Author: angela
Date: Fri Dec  7 12:39:15 2018
New Revision: 1848394

URL: http://svn.apache.org/viewvc?rev=1848394&view=rev
Log:
OAK-7944 : Minor improvements to oak security code base
- use diamond type

Modified:
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncConfig.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncContext.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DefaultSyncConfigImpl.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DynamicSyncContext.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/ExternalLoginModule.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/jmx/Delegatee.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalGroupPrincipalProvider.java
    
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalPrincipalConfiguration.java
    
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/AbstractExternalAuthTest.java
    
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleDynamicMembershipTest.java
    
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleTestBase.java
    
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/PreAuthDefaultExternalLoginModuleTest.java
    
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/TestIdentityProvider.java
    
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeDefaultTest.java
    
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeImplTest.java
    
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugPermissionProviderTest.java
    
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/SupportedPathsTest.java
    
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/VersionTest.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/PermissionHook.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/VersionablePathHook.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/PrincipalRestrictionProvider.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/RestrictionProviderImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/internal/SecurityProviderRegistration.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/principal/PrincipalProviderImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeDefinitionWriter.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeValidator.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/AuthorizablePropertiesImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/DeclaredMembershipPredicate.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/ImpersonationImpl.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipProvider.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipWriter.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/Condition.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
    
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultIterator.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/CompositeConfiguration.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParameters.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManager.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/Permissions.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/AbstractRestrictionProvider.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/CompositeRestrictionProvider.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/principal/CompositePrincipalProvider.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/privilege/PrivilegeBits.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/privilege/PrivilegeBitsProvider.java
    
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/xml/ReferenceChangeTracker.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/plugins/tree/TreeTypeProviderTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParametersTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/credentials/CompositeCredentialsSupportTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlListTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManagerTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/TestACL.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/PermissionsTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/RestrictionDefinitionImplTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/RestrictionImplTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/principal/PrincipalImplTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/privilege/PrivilegeBitsTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/action/PasswordValidationActionTest.java
    
jackrabbit/oak/trunk/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/util/PasswordUtilTest.java

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncConfig.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncConfig.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncConfig.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncConfig.java
 Fri Dec  7 12:39:15 2018
@@ -150,7 +150,7 @@ public class DefaultSyncConfig {
          */
         @NotNull
         public Authorizable setAutoMembership(@NotNull String ... 
autoMembership) {
-            this.autoMembership = new HashSet<String>();
+            this.autoMembership = new HashSet<>();
             for (String groupName: autoMembership) {
                 if (groupName != null && !groupName.trim().isEmpty()) {
                     this.autoMembership.add(groupName.trim());

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncContext.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncContext.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncContext.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/basic/DefaultSyncContext.java
 Fri Dec  7 12:39:15 2018
@@ -520,7 +520,7 @@ public class DefaultSyncContext implemen
         timer.mark("fetching");
 
         // first get the set of the existing groups that are synced ones
-        Map<String, Group> declaredExternalGroups = new HashMap<String, 
Group>();
+        Map<String, Group> declaredExternalGroups = new HashMap<>();
         Iterator<Group> grpIter = auth.declaredMemberOf();
         while (grpIter.hasNext()) {
             Group grp = grpIter.next();
@@ -737,7 +737,7 @@ public class DefaultSyncContext implemen
      */
     @Nullable
     protected Value[] createValues(@NotNull Collection<?> propValues) throws 
RepositoryException {
-        List<Value> values = new ArrayList<Value>();
+        List<Value> values = new ArrayList<>();
         for (Object obj : propValues) {
             Value v = createValue(obj);
             if (v != null) {

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DefaultSyncConfigImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DefaultSyncConfigImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DefaultSyncConfigImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DefaultSyncConfigImpl.java
 Fri Dec  7 12:39:15 2018
@@ -317,7 +317,7 @@ public class DefaultSyncConfigImpl exten
      * @return the mapping map
      */
     private static Map<String, String> createMapping(@NotNull String[] 
patterns) {
-        Map<String, String> mapping = new HashMap<String, String>();
+        Map<String, String> mapping = new HashMap<>();
         for (String pattern: patterns) {
             int idx = pattern.indexOf('=');
             if (idx > 0) {

