278,7 +278,7 @@ public class DefaultOrg implements Organization {
                        return Response.ERR_NotificationFailure;
                }
 
-               ArrayList<String> ccList = new ArrayList<String>();
+               ArrayList<String> ccList = new ArrayList<>();
 
                // If we're sending an urgent email, CC the user's supervisor
                //
@@ -393,7 +393,7 @@ public class DefaultOrg implements Organization {
 
                int status = 1;
 
-               List<String> to = new ArrayList<String>();
+               List<String> to = new ArrayList<>();
                for(String em : toList) {
                        if(em.indexOf('@')<0) {
                                to.add(new DefaultOrgIdentity(trans, em, this).email());
@@ -402,7 +402,7 @@ public class DefaultOrg implements Organization {
                        }
                }
 
-               List<String> cc = new ArrayList<String>();
+               List<String> cc = new ArrayList<>();
                if(ccList!=null) {
                        if(!ccList.isEmpty()) {
 
@@ -461,7 +461,7 @@ public class DefaultOrg implements Organization {
                                        message.addHeader("X-Priority", "1");
                                }
 
-                               ArrayList<String> newBody = new ArrayList<String>();
+                               ArrayList<String> newBody = new ArrayList<>();
 
                                Address temp[] = getAddresses(to);
                                String headerString = "TO:\t" + InternetAddress.toString(temp) + "\n";
@@ -574,7 +574,7 @@ public class DefaultOrg implements Organization {
        @Override
        public List<Identity> getApprovers(AuthzTrans trans, String user) throws OrganizationException {
                Identity orgIdentity = getIdentity(trans, user);
-               List<Identity> orgIdentitys = new ArrayList<Identity>();
+               List<Identity> orgIdentitys = new ArrayList<>();
                if(orgIdentity!=null) {
                        Identity supervisor = orgIdentity.responsibleTo();
                        if(supervisor!=null) {
index 436b37a..346c8ae 100644 (file)
@@ -83,7 +83,7 @@ public class Page extends HTMLCacheGen {
        public final boolean no_cache;
 
        // Note: Only access is synchronized in "getPerm"
-       private final static Map<String,Map<String,Permission>> perms = new HashMap<String,Map<String,Permission>>();
+       private final static Map<String,Map<String,Permission>> perms = new HashMap<>();
 
        public String name() {
                return bcName;
@@ -379,7 +379,7 @@ public class Page extends HTMLCacheGen {
                Map<String,Permission> msp = perms.get(instance);
                Permission p;
                if(msp==null) {
-                       msp = new HashMap<String,Permission>();
+                       msp = new HashMap<>();
                        perms.put(instance, msp);
                        p=null;
                } else {
index 40d57c9..95aa052 100644 (file)
@@ -161,12 +161,12 @@ public class ApiDocs extends Page {
                
                @Override
                public Cells get(final AuthzTrans trans, final AAF_GUI gui) {
-                       final ArrayList<AbsCell[]> ns = new ArrayList<AbsCell[]>();
-                       final ArrayList<AbsCell[]> perms = new ArrayList<AbsCell[]>();
-                       final ArrayList<AbsCell[]> roles = new ArrayList<AbsCell[]>();
-                       final ArrayList<AbsCell[]> user = new ArrayList<AbsCell[]>();
-                       final ArrayList<AbsCell[]> aafOnly = new ArrayList<AbsCell[]>();
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> ns = new ArrayList<>();
+                       final ArrayList<AbsCell[]> perms = new ArrayList<>();
+                       final ArrayList<AbsCell[]> roles = new ArrayList<>();
+                       final ArrayList<AbsCell[]> user = new ArrayList<>();
+                       final ArrayList<AbsCell[]> aafOnly = new ArrayList<>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        
        
                        final TimeTaken tt = trans.start("AAF APIs",Env.REMOTE);
index 296e41e..d423731 100644 (file)
@@ -159,7 +159,7 @@ public class CMArtifactShow extends Page {
                                return Cells.EMPTY;
                        }
                        final String id = str.indexOf('@')>=0?str:str + '@' + FQI.reverseDomain(sc.get(trans,Params.ns, ""));
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        final TimeTaken tt = trans.start("AAF X509 Details",Env.REMOTE);
                        try {
                                gui.cmClientAsUser(trans.getUserPrincipal(),new Retryable<Void>() {
index 8c7c876..208c750 100644 (file)
@@ -148,7 +148,7 @@ public class CredDetail extends Page {
                        if(ns==null) {
                                return Cells.EMPTY;
                        }
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        final TimeTaken tt = trans.start("AAF Cred Details",Env.REMOTE);
                        List<Artifact> la; 
                        try {
@@ -164,7 +164,7 @@ public class CredDetail extends Page {
                                        }
 
                                });
-                               final Set<String> lns = new HashSet<String>();
+                               final Set<String> lns = new HashSet<>();
                                if(la!=null) {
                                        for(Artifact a : la){
                                                lns.add(a.getMechid());
@@ -176,7 +176,7 @@ public class CredDetail extends Page {
                                                Future<Users> fu = client.read("/authn/creds/ns/"+ns,gui.getDF(Users.class));
                                                if(fu.get(AAFcli.timeout())) {
                                                        // Organize User entries
-                                                       Map<String,List<Map<Integer,List<User>>>> users = new HashMap<String,List<Map<Integer,List<User>>>>();
+                                                       Map<String,List<Map<Integer,List<User>>>> users = new HashMap<>();
                
                                                        List<Map<Integer,List<User>>> lmu=null;
                                                        Map<Integer, List<User>> mu = null;
@@ -188,7 +188,7 @@ public class CredDetail extends Page {
                                                                }
                                                                lmu = users.get(u.getId());
                                                                if(lmu==null) {
-                                                                       users.put(u.getId(),lmu=new ArrayList<Map<Integer,List<User>>>());
+                                                                       users.put(u.getId(),lmu=new ArrayList<>());
                                                                }
                                                                mu=null;
                                                                for(Map<Integer,List<User>> xmu : lmu) {
@@ -198,12 +198,12 @@ public class CredDetail extends Page {
                                                                }
                                                                
                                                                if(mu==null) {
-                                                                       lmu.add(mu=new HashMap<Integer,List<User>>());
+                                                                       lmu.add(mu=new HashMap<>());
                                                                }
                                                                
                                                                lu = mu.get(u.getType());
                                                                if(lu==null) {
-                                                                       mu.put(u.getType(),lu = new ArrayList<User>());
+                                                                       mu.put(u.getType(),lu = new ArrayList<>());
                                                                }
                                                                lu.add(u);
                                                        }
index 8c442dd..0a74d60 100644 (file)
@@ -109,7 +109,7 @@ public class NsDetail extends Page {
                        if(nsName==null) {
                                return Cells.EMPTY;
                        }
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        rv.add(new AbsCell[]{new TextCell("Name:"),new TextCell(nsName)});
 
                        final TimeTaken tt = trans.start("AAF Namespace Details",Env.REMOTE);
@@ -144,7 +144,7 @@ public class NsDetail extends Page {
                                                                                                        "/authz/roles/ns/"+nsName, 
                                                                                                        gui.getDF(Roles.class)
                                                                                                        );
-                                                                       List<String> roles = new ArrayList<String>();
+                                                                       List<String> roles = new ArrayList<>();
                                                                        if(fr.get(AAFcli.timeout())) {
                                                                                for (Role r : fr.value.getRole()) {
                                                                                        roles.add(r.getName());
@@ -157,7 +157,7 @@ public class NsDetail extends Page {
                                                                                                        "/authz/perms/ns/"+nsName, 
                                                                                                        gui.getDF(Perms.class)
                                                                                                        );
-                                                                       List<String> perms = new ArrayList<String>();
+                                                                       List<String> perms = new ArrayList<>();
                        
                                                                        if(fp.get(AAFcli.timeout())) {
                                                                                for (Perm p : fp.value.getPerm()) {
index 96ec002..6d55858 100644 (file)
@@ -168,7 +168,7 @@ public class NsHistory extends Page {
                                return Cells.EMPTY;
                        }
                        
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        String msg = null;
                        final TimeTaken tt = trans.start("AAF Get History for Namespace ["+oName+"]",Env.REMOTE);
                        try {
index 02aedc5..fecd232 100644 (file)
@@ -83,7 +83,7 @@ public class NssShow extends Page {
                
                @Override
                public Cells get(final AuthzTrans trans, final AAF_GUI gui) {
-                       ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       ArrayList<AbsCell[]> rv = new ArrayList<>();
                        List<Ns> nss = trans.get(sNssByUser, null);
                        if(nss==null) {
                                TimeTaken tt = trans.start("AAF Nss by User for " + privilege,Env.REMOTE);
index 9d2b2cb..6e7081b 100644 (file)
@@ -117,7 +117,7 @@ public class PendingRequestsShow extends Page {
                