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DynamicSyncContext.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DynamicSyncContext.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DynamicSyncContext.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/DynamicSyncContext.java
 Fri Dec  7 12:39:15 2018
@@ -125,7 +125,7 @@ public class DynamicSyncContext extends
                 if (depth <= 0) {
                     vs = new Value[0];
                 } else {
-                    Set<String> principalsNames = new HashSet<String>();
+                    Set<String> principalsNames = new HashSet<>();
                     collectPrincipalNames(principalsNames, 
external.getDeclaredGroups(), depth);
                     vs = createValues(principalsNames);
                 }

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/ExternalLoginModule.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/ExternalLoginModule.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/ExternalLoginModule.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/ExternalLoginModule.java
 Fri Dec  7 12:39:15 2018
@@ -412,7 +412,7 @@ public class ExternalLoginModule extends
         } else {
             creds = credentials;
         }
-        Map<String, Object> attributes = new HashMap<String, Object>();
+        Map<String, Object> attributes = new HashMap<>();
         Object shared = sharedState.get(SHARED_KEY_ATTRIBUTES);
         if (shared instanceof Map) {
             for (Map.Entry entry : ((Map<?,?>) shared).entrySet()) {

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/jmx/Delegatee.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/jmx/Delegatee.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/jmx/Delegatee.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/jmx/Delegatee.java
 Fri Dec  7 12:39:15 2018
@@ -144,9 +144,9 @@ final class Delegatee {
         context.setKeepMissing(!purge)
                 .setForceGroupSync(true)
                 .setForceUserSync(true);
-        List<String> list = new ArrayList<String>();
+        List<String> list = new ArrayList<>();
 
-        List<SyncResult> results = new ArrayList<SyncResult>(batchSize);
+        List<SyncResult> results = new ArrayList<>(batchSize);
         for (String userId : userIds) {
             results = syncUser(userId, false, results, list);
         }
@@ -160,13 +160,13 @@ final class Delegatee {
     @NotNull
     String[] syncAllUsers(boolean purge) {
         try {
-            List<String> list = new ArrayList<String>();
+            List<String> list = new ArrayList<>();
             context.setKeepMissing(!purge)
                     .setForceGroupSync(true)
                     .setForceUserSync(true);
             Iterator<SyncedIdentity> it = handler.listIdentities(userMgr);
 
-            List<SyncResult> results = new ArrayList<SyncResult>(batchSize);
+            List<SyncResult> results = new ArrayList<>(batchSize);
             while (it.hasNext()) {
                 SyncedIdentity id = it.next();
                 if (isMyIDP(id)) {
@@ -185,10 +185,10 @@ final class Delegatee {
      */
     @NotNull
     String[] syncExternalUsers(@NotNull String[] externalIds) {
-        List<String> list = new ArrayList<String>();
+        List<String> list = new ArrayList<>();
         context.setForceGroupSync(true).setForceUserSync(true);
 
-        List<SyncResult> results = new ArrayList<SyncResult>(batchSize);
+        List<SyncResult> results = new ArrayList<>(batchSize);
         for (String externalId : externalIds) {
             ExternalIdentityRef ref = 
ExternalIdentityRef.fromString(externalId);
             if (!idp.getName().equals(ref.getProviderName())) {
@@ -219,10 +219,10 @@ final class Delegatee {
      */
     @NotNull
     String[] syncAllExternalUsers() {
-        List<String> list = new ArrayList<String>();
+        List<String> list = new ArrayList<>();
         context.setForceGroupSync(true).setForceUserSync(true);
         try {
-            List<SyncResult> results = new ArrayList<SyncResult>(batchSize);
+            List<SyncResult> results = new ArrayList<>(batchSize);
             Iterator<ExternalUser> it = idp.listUsers();
             while (it.hasNext()) {
                 ExternalUser user = it.next();
@@ -249,10 +249,10 @@ final class Delegatee {
     @NotNull
     String[] purgeOrphanedUsers() {
         context.setKeepMissing(false);
-        List<String> list = new ArrayList<String>();
+        List<String> list = new ArrayList<>();
         Iterator<String> orphanedIdentities = internalListOrphanedIdentities();
 
-        List<SyncResult> results = new ArrayList<SyncResult>(batchSize);
+        List<SyncResult> results = new ArrayList<>(batchSize);
         while (orphanedIdentities.hasNext()) {
             String userId = orphanedIdentities.next();
             results = syncUser(userId, true, results, list);
@@ -314,7 +314,7 @@ final class Delegatee {
                 // make sure there are not pending changes that would fail the 
next batches
                 root.refresh();
             }
-            return new ArrayList<SyncResult>(size);
+            return new ArrayList<>(size);
         }
     }
 

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalGroupPrincipalProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalGroupPrincipalProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalGroupPrincipalProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalGroupPrincipalProvider.java
 Fri Dec  7 12:39:15 2018
@@ -354,7 +354,7 @@ class ExternalGroupPrincipalProvider imp
      */
     private final class GroupPrincipalIterator extends 
AbstractLazyIterator<Principal> {
 
-        private final Set<String> processed = new HashSet<String>();
+        private final Set<String> processed = new HashSet<>();
 
         private final String queryString;
         private final Iterator<? extends ResultRow> rows;
@@ -443,7 +443,7 @@ class ExternalGroupPrincipalProvider imp
 
         private AutoMembershipPrincipals(@NotNull Map<String, String[]> 
autoMembershipMapping) {
             this.autoMembershipMapping = autoMembershipMapping;
-            this.principalMap = new ConcurrentHashMap<String, 
Set<Principal>>(autoMembershipMapping.size());
+            this.principalMap = new 
ConcurrentHashMap<>(autoMembershipMapping.size());
         }
 
         @NotNull

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalPrincipalConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalPrincipalConfiguration.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalPrincipalConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/main/java/org/apache/jackrabbit/oak/spi/security/authentication/external/impl/principal/ExternalPrincipalConfiguration.java
 Fri Dec  7 12:39:15 2018
@@ -260,7 +260,7 @@ public class ExternalPrincipalConfigurat
      */
     private static final class SyncHandlerMappingTracker extends 
ServiceTracker {
 
-        private Map<ServiceReference, String[]> referenceMap = new 
HashMap<ServiceReference, String[]>();
+        private Map<ServiceReference, String[]> referenceMap = new HashMap<>();
 
         public SyncHandlerMappingTracker(@NotNull BundleContext context) {
             super(context, SyncHandlerMapping.class.getName(), null);

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/AbstractExternalAuthTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/AbstractExternalAuthTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/AbstractExternalAuthTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/AbstractExternalAuthTest.java
 Fri Dec  7 12:39:15 2018
@@ -158,7 +158,7 @@ public abstract class AbstractExternalAu
 
     protected DefaultSyncConfig createSyncConfig() {
         DefaultSyncConfig syncConfig = new DefaultSyncConfig();
-        Map<String, String> mapping = new HashMap<String, String>();
+        Map<String, String> mapping = new HashMap<>();
         mapping.put("name", "name");
         mapping.put("email", "email");
         mapping.put("profile/name", "profile/name");

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleDynamicMembershipTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleDynamicMembershipTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleDynamicMembershipTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleDynamicMembershipTest.java
 Fri Dec  7 12:39:15 2018
@@ -91,10 +91,10 @@ public class ExternalLoginModuleDynamicM
         try {
             cs = login(new SimpleCredentials(USER_ID, new char[0]));
 
-            Set<String> expectedExternal = new HashSet<String>();
+            Set<String> expectedExternal = new HashSet<>();
             calcExpectedPrincipalNames(idp.getUser(USER_ID), 
syncConfig.user().getMembershipNestingDepth(), expectedExternal);
 
-            Set<Principal> principals = new 
HashSet<Principal>(cs.getAuthInfo().getPrincipals());
+            Set<Principal> principals = new 
HashSet<>(cs.getAuthInfo().getPrincipals());
 
             root.refresh();
             PrincipalManager principalManager = getPrincipalManager(root);

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleTestBase.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleTestBase.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleTestBase.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/ExternalLoginModuleTestBase.java
 Fri Dec  7 12:39:15 2018
@@ -42,7 +42,7 @@ public abstract class ExternalLoginModul
     private Registration testIdpReg;
     private Registration syncHandlerReg;
 
-    protected final HashMap<String, Object> options = new HashMap<String, 
Object>();
+    protected final HashMap<String, Object> options = new HashMap<>();
 
     protected Whiteboard whiteboard;
 

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/PreAuthDefaultExternalLoginModuleTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/PreAuthDefaultExternalLoginModuleTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/PreAuthDefaultExternalLoginModuleTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/PreAuthDefaultExternalLoginModuleTest.java
 Fri Dec  7 12:39:15 2018
@@ -86,7 +86,7 @@ public class PreAuthDefaultExternalLogin
                 AppConfigurationEntry entry3 = new AppConfigurationEntry(
                         LoginModuleImpl.class.getName(),
                         