                @Override
                public Cells get(final AuthzTrans trans, final AAF_GUI gui) {
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        try {
                                gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Void>() {
                                        @Override
index 822d0bf..01c96a6 100644 (file)
@@ -96,7 +96,7 @@ public class PermDetail extends Page {
                                trans.warn().printf("Error in PermDetail Request: %s", v.errs());
                                return Cells.EMPTY;
                        }
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        rv.add(new AbsCell[]{new TextCell("Type:"),new TextCell(pType)});
                        rv.add(new AbsCell[]{new TextCell("Instance:"),new TextCell(pInstance)});
                        rv.add(new AbsCell[]{new TextCell("Action:"),new TextCell(pAction)});
index 1c5bc4c..db3d741 100644 (file)
@@ -125,7 +125,7 @@ public class PermGrantForm extends Page {
        }
                
        private static List<String> getMyRoles(final AAF_GUI gui, final AuthzTrans trans) {
-               final List<String> myRoles = new ArrayList<String>();
+               final List<String> myRoles = new ArrayList<>();
                try {
                        gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Void>() {
                                @Override
index b7a9960..37a2c22 100644 (file)
@@ -175,7 +175,7 @@ public class PermHistory extends Page {
                                return Cells.EMPTY;
                        }
                        
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        String msg = null;
                        try {
                                gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Void>() {
index 5f5c287..9b39945 100644 (file)
@@ -77,7 +77,7 @@ public class PermsShow extends Page {
                
                @Override
                public Cells get(final AuthzTrans trans, final AAF_GUI gui) {
-                       final ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       final ArrayList<AbsCell[]> rv = new ArrayList<>();
                        TimeTaken tt = trans.start("AAF Perms by User",Env.REMOTE);
                        try {
                                gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Void>() {
index 626b7da..3e959ef 100644 (file)
@@ -86,7 +86,7 @@ public class RequestDetail extends Page {
                                                @Override
                                                public Cells code(Rcli<?> client) throws CadiException, ConnectException, APIException {
                                                        TimeTaken tt = trans.start("AAF Approval Details",Env.REMOTE);
-                                                       ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                                                       ArrayList<AbsCell[]> rv = new ArrayList<>();
                                                        try {
                                                                Future<Approvals> fa = client.read(
                                                                        "/authz/approval/ticket/"+ticket, 
index a4d8bed..a39bf82 100644 (file)
@@ -181,7 +181,7 @@ public class RoleDetail extends Page {
                public Cells get(final AuthzTrans trans, final AAF_GUI gui) {
                        final String pRole = trans.get(sRoleName, null);
                        final Role role = trans.get(sRole,null);
-                       ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                       ArrayList<AbsCell[]> rv = new ArrayList<>();
                        
                        if(role!=null) {
                                boolean mayWrite = trans.get(sMayWrite, false);
index f2d2c01..f9f919a 100644 (file)
@@ -76,7 +76,7 @@ public class RoleDetailAction extends Page {
                                                                        /*fail =*/ gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Boolean>() {
                                                                                @Override
                                                                                public Boolean code(Rcli<?> client) throws CadiException, ConnectException, APIException {
-                                                                                       List<TypedFuture> ltf = new ArrayList<TypedFuture>();
+                                                                                       List<TypedFuture> ltf = new ArrayList<>();
                                                                                        String text;
                                                                                        Map<String, String[]> pm = (Map<String, String[]>)req.getParameterMap();
                                                                                        for(final Entry<String, String[]> es : pm.entrySet()) {
index 5f7625a..4a9bd36 100644 (file)
@@ -171,7 +171,7 @@ public class RoleHistory extends Page {
                                        rv = gui.clientAsUser(trans.getUserPrincipal(), new Retryable<Cells>() {
                                                @Override
                                                public Cells code(Rcli<?> client) throws CadiException, ConnectException, APIException {
-                                                       ArrayList<AbsCell[]> rv = new ArrayList<AbsCell[]>();
+                                                       ArrayList<AbsCell[]> rv = new ArrayList<>();
                                                        TimeTaken tt = trans.start("AAF Get History for Namespace ["+oName+"]",Env.REMOTE);
                                                        String msg = null;
                                                        try {
index f7b9c36..f655657 100644 (file)
@@ -95,7 +95,7 @@ public abstract class LocateFacadeImpl<IN,OUT,ENDPOINTS,MGMT_ENDPOINTS,CONFIGURA
 
 
        private static long cacheClear = 0L, emptyCheck=0L;
-       private final static Map<String,String> epsCache = new HashMap<String, String>(); // protected manually, in getEndpoints
+       private final static Map<String,String> epsCache = new HashMap<>(); // protected manually, in getEndpoints
 
        public LocateFacadeImpl(AuthzEnv env, LocateService<IN,OUT,ENDPOINTS,MGMT_ENDPOINTS,CONFIGURATION,ERROR> service, Data.TYPE dataType) throws APIException {
                this.service = service;
index c79e9cb..c66de60 100644 (file)
@@ -90,7 +90,7 @@ public class JU_LocateServiceImplTest {
 \r
                assertEquals(endPointResult, output);\r
 \r
-               List<MgmtEndpoint> mgmtEndPoints = new ArrayList<MgmtEndpoint>();\r
+               List<MgmtEndpoint> mgmtEndPoints = new ArrayList<>();\r
                mgmtEndPoints.add(mgmtEndPoint);\r
 \r
                when(mgmtEndPoint.getName()).thenReturn("http.Endpoint1");\r
index 80248d2..0339f31 100644 (file)
@@ -83,7 +83,7 @@ public class JU_LocateValidatorTest {
     public void testSubProtoCol() {\r
         LocateValidator validator = new LocateValidator();\r
 \r
-        List<String> subProtocol = new ArrayList<String>();\r
+        List<String> subProtocol = new ArrayList<>();\r
         subProtocol.add(null);\r
 \r
         when(endpoint.getName()).thenReturn("EndPoint.Endpoint1");\r
@@ -127,20 +127,20 @@ public class JU_LocateValidatorTest {
         when(endpoint.getHostname()).thenReturn("HOST1");\r
         when(endpoint.getPort()).thenReturn(9090);\r
         when(endpoint.getProtocol()).thenReturn("HTTP");\r
-        List<String> subprotocol = new ArrayList<String>();\r
+        List<String> subprotocol = new ArrayList<>();\r
         when(endpoint.getSubprotocol()).thenReturn(subprotocol);\r
 \r
-        List<Endpoint> endpointList = new ArrayList<Endpoint>();\r
+        List<Endpoint> endpointList = new ArrayList<>();\r
         endpointList.add(endpoint);\r
 \r
         when(mgmtEndpoint.getName()).thenReturn("EndPoint.Endpoint1");\r
         when(mgmtEndpoint.getHostname()).thenReturn("HOST1");\r
         when(mgmtEndpoint.getPort()).thenReturn(9090);\r
         when(mgmtEndpoint.getProtocol()).thenReturn("HTTP");\r
-        List<SpecialPorts> specialPorts = new ArrayList<SpecialPorts>();\r
+        List<SpecialPorts> specialPorts = new ArrayList<>();\r
         specialPorts.add(null);\r
         when(mgmtEndpoint.getSpecialPorts()).thenReturn(specialPorts);\r
-        List<MgmtEndpoint> mgmtEndpoints = new ArrayList<MgmtEndpoint>();\r
+        List<MgmtEndpoint> mgmtEndpoints = new ArrayList<>();\r
         mgmtEndpoints.add(mgmtEndpoint);\r
 \r
         when(endpoints.getEndpoint()).thenReturn(endpointList);\r
@@ -160,20 +160,20 @@ public class JU_LocateValidatorTest {
         when(mgmtEndpoint.getPort()).thenReturn(9090);\r
         when(mgmtEndpoint.getProtocol()).thenReturn("HTTP");\r
 \r
-        List<SpecialPorts> specialPorts = new ArrayList<SpecialPorts>();\r
+        List<SpecialPorts> specialPorts = new ArrayList<>();\r
         specialPorts.add(specialPort);\r
 \r
         when(specialPort.getName()).thenReturn("Port1");\r
         when(specialPort.getProtocol()).thenReturn("HTTP");\r
         when(specialPort.getPort()).thenReturn(9090);\r
 \r
-        List<String> versions = new ArrayList<String>();\r
+        List<String> versions = new ArrayList<>();\r
         versions.add("1");\r
 \r
         when(specialPort.getProtocolVersions()).thenReturn(versions);\r
 \r
         when(mgmtEndpoint.getSpecialPorts()).thenReturn(specialPorts);\r
-        List<MgmtEndpoint> mgmtEndpoints = new ArrayList<MgmtEndpoint>();\r
+        List<MgmtEndpoint> mgmtEndpoints = new ArrayList<>();\r
         mgmtEndpoints.add(mgmtEndpoint);\r
 \r
         when(me.getMgmtEndpoint()).thenReturn(mgmtEndpoints);\r
index f320779..668d482 100644 (file)
@@ -568,8 +568,8 @@ public class AuthzCassServiceImpl   <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                if(urd.notOKorIsEmpty()) {
                        return Result.err(urd);
                }
-               Map<String, Namespace> lm = new HashMap<String,Namespace>();
-               Map<String, Namespace> other = full || endsWith==null?null:new TreeMap<String,Namespace>();
+               Map<String, Namespace> lm = new HashMap<>();
+               Map<String, Namespace> other = full || endsWith==null?null:new TreeMap<>();
                for(UserRoleDAO.Data urdd : urd.value) {
                        if(full) {
                                if(endsWith==null || urdd.role.endsWith(endsWith)) {
@@ -604,8 +604,8 @@ public class AuthzCassServiceImpl   <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                                                        }
                                                        if(namespace==null) {
                                                                namespace = new Namespace(nsd.value);
-                                                               namespace.admin=new ArrayList<String>();
-                                                               namespace.owner=new ArrayList<String>();
+                                                               namespace.admin=new ArrayList<>();
+                                                               namespace.owner=new ArrayList<>();
                                                        }
                                                        if(endsWith==null || urdd.role.endsWith(endsWith)) {
                                                                lm.put(namespace.name,namespace);
@@ -679,7 +679,7 @@ public class AuthzCassServiceImpl   <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        return Result.err(rnd); 
                }
 
-               Set<Namespace> lm = new HashSet<Namespace>();
+               Set<Namespace> lm = new HashSet<>();
                Result<List<NsDAO.Data>> rlnd = ques.nsDAO.dao().getChildren(trans, parent);
                if(rlnd.isOK()) {
                        if(rlnd.isEmpty()) {
@@ -1301,7 +1301,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                }
                
                // Create a set of Update Roles, which are in Internal Format
-               Set<String> updtRoles = new HashSet<String>();
+               Set<String> updtRoles = new HashSet<>();
                Result<NsSplit> nss;
                for(String role : updt.value.roles(false)) {
                        nss = ques.deriveNsSplit(trans, role);
@@ -3114,7 +3114,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
        //                      filter = false;
                        
                        // Get list of roles per user, then add to Roles as we go
-                       HashSet<UserRoleDAO.Data> userSet = new HashSet<UserRoleDAO.Data>();
+                       HashSet<UserRoleDAO.Data> userSet = new HashSet<>();
                        Result<List<UserRoleDAO.Data>> rlurd = ques.userRoleDAO.readByRole(trans, role);
                        if(rlurd.isOK()) {
                                for(UserRoleDAO.Data data : rlurd.value) {
@@ -3186,7 +3186,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        
                        List<UserRoleDAO.Data> content;
                        if(mustFilter) {
-                               content = new ArrayList<UserRoleDAO.Data>(rlurd.value.size()); // avoid multi-memory redos
+                               content = new ArrayList<>(rlurd.value.size()); // avoid multi-memory redos
                                
                                for(UserRoleDAO.Data data : rlurd.value) {
                                        ndd.name=data.ns;
@@ -3231,7 +3231,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        return Result.err(Status.ERR_BadData,v.errs());
                }
 
-               Set<String> currRoles = new HashSet<String>();
+               Set<String> currRoles = new HashSet<>();
                Result<List<UserRoleDAO.Data>> rlurd = ques.userRoleDAO.readByUser(trans, rurdd.value.user);
                if(rlurd.isOK()) {
                        for(UserRoleDAO.Data data : rlurd.value) {
@@ -3325,7 +3325,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        return Result.err(nsr); 
                }
 
-               Set<String> currUsers = new HashSet<String>();
+               Set<String> currUsers = new HashSet<>();
                Result<List<UserRoleDAO.Data>> rlurd = ques.userRoleDAO.readByRole(trans, rurdd.value.role);
                if(rlurd.isOK()) { 
                        for(UserRoleDAO.Data data : rlurd.value) {
@@ -3541,7 +3541,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        return Result.err(rnd); 
                }
                
-               HashSet<UserRoleDAO.Data> userSet = new HashSet<UserRoleDAO.Data>();
+               HashSet<UserRoleDAO.Data> userSet = new HashSet<>();
                Result<List<UserRoleDAO.Data>> rlurd = ques.userRoleDAO.readUserInRole(trans, user, role);
                if(rlurd.isOK()) {
                        for(UserRoleDAO.Data data : rlurd.value) {
@@ -3593,7 +3593,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        }
                }
                
-               HashSet<UserRoleDAO.Data> userSet = new HashSet<UserRoleDAO.Data>();
+               HashSet<UserRoleDAO.Data> userSet = new HashSet<>();
                Result<List<UserRoleDAO.Data>> rlurd = ques.userRoleDAO.readByRole(trans, role);
                if(rlurd.isOK()) { 
                        for(UserRoleDAO.Data data : rlurd.value) {
@@ -3657,8 +3657,8 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                // Get list of roles per Permission, 
                // Then loop through Roles to get Users
                // Note: Use Sets to avoid processing or responding with Duplicates
-               Set<String> roleUsed = new HashSet<String>();
-               Set<UserRoleDAO.Data> userSet = new HashSet<UserRoleDAO.Data>();
+               Set<String> roleUsed = new HashSet<>();
+               Set<UserRoleDAO.Data> userSet = new HashSet<>();
                
                if(!nss.isEmpty()) {
                        Result<List<PermDAO.Data>> rlp = ques.permDAO.readByType(trans, nss.value.ns, nss.value.name);
@@ -4025,8 +4025,8 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        }
 
                        if(curr.isOKhasData()) {
-                       Map<String, Result<List<DelegateDAO.Data>>> delegateCache = new HashMap<String, Result<List<DelegateDAO.Data>>>();
-                       Map<UUID, FutureDAO.Data> futureCache = new HashMap<UUID, FutureDAO.Data>();
+                       Map<String, Result<List<DelegateDAO.Data>>> delegateCache = new HashMap<>();
+                       Map<UUID, FutureDAO.Data> futureCache = new HashMap<>();
                        FutureDAO.Data hasDeleted = new FutureDAO.Data();
                        
                            for(ApprovalDAO.Data cd : curr.value) {
@@ -4177,7 +4177,7 @@ public class AuthzCassServiceImpl <NSS,PERMS,PERMKEY,ROLES,USERS,USERROLES,DELGS
                        return Result.err(Status.ERR_BadData,v.errs());
                }
                
-               List<ApprovalDAO.Data> listRapds = new ArrayList<ApprovalDAO.Data>();
+               List<ApprovalDAO.Data> listRapds = new ArrayList<>();
                
                Result<List<ApprovalDAO.Data>> myRapd = ques.approvalDAO.readByApprover(trans, approver);
                if(myRapd.notOK()) {
index 8c55e7d..9044e17 100644 (file)
@@ -185,7 +185,7 @@ public class API_History {
                // Sonar says threading issues.
                SimpleDateFormat FMT = new SimpleDateFormat("yyyyMM");
                String yyyymm = req.getParameter("yyyymm");
-               ArrayList<Integer> ai= new ArrayList<Integer>();
+               ArrayList<Integer> ai= new ArrayList<>();
                if(yyyymm==null) {
                        GregorianCalendar gc = new GregorianCalendar();
                        // three months is the default
index 0fa5897..06278f9 100644 (file)
@@ -292,7 +292,7 @@ public class Mapper_2_0 implements Mapper<Nss, Perms, Pkey, Roles, Users, UserRo
 
        @Override
        public Result<List<PermDAO.Data>> perms(AuthzTrans trans, Perms perms) {
-               List<PermDAO.Data> lpd = new ArrayList<PermDAO.Data>();
+               List<PermDAO.Data> lpd = new ArrayList<>();
                for (Perm p : perms.getPerm()) {
                        Result<NsSplit> nss = q.deriveNsSplit(trans, p.getType());
                        PermDAO.Data pd = new PermDAO.Data();
@@ -790,7 +790,7 @@ public class Mapper_2_0 implements Mapper<Nss, Perms, Pkey, Roles, Users, UserRo
        
        @Override
        public Result<List<ApprovalDAO.Data>> approvals(Approvals apprs) {
-               List<ApprovalDAO.Data>  lappr = new ArrayList<ApprovalDAO.Data>();
+               List<ApprovalDAO.Data>  lappr = new ArrayList<>();
                for(Approval a : apprs.getApprovals()) {
                        ApprovalDAO.Data ad = new ApprovalDAO.Data();
                        String str = a.getId();
index f304fcc..872161a 100644 (file)
@@ -91,7 +91,7 @@ public class JU_ServiceValidator {
                to.ns = "namespace";
                to.name = "name";
                to.description = "description";
-               Set<String> permissions = new HashSet<String>();
+               Set<String> permissions = new HashSet<>();
                permissions.add("perm1");
                to.perms = permissions;
 
index e586d99..3b78394 100644 (file)
@@ -39,7 +39,7 @@ public class AAFPermission implements Permission {
        private List<String> roles;
        
        static {
-               NO_ROLES = new ArrayList<String>();
+               NO_ROLES = new ArrayList<>();
        }
 
        protected AAFPermission() {roles=NO_ROLES;}
index cd08cd4..d873205 100644 (file)
@@ -133,7 +133,7 @@ public class TestConnectivity {
                print(true,"Load Security Setters from Configuration Information");
                String user = access.getProperty(Config.AAF_APPID);
 