AppConfigurationEntry.LoginModuleControlFlag.SUFFICIENT,
-                        new HashMap<String, Object>());
+                        new HashMap<>());
 
                 return new AppConfigurationEntry[]{entry1, entry2, entry3};
             }

Modified: 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/TestIdentityProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/TestIdentityProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/TestIdentityProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-auth-external/src/test/java/org/apache/jackrabbit/oak/spi/security/authentication/external/TestIdentityProvider.java
 Fri Dec  7 12:39:15 2018
@@ -40,8 +40,8 @@ public class TestIdentityProvider implem
 
     public static final String DEFAULT_IDP_NAME = "test";
 
-    private final Map<String, ExternalGroup> externalGroups = new 
HashMap<String, ExternalGroup>();
-    private final Map<String, ExternalUser> externalUsers = new 
HashMap<String, ExternalUser>();
+    private final Map<String, ExternalGroup> externalGroups = new HashMap<>();
+    private final Map<String, ExternalUser> externalUsers = new HashMap<>();
 
     private final String idpName;
 
@@ -158,8 +158,8 @@ public class TestIdentityProvider implem
         private final String principalName;
         private final ExternalIdentityRef id;
 
-        private final Set<ExternalIdentityRef> groups = new 
HashSet<ExternalIdentityRef>();
-        private final Map<String, Object> props = new HashMap<String, 
Object>();
+        private final Set<ExternalIdentityRef> groups = new HashSet<>();
+        private final Map<String, Object> props = new HashMap<>();
 
         public TestIdentity() {
             this("externalId", "principalName", DEFAULT_IDP_NAME);

Modified: 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeDefaultTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeDefaultTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeDefaultTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeDefaultTest.java
 Fri Dec  7 12:39:15 2018
@@ -81,7 +81,7 @@ public class CugExcludeDefaultTest {
 
     @Test
     public void testPrincipals() {
-        Set<Principal> principals = new HashSet<Principal>();
+        Set<Principal> principals = new HashSet<>();
         principals.add(new PrincipalImpl("test"));
         principals.add(new ItemBasedPrincipal() {
             @Override
@@ -103,7 +103,7 @@ public class CugExcludeDefaultTest {
 
     @Test
     public void testMixedPrincipals() {
-        Set<Principal> principals = new HashSet<Principal>();
+        Set<Principal> principals = new HashSet<>();
         principals.add(new PrincipalImpl("test"));
         principals.add(new SystemUserPrincipal() {
             @Override

Modified: 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeImplTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeImplTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeImplTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugExcludeImplTest.java
 Fri Dec  7 12:39:15 2018
@@ -62,7 +62,7 @@ public class CugExcludeImplTest extends
         Map<String, Object> m = ImmutableMap.<String, 
Object>of("principalNames", principalNames);
         activate(m);
 
-        Set<Principal> all = new HashSet<Principal>();
+        Set<Principal> all = new HashSet<>();
         for (String name : principalNames) {
             Principal p = new PrincipalImpl(name);
             assertTrue(exclude.isExcluded(ImmutableSet.of(p)));

Modified: 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugPermissionProviderTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugPermissionProviderTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugPermissionProviderTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/CugPermissionProviderTest.java
 Fri Dec  7 12:39:15 2018
@@ -55,7 +55,7 @@ import static org.junit.Assert.fail;
 
 public class CugPermissionProviderTest extends AbstractCugTest implements 
NodeTypeConstants {
 
-    private static final Map<String, Boolean> PATH_INCUG_MAP = new 
HashMap<String, Boolean>();
+    private static final Map<String, Boolean> PATH_INCUG_MAP = new HashMap<>();
     static {
         PATH_INCUG_MAP.put(SUPPORTED_PATH, false);
         PATH_INCUG_MAP.put("/content/a", true);
@@ -275,7 +275,7 @@ public class CugPermissionProviderTest e
     public void testSupportedPermissionsByTreePermission() {
         TreePermission rootTp = 
cugPermProvider.getTreePermission(root.getTree("/"), TreePermission.EMPTY);
 
-        Map<TreePermission, Boolean> tpMap = new HashMap<TreePermission, 
Boolean>();
+        Map<TreePermission, Boolean> tpMap = new HashMap<>();
 
         TreePermission contentTp = 
cugPermProvider.getTreePermission(root.getTree(SUPPORTED_PATH), rootTp);
         tpMap.put(contentTp, false);