-               ArrayList<SecuritySetter<HttpURLConnection>> lss = new ArrayList<SecuritySetter<HttpURLConnection>>();
+               ArrayList<SecuritySetter<HttpURLConnection>> lss = new ArrayList<>();
                
 
                try {
index bc1f94d..abd1c40 100644 (file)
@@ -118,9 +118,9 @@ public class AAFListedCertIdentity implements CertIdentity {
                @Override
                public void run() {
                        try {
-                               TreeMap<ByteArrayHolder, String> newCertsMap = new TreeMap<ByteArrayHolder,String>();
-                               Map<String,Set<String>> newTrustMap = new TreeMap<String,Set<String>>();
-                               Set<String> userLookup = new HashSet<String>();
+                               TreeMap<ByteArrayHolder, String> newCertsMap = new TreeMap<>();
+                               Map<String,Set<String>> newTrustMap = new TreeMap<>();
+                               Set<String> userLookup = new HashSet<>();
                                for(String s : certIDs) {
                                        userLookup.add(s);
                                }
@@ -132,7 +132,7 @@ public class AAFListedCertIdentity implements CertIdentity {
                                                        aafcon.access.log(Level.WARN, "AAF Lookup-No IDs in Role com.att.aaf.trustForID <> "+authMech);
                                                } else {
                                                        aafcon.access.log(Level.INFO,"Loading Trust Authentication Info for",authMech);
-                                                       Set<String> hsUser = new HashSet<String>();
+                                                       Set<String> hsUser = new HashSet<>();
                                                        for(User u : users) {
                                                                userLookup.add(u.getId());
                                                                hsUser.add(u.getId());
index 286104e..b076379 100644 (file)
@@ -62,7 +62,7 @@ public abstract class AAFCon<CLIENT> implements Connector {
        // Package access
        final public int timeout, cleanInterval, connTimeout;
        final public int highCount, userExpires, usageRefreshTriggerCount;
-       private Map<String,Rcli<CLIENT>> clients = new ConcurrentHashMap<String,Rcli<CLIENT>>();
+       private Map<String,Rcli<CLIENT>> clients = new ConcurrentHashMap<>();
        final public RosettaDF<Perms> permsDF;
        final public RosettaDF<Certs> certsDF;
        final public RosettaDF<Users> usersDF;
index ee64954..4ae1a05 100644 (file)
@@ -109,7 +109,7 @@ public class AAFLocator extends AbsAAFLocator<BasicTrans>  {
                        client.send();
                        Future<Endpoints> fr = client.futureRead(epsDF, TYPE.JSON);
                        if(fr.get(client.timeout())) {
-                               List<EP> epl = new LinkedList<EP>();
+                               List<EP> epl = new LinkedList<>();
                                for(Endpoint endpoint : fr.value.getEndpoint()) {
                                        epl.add(new EP(endpoint,latitude,longitude));
                                }
index 312c58e..f090906 100644 (file)
@@ -75,7 +75,7 @@ public abstract class AbsAAFLocator<TRANS extends Trans> implements Locator<URI>
                        }
                }
 
-               epList = new LinkedList<EP>();
+               epList = new LinkedList<>();
                refreshWait = refreshMin;
 
                this.access = access;
@@ -261,7 +261,7 @@ public abstract class AbsAAFLocator<TRANS extends Trans> implements Locator<URI>
                if(!hasItems()) {
                        throw new LocatorException("No Entries found" + (pathInfo==null?"":(" for " + pathInfo)));
                }
-               List<EP> lep = new ArrayList<EP>();
+               List<EP> lep = new ArrayList<>();
                EP first = null;
                // Note: Deque is sorted on the way by closest distance
                Iterator<EP> iter = getIterator();
index 083537a..9feeee3 100644 (file)
@@ -132,7 +132,7 @@ public abstract class AbsAAFLur<PERM extends Permission> extends AbsUserCache<PE
                                        } else {
                                                sb.append("\n\tUser does not contain ");
                                                sb.append(pond.getKey());
-                                               List<Permission> perms = new ArrayList<Permission>();
+                                               List<Permission> perms = new ArrayList<>();
                                                user.copyPermsTo(perms);
                                                for(Permission p : perms) {
                                                        sb.append("\n\t\t");
index 3c8719b..b19be6c 100644 (file)
@@ -174,7 +174,7 @@ public class Agent {
                                permDF = env.newDataFactory(Perms.class);
                                errMsg = new ErrMessage(env);
        
-                               placeArtifact = new HashMap<String,PlaceArtifact>();
+                               placeArtifact = new HashMap<>();
                                placeArtifact.put(JKS, new PlaceArtifactInKeystore(JKS));
                                placeArtifact.put(PKCS12, new PlaceArtifactInKeystore(PKCS12));
                                placeArtifact.put(FILE, new PlaceArtifactInFiles());
index 74cf4e4..266ace8 100644 (file)
@@ -48,11 +48,11 @@ public abstract class ArtifactDir implements PlaceArtifact {
 
        protected static final String C_R = "\n";
        protected File dir;
-       private List<String> encodeds = new ArrayList<String>();
+       private List<String> encodeds = new ArrayList<>();
        
        private Symm symm;
        // This checks for multiple passes of Dir on the same objects.  Run clear after done.
-       protected static Map<String,Object> processed = new HashMap<String,Object>();
+       protected static Map<String,Object> processed = new HashMap<>();
 
 
        /**
index 2a522bc..cb28260 100644 (file)
@@ -64,8 +64,8 @@ public class PlaceArtifactInKeystore extends ArtifactDir {
                        // find where the trusts end in 1.0 API
                
                        X509Certificate x509;
-                       List<X509Certificate> chainList = new ArrayList<X509Certificate>();
-                       Set<X509Certificate> caSet = new HashSet<X509Certificate>();
+                       List<X509Certificate> chainList = new ArrayList<>();
+                       Set<X509Certificate> caSet = new HashSet<>();
                        for(Certificate c : certColl) {
                                x509 = (X509Certificate)c;
                                // Is a Root (self-signed, anyway)
@@ -98,7 +98,7 @@ public class PlaceArtifactInKeystore extends ArtifactDir {
                        PrivateKey pk = Factory.toPrivateKey(trans, certInfo.getPrivatekey());
                        addEncProperty(Config.CADI_KEY_PASSWORD, keyPass);
                        addProperty(Config.CADI_ALIAS, arti.getMechid());
-//                     Set<Attribute> attribs = new HashSet<Attribute>();
+//                     Set<Attribute> attribs = new HashSet<>();
 //                     if(kst.equals("pkcs12")) {
 //                             // Friendly Name
 //                             attribs.add(new PKCS12Attribute("1.2.840.113549.1.9.20", arti.getNs()));
index dec0b4e..2ebd7dc 100644 (file)
@@ -274,7 +274,7 @@ public class TokenClient {
                Result<TimedToken> rtt = factory.get(key,hash,new Loader<TimedToken>() {
                        @Override
                        public Result<TimedToken> load(final String key) throws APIException, CadiException, LocatorException {
-                               final List<String> params = new ArrayList<String>();
+                               final List<String> params = new ArrayList<>();
                                params.add(scope);
                                addSecurity(params,authn_method);
                        
@@ -331,7 +331,7 @@ public class TokenClient {
                if(ss==null) {
                        throw new APIException("client_creds(...) must be set before obtaining Access Tokens");
                }
-               final List<String> params = new ArrayList<String>();
+               final List<String> params = new ArrayList<>();
                params.add("refresh_token="+token.getRefreshToken());
                addSecurity(params,AUTHN_METHOD.refresh_token);
                final String scope="scope="+token.getScope().replace(' ', '+');
@@ -373,7 +373,7 @@ public class TokenClient {
                return tkCon.best(new Retryable<Result<Introspect>>() {
                                @Override
                                public Result<Introspect> code(Rcli<?> client) throws CadiException, ConnectException, APIException {
-                                       final List<String> params = new ArrayList<String>();
+                                       final List<String> params = new ArrayList<>();
                                        params.add("token="+token);
                                        addSecurity(params,AUTHN_METHOD.client_credentials);
                                        final String paramsa[] = new String[params.size()];
index 2b89576..c284898 100644 (file)
@@ -54,7 +54,7 @@ import aafoauth.v2_0.Token;
 
 public class TokenClientFactory extends Persist<Token,TimedToken> {
        private static TokenClientFactory instance;
-       private Map<String,AAFConHttp> aafcons = new ConcurrentHashMap<String, AAFConHttp>();
+       private Map<String,AAFConHttp> aafcons = new ConcurrentHashMap<>();
        private SecurityInfoC<HttpURLConnection> hsi;
        // Package on purpose
        final Symm symm;
index d8fd88f..4e781bf 100644 (file)
@@ -44,9 +44,9 @@ import aaf.v2_0.Perms;
 import aafoauth.v2_0.Introspect;
 
 public class TokenMgr extends Persist<Introspect, TokenPerm> {
-       protected static Map<String,TokenPerm> tpmap = new ConcurrentHashMap<String, TokenPerm>();
-       protected static Map<String,TokenMgr> tmmap = new HashMap<String, TokenMgr>(); // synchronized in getInstance
-       protected static Map<String,String> currentToken = new HashMap<String,String>(); // synchronized in getTP
+       protected static Map<String,TokenPerm> tpmap = new ConcurrentHashMap<>();
+       protected static Map<String,TokenMgr> tmmap = new HashMap<>(); // synchronized in getInstance
+       protected static Map<String,String> currentToken = new HashMap<>(); // synchronized in getTP
        public static RosettaDF<Perms> permsDF;
        public static RosettaDF<Introspect> introspectDF;
 
index 4a0259a..5c77fda 100644 (file)
@@ -42,7 +42,7 @@ import aaf.v2_0.Perms;
 import aafoauth.v2_0.Introspect;
 
 public class TokenPerm extends Persisting<Introspect>{
-       private static final List<AAFPermission> NULL_PERMS = new ArrayList<AAFPermission>();
+       private static final List<AAFPermission> NULL_PERMS = new ArrayList<>();
        private Introspect introspect;
        private List<AAFPermission> perms;
        private String scopes;
@@ -99,7 +99,7 @@ public class TokenPerm extends Persisting<Introspect>{
                        while((pd = ij.parse(r,pd.reuse())).valid()) {
                                switch(pd.event) {
                                        case Parse.START_DOC:
-                                               perms = new ArrayList<AAFPermission>();
+                                               perms = new ArrayList<>();
                                                break;
                                        case Parse.START_ARRAY:
                                                inPerms = "perm".equals(pd.name);
index 9754b1e..11acbe9 100644 (file)
@@ -65,7 +65,7 @@ public abstract class Persist<T,CT extends Persistable<T>> extends PersistFile {
                super(access, sub_dir);
                this.env = env;
                df = env.newDataFactory(cls);
-               tmap = new ConcurrentHashMap<String, CT>();
+               tmap = new ConcurrentHashMap<>();
                synchronized(Persist.class) {
                        if(clean==null) {
                                clean = new Timer(true);
index f2fb705..28103b5 100644 (file)
@@ -454,7 +454,7 @@ public class AAFSSO {
 
        private List<String> parseArgs(String[] args)
        {
-               List<String> larg = new ArrayList<String>(args.length);
+               List<String> larg = new ArrayList<>(args.length);
 
                // Cover for bash's need to escape *.. (\\*)
                // also, remove SSO if required
index 10958a2..4836e4e 100644 (file)
@@ -44,7 +44,7 @@ public class JU_AAFPermission {
 
        @Before
        public void setup() {
-               roles = new ArrayList<String>();
+               roles = new ArrayList<>();
                roles.add(role);
        }
 
index 3b2ce7b..eeb9c62 100644 (file)
@@ -97,7 +97,7 @@ public class JU_AAFLocator {
        public static void tearDownAfterClass() throws Exception {
                Field field = SecurityInfoC.class.getDeclaredField("sicMap");
                field.setAccessible(true);
-               field.set(null, new HashMap<Class<?>,SecurityInfoC<?>>());
+               field.set(null, new HashMap<>());
        }
 
        @Test
index b47abe2..5827e8c 100644 (file)
@@ -238,7 +238,7 @@ public class JU_Factory {
                output = Factory.toString(transMock, certs.toArray(new Certificate[0])[0]);
                assertThat(output, is(certString));
 
-               List<String> certStrings = new ArrayList<String>();
+               List<String> certStrings = new ArrayList<>();
                certStrings.add(certString);
                certStrings.add(certString);
                certs = Factory.toX509Certificate(certStrings);
@@ -318,7 +318,7 @@ public class JU_Factory {
 
        private String cleanupString(String str) {
                String[] lines = str.split("\n", 0);
-               List<String> rawLines = new ArrayList<String>();
+               List<String> rawLines = new ArrayList<>();
                for (int i = 0; i < lines.length - 2; i++) {
                        rawLines.add(lines[i + 1]);
                }
index a30f274..555eda4 100644 (file)
@@ -79,7 +79,7 @@ public class JU_OAuthTest {
        public static void tearDownAfterClass() throws Exception {
                Field field = SecurityInfoC.class.getDeclaredField("sicMap");
                field.setAccessible(true);
-               field.set(null, new HashMap<Class<?>,SecurityInfoC<?>>());
+               field.set(null, new HashMap<>());
        }
 
        @Before
index ff17077..45a7d34 100644 (file)
@@ -105,7 +105,7 @@ public class Sample {
        }
        
        public List<Permission> allAuthorization(Principal fqi) {
-               List<Permission> pond = new ArrayList<Permission>();
+               List<Permission> pond = new ArrayList<>();
                aafLur.fishAll(fqi, pond);
                return pond;
        }
index df8cacf..a3dac7d 100644 (file)
@@ -93,7 +93,7 @@ public class HClient implements EClient<HttpURLConnection> {
        @Override
        public void addHeader(String tag, String value) {
                if (headers == null)
-                       headers = new ArrayList<Header>();
+                       headers = new ArrayList<>();
                headers.add(new Header(tag, value));
        }
 
index 4591122..b75e8bc 100644 (file)
@@ -65,7 +65,7 @@ public class PropertyLocator implements Locator<URI> {
                        throw new LocatorException("No Location List given for PropertyLocator");
                }
                String[] locarray = Split.split(',',locList);
-               List<URI> uriList = new ArrayList<URI>();
+               List<URI> uriList = new ArrayList<>();
                
                random = new SecureRandom();
                
@@ -177,7 +177,7 @@ public class PropertyLocator implements Locator<URI> {
        public synchronized boolean refresh() {
                if(System.currentTimeMillis()>lastRefreshed) {
                        // Build up list
-                       List<URI> resolve = new ArrayList<URI>();
+                       List<URI> resolve = new ArrayList<>();
                        String realname;
                        for(int i = 0; i < orig.length ; ++i) {
                                try {
index c65a9b2..1d01a3e 100644 (file)
@@ -55,7 +55,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
        private static Timer timer;
        // Map of userName to User
        private final Map<String, User<PERM>> userMap;
-       private static final Map<String, Miss> missMap = new TreeMap<String,Miss>();
+       private static final Map<String, Miss> missMap = new TreeMap<>();
        private final Symm missEncrypt;
        
        private Clean clean;
@@ -73,7 +73,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
                }
                missEncrypt = s;
                
-               userMap = new ConcurrentHashMap<String, User<PERM>>();
+               userMap = new ConcurrentHashMap<>();
 
                
                if(cleanInterval>0) {
@@ -236,7 +236,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
        }
        
        public final List<DumpInfo> dumpInfo() {
-               List<DumpInfo> rv = new ArrayList<DumpInfo>();
+               List<DumpInfo> rv = new ArrayList<>();
                for(User<PERM> user : userMap.values()) {
                        rv.add(new DumpInfo(user));
                }
@@ -265,7 +265,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
        
 
        // Simple map of Group name to a set of User Names
-       //      private Map<String, Set<String>> groupMap = new HashMap<String, Set<String>>();
+       //      private Map<String, Set<String>> groupMap = new HashMap<>();
 
        /**
         * Class to hold a small subset of the data, because we don't want to expose actual Permission or User Objects
@@ -276,7 +276,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
                
                public DumpInfo(User<PERM> user) {
                        this.user = user.principal.getName();
-                       perms = new ArrayList<String>(user.perms.keySet());
+                       perms = new ArrayList<>(user.perms.keySet());
                }
        }
        