Modified: 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/SupportedPathsTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/SupportedPathsTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/SupportedPathsTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/SupportedPathsTest.java
 Fri Dec  7 12:39:15 2018
@@ -34,7 +34,7 @@ public class SupportedPathsTest {
     public void testIncludes() {
         SupportedPaths supportedPaths = new 
SupportedPaths(ImmutableSet.of("/content"));
 
-        Map<String, Boolean> pathMap = new HashMap<String, Boolean>();
+        Map<String, Boolean> pathMap = new HashMap<>();
         pathMap.put("/content", true);
         pathMap.put("/content/a", true);
         pathMap.put("/content/a/rep:cugPolicy", true);
@@ -59,7 +59,7 @@ public class SupportedPathsTest {
     public void testMayContainCug() {
         SupportedPaths supportedPaths = new 
SupportedPaths(ImmutableSet.of("/content/a"));
 
-        Map<String, Boolean> pathMap = new HashMap<String, Boolean>();
+        Map<String, Boolean> pathMap = new HashMap<>();
         pathMap.put("/", true);
         pathMap.put("/content", true);
         pathMap.put("/jcr:system", false);

Modified: 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/VersionTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/VersionTest.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/VersionTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-authorization-cug/src/test/java/org/apache/jackrabbit/oak/spi/security/authorization/cug/impl/VersionTest.java
 Fri Dec  7 12:39:15 2018
@@ -60,8 +60,8 @@ public class VersionTest extends Abstrac
     private Root testRoot;
     private ReadOnlyVersionManager versionManager;
 
-    private List<String> readAccess = new ArrayList<String>();
-    private List<String> noReadAccess = new ArrayList<String>();
+    private List<String> readAccess = new ArrayList<>();
+    private List<String> noReadAccess = new ArrayList<>();
 
     @Before
     @Override

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java
 Fri Dec  7 12:39:15 2018
@@ -141,7 +141,7 @@ public class SecurityProviderImpl implem
     @NotNull
     @Override
     public Iterable<? extends SecurityConfiguration> getConfigurations() {
-        Set<SecurityConfiguration> scs = new HashSet<SecurityConfiguration>();
+        Set<SecurityConfiguration> scs = new HashSet<>();
         scs.add(authenticationConfiguration);
         scs.add(authorizationConfiguration);
         scs.add(userConfiguration);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java
 Fri Dec  7 12:39:15 2018
@@ -249,7 +249,7 @@ public final class TokenLoginModule exte
     @Nullable
     private static AuthInfo getAuthInfo(@Nullable TokenInfo tokenInfo, 
@NotNull Set<? extends Principal> principals) {
         if (tokenInfo != null) {
-            Map<String, Object> attributes = new HashMap<String, Object>();
+            Map<String, Object> attributes = new HashMap<>();
             Map<String, String> publicAttributes = 
tokenInfo.getPublicAttributes();
             for (String attrName : publicAttributes.keySet()) {
                 attributes.put(attrName, publicAttributes.get(attrName));

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java
 Fri Dec  7 12:39:15 2018
@@ -101,7 +101,7 @@ public final class LoginModuleImpl exten
 
     private static final Logger log = 
LoggerFactory.getLogger(LoginModuleImpl.class);
 
-    protected static final Set<Class> SUPPORTED_CREDENTIALS = new 
HashSet<Class>(3);
+    protected static final Set<Class> SUPPORTED_CREDENTIALS = new HashSet<>(3);
     static {
         SUPPORTED_CREDENTIALS.add(SimpleCredentials.class);
         SUPPORTED_CREDENTIALS.add(GuestCredentials.class);
@@ -263,7 +263,7 @@ public final class LoginModuleImpl exten
         } else {
             creds = credentials;
         }
-        Map<String, Object> attributes = new HashMap<String, Object>();
+        Map<String, Object> attributes = new HashMap<>();
         Object shared = sharedState.get(SHARED_KEY_ATTRIBUTES);
         if (shared instanceof Map) {
             for (Object key : ((Map) shared).keySet()) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java
 Fri Dec  7 12:39:15 2018
@@ -48,7 +48,7 @@ abstract class ACL extends AbstractAcces
 
     private static final Logger log = LoggerFactory.getLogger(ACL.class);
 
-    private final List<ACE> entries = new ArrayList<ACE>();
+    private final List<ACE> entries = new ArrayList<>();
 