@@ -315,7 +315,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
                        int total = 0;
                        try {
                                // look at now.  If we need to expire more by increasing "now" by "advance"
-                               ArrayList<User<PERM>> al = new ArrayList<User<PERM>>(userMap.values().size());
+                               ArrayList<User<PERM>> al = new ArrayList<>(userMap.values().size());
                                al.addAll(0, userMap.values());
                                long now = System.currentTimeMillis() + advance;
                                for(User<PERM> user : al) {
@@ -367,7 +367,7 @@ public abstract class AbsUserCache<PERM extends Permission> {
                                int missTotal = missMap.keySet().size();
                                int miss = 0;
                                if(missTotal>0) {
-                                       ArrayList<String> keys = new ArrayList<String>(missTotal);
+                                       ArrayList<String> keys = new ArrayList<>(missTotal);
                                        keys.addAll(missMap.keySet());
                                        for(String key : keys) {
                                                Miss m = missMap.get(key);
index 49572f4..a2dfba3 100644 (file)
@@ -140,7 +140,7 @@ public class CadiWrap extends HttpServletRequestWrapper implements HttpServletRe
         *  To utilize, the Request must be a "CadiWrap" object, then call.
         */
        public List<Permission> getPermissions(Principal p) {
-               List<Permission> perms = new ArrayList<Permission>();
+               List<Permission> perms = new ArrayList<>();
                lur.fishAll(p, perms);
                return perms;
        }
index 0038385..935e4f1 100644 (file)
@@ -36,7 +36,7 @@ import java.util.ArrayList;
  */
 public class Capacitor {
        private static final int DEFAULT_CHUNK = 256;
-       private ArrayList<ByteBuffer> bbs = new ArrayList<ByteBuffer>();
+       private ArrayList<ByteBuffer> bbs = new ArrayList<>();
        private ByteBuffer curr = null;
        private int idx;
        
index c827477..5e00156 100644 (file)
@@ -184,7 +184,7 @@ public class PropAccess implements Access {
                                                String chainProp = props.getProperty(Config.CADI_PROP_FILES);
                                                if(chainProp!=null) {
                                                        if(recursionProtection==null) {
-                                                               recursionProtection = new ArrayList<String>();
+                                                               recursionProtection = new ArrayList<>();
                                                                recursionProtection.add(cadi_prop_files);
                                                        }
                                                        if(!recursionProtection.contains(chainProp)) {
index 5a3fe82..4067f16 100644 (file)
@@ -138,7 +138,7 @@ public class Symm {
                // There can be time efficiencies gained when the underlying keyset consists mainly of ordered 
                // data (i.e. abcde...).  Therefore, we'll quickly analyze the keyset.  If it proves to have
                // too much entropy, the "Unordered" algorithm, which is faster in such cases is used.
-               ArrayList<int[]> la = new ArrayList<int[]>();
+               ArrayList<int[]> la = new ArrayList<>();
                for(int i=0;i<codeset.length;++i) {
                        curr = codeset[i];
                        if(prev+1==curr) { // is next character in set
index 5e9f8a5..34aaf17 100644 (file)
@@ -36,7 +36,7 @@ import org.onap.aaf.cadi.lur.LocalPermission;
  *
  */
 public final class User<PERM extends Permission> {
-       private static final Map<String,Permission> NULL_MAP = new HashMap<String,Permission>();
+       private static final Map<String,Permission> NULL_MAP = new HashMap<>();
        public String name;
        private byte[] cred;
        public Principal principal;
@@ -121,7 +121,7 @@ public final class User<PERM extends Permission> {
        }
        
        public Map<String,Permission> newMap() {
-               return new ConcurrentHashMap<String,Permission>();
+               return new ConcurrentHashMap<>();
        }
 
        public void add(LocalPermission permission) {
index b74ccb3..dfcf7e3 100644 (file)
@@ -259,7 +259,7 @@ public class Config {
                
                access.log(Level.INIT, "Hostname set to",hostname);
                // Get appropriate TAFs
-               ArrayList<HttpTaf> htlist = new ArrayList<HttpTaf>();
+               ArrayList<HttpTaf> htlist = new ArrayList<>();
 
                /////////////////////////////////////////////////////
                // Add a Denial of Service TAF
@@ -507,7 +507,7 @@ public class Config {
        
        public static Lur configLur(SecurityInfoC<HttpURLConnection> si, Connector con, Object ... additionalTafLurs) throws CadiException {
                Access access = si.access;
-               List<Lur> lurs = new ArrayList<Lur>();
+               List<Lur> lurs = new ArrayList<>();
                
                /////////////////////////////////////////////////////
                // Configure a Local Property Based RBAC/LUR
@@ -671,7 +671,7 @@ public class Config {
                                        aafConClass = loadClass(access, AAF_V2_0_AAF_CON_HTTP);
                                        if (aafConClass != null) {
                                                for (Constructor<?> c : aafConClass.getConstructors()) {
-                                                       List<Object> lo = new ArrayList<Object>();
+                                                       List<Object> lo = new ArrayList<>();
                                                        for (Class<?> pc : c.getParameterTypes()) {
                                                                if (pc.equals(Access.class)) {
                                                                        lo.add(access);
index cc366c2..a5fb4a0 100644 (file)
@@ -31,7 +31,7 @@ import org.onap.aaf.cadi.SecuritySetter;
 
 public class SecurityInfoC<CLIENT> extends SecurityInfo {
        public static final String DEF_ID = "ID not Set";
-       private static Map<Class<?>,SecurityInfoC<?>> sicMap = new HashMap<Class<?>,SecurityInfoC<?>>();
+       private static Map<Class<?>,SecurityInfoC<?>> sicMap = new HashMap<>();
        public SecuritySetter<CLIENT> defSS;
 
        public SecurityInfoC(Access access) throws CadiException {
index a3e267c..974e581 100644 (file)
@@ -58,7 +58,7 @@ public class UsersDump {
                        StringBuilder sb = new StringBuilder();
                        
                        // Obtain all unique role names
-                       HashSet<String> groups = new HashSet<String>();
+                       HashSet<String> groups = new HashSet<>();
                        for(AbsUserCache<?>.DumpInfo di : lur.dumpInfo()) {
                                sb.append("\n  <user username=\"");
                                sb.append(di.user);
index 1f302c6..237aa28 100644 (file)
@@ -218,7 +218,7 @@ public class CadiFilter implements Filter {
                                                if(map.length>0) {
                                                        MapPermConverter mpc=null;
                                                        int idx;
-                                                       mapPairs = new ArrayList<Pair>();
+                                                       mapPairs = new ArrayList<>();
                                                        for(String entry : map) {
                                                                if((idx=entry.indexOf('='))<0) { // it's a Path, so create a new converter
                                                                        access.log(Level.INIT,"Loading Perm Conversions for:",entry);
index 5cd6323..5b51c11 100644 (file)
@@ -93,7 +93,12 @@ public class HttpEpiTaf implements HttpTaf {
                TafResp tresp = null;
                TafResp firstTry = null;
                List<Redirectable> redirectables = null;
-               List<TafResp> log = (access.willLog(Level.DEBUG)) ? new ArrayList<TafResp>() : null;
+               List<TafResp> log;
+               if(access.willLog(Level.DEBUG)) {
+                       log = new ArrayList<>();
+               } else {
+                       log = null;
+               }
                try {
                        for (HttpTaf taf : tafs) {
                                tresp = taf.validate(reading, req, resp);
index dc07bb9..7b7f2db 100644 (file)
@@ -86,7 +86,7 @@ public class X509Taf implements HttpTaf {
                        throw new CadiException("X509Taf requires Environment ("+Config.AAF_ENV+") to be set.");
                }
 //             this.lur = lur;
-               this.cadiIssuers = new ArrayList<String>();
+               this.cadiIssuers = new ArrayList<>();
                for(String ci : access.getProperty(Config.CADI_X509_ISSUERS, "").split(":")) {
                        access.printf(Level.INIT, "Trusting Identity for Certificates signed by \"%s\"",ci);
                        cadiIssuers.add(ci);
index 44a3a4a..a0d56f6 100644 (file)
@@ -126,7 +126,7 @@ public class DenialOfServiceTaf implements HttpTaf {
        public static synchronized boolean denyIP(String ip) {
                boolean rv = false;
                if(deniedIP==null) {
-                       deniedIP = new HashMap<String,Counter>();
+                       deniedIP = new HashMap<>();
                        deniedIP.put(ip, new Counter(ip)); // Noted duplicated for minimum time spent
                        rv= true;
                } else if(deniedIP.get(ip)==null) {
@@ -170,7 +170,7 @@ public class DenialOfServiceTaf implements HttpTaf {
                                br = new BufferedReader(new FileReader(dosIP));
                                try {
                                        if(deniedIP==null) {
-                                               deniedIP=new HashMap<String,Counter>();
+                                               deniedIP=new HashMap<>();
                                        }
 
                                        String line;
@@ -215,7 +215,7 @@ public class DenialOfServiceTaf implements HttpTaf {
        public static synchronized boolean denyID(String id) {
                boolean rv = false;
                if(deniedID==null) {
-                       deniedID = new HashMap<String,Counter>();
+                       deniedID = new HashMap<>();
                        deniedID.put(id, new Counter(id)); // Noted duplicated for minimum time spent
                        rv = true;
                } else if(deniedID.get(id)==null) {
@@ -260,7 +260,7 @@ public class DenialOfServiceTaf implements HttpTaf {
                                br = new BufferedReader(new FileReader(dosID));
                                try {
                                        if(deniedID==null) {
-                                               deniedID=new HashMap<String,Counter>();
+                                               deniedID=new HashMap<>();
                                        }
                                        
                                        String line;
@@ -299,7 +299,7 @@ public class DenialOfServiceTaf implements HttpTaf {
                int initSize = 0;
                if(deniedIP!=null)initSize+=deniedIP.size();
                if(deniedID!=null)initSize+=deniedID.size();
-               ArrayList<String> al = new ArrayList<String>(initSize);
+               ArrayList<String> al = new ArrayList<>(initSize);
                if(deniedID!=null) {
                        for(Counter c : deniedID.values()) {
                                al.add(c.toString());
index 4312c3c..7cd7a63 100644 (file)
@@ -107,7 +107,7 @@ public class Pool<T> {
        public Pool(Creator<T> creator) {
                count = spares = 0;
                this.creator = creator;
-               list = new LinkedList<Pooled<T>>();
+               list = new LinkedList<>();
                logger = Log.NULL;
        }
        
index 7af475a..78265e4 100644 (file)
@@ -354,14 +354,22 @@ public class XReader {
                        for(Tag tag : t.attribs) {
                                if("xmlns".equals(tag.prefix)) {
                                        if(newnss==null) {
-                                               newnss = new HashMap<String,String>();
+                                               newnss = new HashMap<>();
                                                if(nss!=null)newnss.putAll(nss);
                                        }
                                        newnss.put(tag.name, tag.value);
                                }
                        }
                }
-               return newnss==null?(nss==null?new HashMap<String,String>():nss):newnss;
+               //return newnss==null?(nss==null?new HashMap<String,String>():nss):newnss;
+               if(newnss==null) {
+                       if(nss==null) {
+                               newnss = new HashMap<>();
+                       } else {
+                               newnss = nss;
+                       }
+               }
+               return newnss;
        }
 
        /**
@@ -392,7 +400,7 @@ public class XReader {
                 */
                public void add(Tag attrib) {
                        if(attribs == null) {
-                               attribs = new ArrayList<Tag>();
+                               attribs = new ArrayList<>();
                        }
                        attribs.add(attrib);
                }
index b2739b9..11877de 100644 (file)
@@ -284,10 +284,10 @@ public class JU_AbsUserCache {
                assertThat(dumpInfo.size(), is(2));
 
                // Utility lists
-               List<String> names = new ArrayList<String>();
+               List<String> names = new ArrayList<>();
                names.add(name1);
                names.add(name2);
-               List<String> permissions = new ArrayList<String>();
+               List<String> permissions = new ArrayList<>();
                permissions.add("NewKey1");
                permissions.add("NewKey2");
 
index 2568324..2d5ba8d 100644 (file)
@@ -158,7 +158,7 @@ public class JU_User {
        @Test
        public void addValuesToNewMapTest() {
                User<Permission> user = new User<Permission>(principal);
-               Map<String, Permission> newMap = new HashMap<String,Permission>();
+               Map<String, Permission> newMap = new HashMap<>();
                
                assertFalse(user.contains(permission));
                
@@ -167,7 +167,7 @@ public class JU_User {
                
                assertTrue(user.contains(permission));
                
-               List<Permission> sink = new ArrayList<Permission>();
+               List<Permission> sink = new ArrayList<>();
                user.copyPermsTo(sink);
                
                assertThat(sink.size(), is(1));
index 7920932..b9f0e99 100644 (file)
@@ -71,7 +71,7 @@ public class JU_Pool {
        public void getTest() throws CadiException {
                Pool<Integer> intPool = new Pool<Integer>(new IntegerCreator());
 
-               List<Pooled<Integer>> gotten = new ArrayList<Pooled<Integer>>();
+               List<Pooled<Integer>> gotten = new ArrayList<>();
                for (int i = 0; i < 10; i++) {
                        gotten.add(intPool.get());
                        assertThat(gotten.get(i).content, is(i));
index b2600aa..551f725 100644 (file)
@@ -39,21 +39,21 @@ public class JU_Vars {
        @Test
        public void convert() {
                String test = "test";
-               List<String> list = new ArrayList<String>();
+               List<String> list = new ArrayList<>();
                list.add("method");
                assertEquals(Vars.convert(test, list), test);
        }
 
        @Test
        public void convertTest1() {
-               List<String> list = new ArrayList<String>();
+               List<String> list = new ArrayList<>();
                list.add("method");
                assertEquals(Vars.convert("test", list), "test");
        }
 
        @Test
        public void convertTest2() {
-               List<String> list = new ArrayList<String>();
+               List<String> list = new ArrayList<>();
                list.add("method");
                assertEquals(Vars.convert("test", list), "test");
        }
index 54b0ce8..685bfb6 100644 (file)
@@ -65,21 +65,21 @@ public class StoreImpl implements Store {
        \r
        public StoreImpl() {\r
                 staticState = new Object[growSize];\r
-                staticMap = new HashMap<String,StaticSlot>();\r
-                localMap = new HashMap<String,Slot>();\r
+                staticMap = new HashMap<>();\r
+                localMap = new HashMap<>();\r
        }\r
        \r
        public StoreImpl(String tag) {\r
                 staticState = new Object[growSize];\r
-                staticMap = new HashMap<String,StaticSlot>();\r
-                localMap = new HashMap<String,Slot>();\r
+                staticMap = new HashMap<>();\r
+                localMap = new HashMap<>();\r
        }\r
 \r
        \r
        public StoreImpl(String tag, String[] args) {\r
                 staticState = new Object[growSize];\r
-                staticMap = new HashMap<String,StaticSlot>();\r
-                localMap = new HashMap<String,Slot>();\r
+                staticMap = new HashMap<>();\r
+                localMap = new HashMap<>();\r
 \r
                 if(tag!=null) {\r
                        String tequals = tag + '=';\r
@@ -102,8 +102,8 @@ public class StoreImpl implements Store {
        \r
        public StoreImpl(String tag, Properties props) {\r
                 staticState = new Object[growSize];\r
-                staticMap = new HashMap<String,StaticSlot>();\r
-                localMap = new HashMap<String,Slot>();\r
+                staticMap = new HashMap<>();\r
+                localMap = new HashMap<>();\r
                 \r
                 if(tag!=null) {\r
                         String fname = props.getProperty(tag);\r
@@ -191,7 +191,7 @@ public class StoreImpl implements Store {
         * @see com.att.env.Store#existingSlotNames()\r
         */\r
        public List<String> existingSlotNames() {\r
-               return new ArrayList<String>(localMap.keySet());\r
+               return new ArrayList<>(localMap.keySet());\r
        }\r
 \r
        /* (non-Javadoc)\r
@@ -234,7 +234,7 @@ public class StoreImpl implements Store {
        }\r
 \r
        public List<String> existingStaticSlotNames() {\r
-               return new ArrayList<String>(staticMap.keySet());\r
+               return new ArrayList<>(staticMap.keySet());\r
        }\r
 }\r
 \r
index f10de38..e378e2c 100644 (file)
@@ -37,7 +37,7 @@ public abstract class AbsTrans<ENV extends Env> implements TransStore {
        private static final Object[] EMPTYO = new Object[0];\r
        \r
        protected ENV delegate;\r
-       protected List<TimeTaken> trail = new ArrayList<TimeTaken>(30);\r
+       protected List<TimeTaken> trail = new ArrayList<>(30);\r
        private Object[] state;\r
        \r
        \r
index 2a3628d..cd62a7e 100644 (file)
@@ -84,7 +84,7 @@ public class BasicEnv extends StoreImpl implements EnvJAXB, TransCreate<TransJAX
         */\r
        public BasicEnv(Applet applet, String ... tags) {\r
                super(null, tags);\r
-//             props = new HashMap<String, String>();\r
+//             props = new HashMap<>();\r
 //             String value;\r
 //             for(int i=0;i<tags.length;++i) {\r
 //                     value = applet.getParameter(tags[i]);\r
index 127eb15..4a01d8b 100644 (file)
@@ -64,7 +64,7 @@ import org.onap.aaf.misc.env.util.Pool.Pooled;
  */\r
 public class JAXBmar {\r
        // Need to store off possible JAXBContexts based on Class, which will be stored in Creator\r
-       private static Map<Class<?>[],Pool<PMarshaller>> pools = new HashMap<Class<?>[], Pool<PMarshaller>>();\r
+       private static Map<Class<?>[],Pool<PMarshaller>> pools = new HashMap<>();\r
 \r
        // Handle Marshaller class setting of properties only when needed\r
        private class PMarshaller {\r
index 74072aa..0c078a9 100644 (file)
@@ -68,7 +68,7 @@ import org.w3c.dom.Node;
  */\r
 public class JAXBumar {\r
        // Need to store off possible JAXBContexts based on Class, which will be stored in Creator\r
-       private static Map<Class<?>[],Pool<SUnmarshaller>> pools = new HashMap<Class<?>[], Pool<SUnmarshaller>>();\r
+       private static Map<Class<?>[],Pool<SUnmarshaller>> pools = new HashMap<>();\r
 \r
        private Class<?> cls;\r
        private Schema schema;\r
index 1694a01..82f05b4 100644 (file)
@@ -104,7 +104,7 @@ public class Pool<T> {
        public Pool(Creator<T> creator) {\r
                count = spares = 0;\r
                this.creator = creator;\r
-               list = new LinkedList<Pooled<T>>();\r
+               list = new LinkedList<>();\r
        }\r
 \r
        /**\r
index 56cd54e..6892a4b 100644 (file)
@@ -69,7 +69,7 @@ public class RefreshableThreadObject<T extends Creatable<T>> {
         * @throws APIException\r
         */\r
        public RefreshableThreadObject(Class<T> clss) throws APIException {\r
-               objs = new ConcurrentHashMap<Thread,T>();\r
+               objs = new ConcurrentHashMap<>();\r
                try {\r
                        cnst = clss.getConstructor(new Class[]{Env.class} );\r
                } catch (Exception e) {\r
index 4827592..da66394 100644 (file)
@@ -205,7 +205,7 @@ public class InXML implements Parse<Reader, State> {
                                String value = sb.toString();
                                sb.setLength(0);
                                if(tag !=null && value != null) {
-                                       if(props==null)props = new ArrayList<Prop>();
+                                       if(props==null)props = new ArrayList<>();
                                        props.add(new Prop(tag,value));
                                }
                        }
@@ -251,7 +251,7 @@ public class InXML implements Parse<Reader, State> {
 