     ACL(@Nullable String oakPath, @Nullable List<ACE> entries,
         @NotNull NamePathMapper namePathMapper) {
@@ -110,7 +110,7 @@ abstract class ACL extends AbstractAcces
         if (restrictions == null && mvRestrictions == null) {
             rs = Collections.emptySet();
         } else {
-            rs = new HashSet<Restriction>();
+            rs = new HashSet<>();
             if (restrictions != null) {
                 for (String jcrName : restrictions.keySet()) {
                     String oakName = getNamePathMapper().getOakName(jcrName);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
 Fri Dec  7 12:39:15 2018
@@ -135,7 +135,7 @@ public class AccessControlManagerImpl ex
         Tree tree = getTree(oakPath, Permissions.READ_ACCESS_CONTROL, true);
         AccessControlPolicy policy = createACL(oakPath, tree, false);
 
-        List<AccessControlPolicy> policies = new 
ArrayList<AccessControlPolicy>(2);
+        List<AccessControlPolicy> policies = new ArrayList<>(2);
         if (policy != null) {
             policies.add(policy);
         }
@@ -154,7 +154,7 @@ public class AccessControlManagerImpl ex
         Root r = getRoot().getContentSession().getLatestRoot();
         tree = r.getTree(tree.getPath());
 
-        List<AccessControlPolicy> effective = new 
ArrayList<AccessControlPolicy>();
+        List<AccessControlPolicy> effective = new ArrayList<>();
         AccessControlPolicy policy = createACL(oakPath, tree, true);
         if (policy != null) {
             effective.add(policy);
@@ -492,7 +492,7 @@ public class AccessControlManagerImpl ex
         if (accessControlledTree.exists() && Util.isAccessControlled(oakPath, 
accessControlledTree, ntMgr)) {
             Tree aclTree = accessControlledTree.getChild(aclName);
             if (aclTree.exists()) {
-                List<ACE> entries = new ArrayList<ACE>();
+                List<ACE> entries = new ArrayList<>();
                 for (Tree child : aclTree.getChildren()) {
                     if (Util.isACE(child, ntMgr)) {
                         ACE ace = createACE(oakPath, child, 
restrictionProvider);
@@ -517,7 +517,7 @@ public class AccessControlManagerImpl ex
         Root root = getRoot();
         Result aceResult = 
searchAces(Collections.<Principal>singleton(principal), root);
         RestrictionProvider restrProvider = new 
PrincipalRestrictionProvider(restrictionProvider);
-        List<ACE> entries = new ArrayList<ACE>();
+        List<ACE> entries = new ArrayList<>();
         for (ResultRow row : aceResult.getRows()) {
             Tree aceTree = root.getTree(row.getPath());
             if (Util.isACE(aceTree, ntMgr)) {
@@ -749,7 +749,7 @@ public class AccessControlManagerImpl ex
 
         @Override
         public Privilege[] getPrivileges() {
-            Set<Privilege> privileges = new HashSet<Privilege>();
+            Set<Privilege> privileges = new HashSet<>();
             for (String name : 
bitsProvider.getPrivilegeNames(getPrivilegeBits())) {
                 try {
                     privileges.add(getPrivilegeManager().getPrivilege(name));

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
 Fri Dec  7 12:39:15 2018
@@ -146,7 +146,7 @@ public class CompositeAuthorizationConfi
             case 0: return RestrictionProvider.EMPTY;
             case 1: return configurations.get(0).getRestrictionProvider();
             default:
-                List<RestrictionProvider> rps = new 
ArrayList<RestrictionProvider>(configurations.size());
+                List<RestrictionProvider> rps = new 
ArrayList<>(configurations.size());
                 for (AuthorizationConfiguration c : configurations) {
                     RestrictionProvider rp = c.getRestrictionProvider();
                     if (RestrictionProvider.EMPTY != rp) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
 Fri Dec  7 12:39:15 2018
@@ -99,8 +99,8 @@ final class CompiledPermissionImpl imple
 
         // setup
         this.store = store;
-        Set<String> userNames = new HashSet<String>(principals.size());
-        Set<String> groupNames = new HashSet<String>(principals.size());
+        Set<String> userNames = new HashSet<>(principals.size());
+        Set<String> groupNames = new HashSet<>(principals.size());
         for (Principal principal : principals) {
             if (GroupPrincipals.isGroup(principal)) {
                 groupNames.add(principal.getName());
@@ -239,7 +239,7 @@ final class CompiledPermissionImpl imple
 