                public void push(Prop prop) {
                        if(attribs==null) {
-                               attribs = new ArrayList<Prop>();
+                               attribs = new ArrayList<>();
                                idx = 0;
                        }
                        attribs.add(prop);
@@ -291,7 +291,7 @@ public class InXML implements Parse<Reader, State> {
 
                private void addNS(Prop prop) {
                        Map<String,String> existingNS = getNS();
-                       if(ns==null)ns = new HashMap<String,String>();
+                       if(ns==null)ns = new HashMap<>();
                        // First make a copy of previous NSs so that we have everything we need, but can overwrite, if necessary
                        if(existingNS!=null && ns!=existingNS) {
                                ns.putAll(ns);
index 5f38c8c..6c20ba2 100644 (file)
@@ -74,7 +74,7 @@ public class JaxInfo {
                JaxInfo derived;
                // Lazy Instantiation
                if(extensions == null) {
-                       extensions = new HashMap<String,JaxInfo>();
+                       extensions = new HashMap<>();
                        derived = null;
                } else {
                        derived = extensions.get(derivedName);
@@ -163,7 +163,7 @@ public class JaxInfo {
                // Build up Method names from JAXB Annotations
                XmlType xt;
                while((xt = cls.getAnnotation(XmlType.class))!=null) {
-                       if(fields==null)fields = new ArrayList<JaxInfo>();
+                       if(fields==null)fields = new ArrayList<>();
                        for(String field : xt.propOrder()) {
                                if("".equals(field)) break; // odd bug.  "" returned when no fields exist, rather than empty array
                                Field rf = cls.getDeclaredField(field);
index bb6784c..04d6158 100644 (file)
@@ -38,11 +38,11 @@ import javax.xml.bind.annotation.XmlType;
  * @param <T>
  */
 public class JaxSet<T> {
-       private static Map<Class<?>,JaxSet<?>> jsets = new HashMap<Class<?>,JaxSet<?>>();
+       private static Map<Class<?>,JaxSet<?>> jsets = new HashMap<>();
        private Map<String,Setter<T>> members;
 
        private JaxSet(Class<?> cls) {
-               members = new TreeMap<String, Setter<T>>();
+               members = new TreeMap<>();
                XmlType xmltype = cls.getAnnotation(XmlType.class);
                Class<?> paramType[] = new Class[] {String.class};
                for(String str : xmltype.propOrder()) {
@@ -79,7 +79,7 @@ public class JaxSet<T> {
                        @SuppressWarnings("unchecked")
                        JaxSet<X> js = (JaxSet<X>)jsets.get(cls);
                        if(js == null) {
-                               jsets.put(cls, js = new JaxSet<X>(cls));
+                               jsets.put(cls, js = new JaxSet<>(cls));
                        }
                        return js;
                }
index f3ce1c2..8557c58 100644 (file)
@@ -42,7 +42,7 @@ public class OutXML extends Out{
 
        public OutXML(String root, String ... params) {
                this.root = root;
-               props = new ArrayList<Prop>();
+               props = new ArrayList<>();
                for(String p : params) {
                        String[] tv=p.split("=");
                        if(tv.length==2)
@@ -164,7 +164,7 @@ public class OutXML extends Out{
                        }
                        
                        if(create && !rv) {
-                               if(nses == null) nses = new HashMap<String,String>();
+                               if(nses == null) nses = new HashMap<>();
                                nses.put(ns, value);
                        }
                        return rv;
index f1cde6e..aac1e30 100644 (file)
@@ -106,8 +106,8 @@ public class XmlEscape {
        }
 
        static {
-               charMap = new TreeMap<String, Integer>();
-               intMap = new TreeMap<Integer,String>();
+               charMap = new TreeMap<>();
+               intMap = new TreeMap<>();
                charMap.put("quot", 34);
                charMap.put("amp",38);
                charMap.put("apos",39);
index 74b590d..417f80b 100644 (file)
@@ -42,7 +42,7 @@ public abstract class CacheGen<G extends XGen<G>> {
        public final static int HTML5   = 0x8;\r
 \r
        \r
-       private ArrayList<Section<G>> sections = new ArrayList<Section<G>>();\r
+       private ArrayList<Section<G>> sections = new ArrayList<>();\r
        private int flags;\r
        private final Thematic thematic;\r
 \r
index 18b3393..9160095 100644 (file)
@@ -60,7 +60,7 @@ public class JU_HTML4GenTest {
 \r
                gen.html("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
                for (char ch : DOCTYPE.toCharArray()) {\r
                        Integer times = map.get(ch);\r
                        map.put(ch, (times == null ? 0 : times) + 1);\r
@@ -84,7 +84,7 @@ public class JU_HTML4GenTest {
 \r
                gen.head();\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "head".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -103,7 +103,7 @@ public class JU_HTML4GenTest {
 \r
                gen.body("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "body".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -126,7 +126,7 @@ public class JU_HTML4GenTest {
 \r
                gen.charset(charset);\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : CHARSET_LINE.toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -145,7 +145,7 @@ public class JU_HTML4GenTest {
 \r
                gen.header("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "header".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -174,7 +174,7 @@ public class JU_HTML4GenTest {
 \r
                gen.footer("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "footer".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -203,7 +203,7 @@ public class JU_HTML4GenTest {
 \r
                gen.section("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "section".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -232,7 +232,7 @@ public class JU_HTML4GenTest {
 \r
                gen.article("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "attrib".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -261,7 +261,7 @@ public class JU_HTML4GenTest {
 \r
                gen.aside("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "aside".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -290,7 +290,7 @@ public class JU_HTML4GenTest {
 \r
                gen.nav("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "nav".toCharArray()) {\r
                        Integer times = map.get(ch);\r
index 953a4a3..69ebf89 100644 (file)
@@ -36,8 +36,8 @@ import org.mockito.Mock;
 \r
 public class JU_HTML5GenTest {\r
 \r
-       private final static String DOCTYPE = "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\""\r
-                       + " \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">";\r
+//     private final static String DOCTYPE = "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\""\r
+//                     + " \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">";\r
 \r
        private String charset = "utf-8";\r
 \r
@@ -59,7 +59,7 @@ public class JU_HTML5GenTest {
 \r
                gen.html("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "html".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -79,7 +79,7 @@ public class JU_HTML5GenTest {
 \r
                gen.head();\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "head".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -98,7 +98,7 @@ public class JU_HTML5GenTest {
 \r
                gen.body("attributes");\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : "body".toCharArray()) {\r
                        Integer times = map.get(ch);\r
@@ -121,7 +121,7 @@ public class JU_HTML5GenTest {
 \r
                gen.charset(charset);\r
 \r
-               Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+               Map<Character, Integer> map = new TreeMap<>();\r
 \r
                for (char ch : CHARSET_LINE.toCharArray()) {\r
                        Integer times = map.get(ch);\r
index 2dbc422..1c00b45 100644 (file)
@@ -41,7 +41,7 @@ public class JU_XMLGenTest {
 \r
        String XML_TAG = "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>";\r
 \r
-       Map<Character, Integer> map = new TreeMap<Character, Integer>();\r
+       Map<Character, Integer> map = new TreeMap<>();\r
 \r
        @Before\r
        public void setUp() throws Exception {\r