     @NotNull
     private TreePermission buildParentPermission(@NotNull Tree tree) {
-        List<Tree> trees = new ArrayList<Tree>();
+        List<Tree> trees = new ArrayList<>();
         while (!tree.isRoot()) {
             tree = tree.getParent();
             trees.add(0, tree);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/PermissionHook.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/PermissionHook.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/PermissionHook.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/PermissionHook.java
 Fri Dec  7 12:39:15 2018
@@ -77,8 +77,8 @@ public class PermissionHook implements P
     private TypePredicate isACE;
     private TypePredicate isGrantACE;
 
-    private Map<String, PermissionStoreEditor> modified = new HashMap<String, 
PermissionStoreEditor>();
-    private Map<String, PermissionStoreEditor> deleted = new HashMap<String, 
PermissionStoreEditor>();
+    private Map<String, PermissionStoreEditor> modified = new HashMap<>();
+    private Map<String, PermissionStoreEditor> deleted = new HashMap<>();
 
     public PermissionHook(@NotNull String workspaceName, @NotNull 
RestrictionProvider restrictionProvider,
                           @NotNull MountInfoProvider mountInfoProvider, 
@NotNull RootProvider rootProvider,

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/VersionablePathHook.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/VersionablePathHook.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/VersionablePathHook.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/VersionablePathHook.java
 Fri Dec  7 12:39:15 2018
@@ -69,7 +69,7 @@ public class VersionablePathHook impleme
         ReadWriteVersionManager vMgr = new ReadWriteVersionManager(vsRoot, 
rootBuilder);
         ReadOnlyNodeTypeManager ntMgr = 
ReadOnlyNodeTypeManager.getInstance(providerCtx.getRootProvider().createReadOnlyRoot(rootBuilder.getNodeState()),
 NamePathMapper.DEFAULT);
 
-        List<CommitFailedException> exceptions = new 
ArrayList<CommitFailedException>();
+        List<CommitFailedException> exceptions = new ArrayList<>();
         after.compareAgainstBaseState(before,
                 new Diff(vMgr, ntMgr, new Node(rootBuilder), exceptions));
         if (!exceptions.isEmpty()) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/PrincipalRestrictionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/PrincipalRestrictionProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/PrincipalRestrictionProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/PrincipalRestrictionProvider.java
 Fri Dec  7 12:39:15 2018
@@ -55,7 +55,7 @@ public class PrincipalRestrictionProvide
     @NotNull
     @Override
     public Set<RestrictionDefinition> getSupportedRestrictions(@Nullable 
String oakPath) {
-        Set<RestrictionDefinition> definitions = new 
HashSet<RestrictionDefinition>(base.getSupportedRestrictions(oakPath));
+        Set<RestrictionDefinition> definitions = new 
HashSet<>(base.getSupportedRestrictions(oakPath));
         definitions.add(new RestrictionDefinitionImpl(REP_NODE_PATH, 
Type.PATH, true));
         return definitions;
     }
@@ -79,7 +79,7 @@ public class PrincipalRestrictionProvide
     @NotNull
     @Override
     public Set<Restriction> readRestrictions(@Nullable String oakPath, 
@NotNull Tree aceTree) {
-        Set<Restriction> restrictions = new 
HashSet<Restriction>(base.readRestrictions(oakPath, aceTree));
+        Set<Restriction> restrictions = new 
HashSet<>(base.readRestrictions(oakPath, aceTree));
         String value = (oakPath == null) ? "" : oakPath;
         PropertyState nodePathProp = 
PropertyStates.createProperty(REP_NODE_PATH, value, Type.PATH);
         restrictions.add(new RestrictionImpl(nodePathProp, true));

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/RestrictionProviderImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/RestrictionProviderImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/RestrictionProviderImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/restriction/RestrictionProviderImpl.java
 Fri Dec  7 12:39:15 2018
@@ -86,7 +86,7 @@ public class RestrictionProviderImpl ext
         if (oakPath == null) {
             return RestrictionPattern.EMPTY;
         } else {
-            List<RestrictionPattern> patterns = new 
ArrayList<RestrictionPattern>(NUMBER_OF_DEFINITIONS);
+            List<RestrictionPattern> patterns = new 
ArrayList<>(NUMBER_OF_DEFINITIONS);
             PropertyState glob = tree.getProperty(REP_GLOB);
             if (glob != null) {
                 patterns.add(GlobPattern.create(oakPath, 
glob.getValue(Type.STRING)));
@@ -114,7 +114,7 @@ public class RestrictionProviderImpl ext
         if (oakPath == null || restrictions.isEmpty()) {
             return RestrictionPattern.EMPTY;
         } else {
-            List<RestrictionPattern> patterns = new 
ArrayList<RestrictionPattern>(NUMBER_OF_DEFINITIONS);
+            List<RestrictionPattern> patterns = new 
ArrayList<>(NUMBER_OF_DEFINITIONS);
             for (Restriction r : restrictions) {
                 String name = r.getDefinition().getName();
                 if (REP_GLOB.equals(name)) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/internal/SecurityProviderRegistration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/internal/SecurityProviderRegistration.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/internal/SecurityProviderRegistration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/internal/SecurityProviderRegistration.java
 Fri Dec  7 12:39:15 2018
@@ -462,7 +462,7 @@ public class SecurityProviderRegistratio
 
         // Register the SecurityProvider.
 
-        Dictionary<String, Object> properties = new Hashtable<String, 
Object>();
+        Dictionary<String, Object> properties = new Hashtable<>();
 
         properties.put("type", "default");
 

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/principal/PrincipalProviderImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/principal/PrincipalProviderImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/principal/PrincipalProviderImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/principal/PrincipalProviderImpl.java
 Fri Dec  7 12:39:15 2018
@@ -93,7 +93,7 @@ class PrincipalProviderImpl implements P
     @NotNull
     @Override
     public Set<? extends Principal> getPrincipals(@NotNull String userID) {
-        Set<Principal> principals = new HashSet<Principal>();
+        Set<Principal> principals = new HashSet<>();
         try {
             Authorizable authorizable = userManager.getAuthorizable(userID);
             if (authorizable != null && !authorizable.isGroup()) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeDefinitionWriter.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeDefinitionWriter.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeDefinitionWriter.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeDefinitionWriter.java
 Fri Dec  7 12:39:15 2018
@@ -150,7 +150,7 @@ class PrivilegeDefinitionWriter implemen
     }
 
     private static Collection<PrivilegeDefinition> getBuiltInDefinitions() {
-        Map<String, PrivilegeDefinition> definitions = new 
LinkedHashMap<String, PrivilegeDefinition>();
+        Map<String, PrivilegeDefinition> definitions = new LinkedHashMap<>();
         for (String privilegeName : NON_AGGREGATE_PRIVILEGES) {
             PrivilegeDefinition def = new 
ImmutablePrivilegeDefinition(privilegeName, false, null);
             definitions.put(privilegeName, def);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeValidator.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeValidator.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeValidator.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/privilege/PrivilegeValidator.java
 Fri Dec  7 12:39:15 2018
@@ -238,7 +238,7 @@ class PrivilegeValidator extends Default
     }
 
     private static Set<String> resolveAggregates(Set<String> declared, 
Map<String, PrivilegeDefinition> definitions) throws CommitFailedException {
-        Set<String> aggregateNames = new HashSet<String>();
+        Set<String> aggregateNames = new HashSet<>();
         for (String name : declared) {
             PrivilegeDefinition d = definitions.get(name);
             if (d == null) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/AuthorizablePropertiesImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/AuthorizablePropertiesImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/AuthorizablePropertiesImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/AuthorizablePropertiesImpl.java
 Fri Dec  7 12:39:15 2018
@@ -69,7 +69,7 @@ class AuthorizablePropertiesImpl impleme
         TreeLocation location = getLocation(tree, oakPath);
         Tree parent = location.getTree();
         if (parent != null && Text.isDescendantOrEqual(tree.getPath(), 
parent.getPath())) {
-            List<String> l = new ArrayList<String>();
+            List<String> l = new ArrayList<>();
             for (PropertyState property : parent.getProperties()) {
                 String propName = property.getName();
                 if (isAuthorizableProperty(tree, location.getChild(propName), 
false)) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/DeclaredMembershipPredicate.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/DeclaredMembershipPredicate.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/DeclaredMembershipPredicate.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/DeclaredMembershipPredicate.java
 Fri Dec  7 12:39:15 2018
@@ -39,7 +39,7 @@ public class DeclaredMembershipPredicate
 
     private final MembershipProvider membershipProvider;
     private final Iterator<String> contentIdIterator;
-    private final Set<String> declaredMemberContentIds = new HashSet<String>();
+    private final Set<String> declaredMemberContentIds = new HashSet<>();
 
     public DeclaredMembershipPredicate(UserManagerImpl userManager, String 
groupId) {
         this.membershipProvider = userManager.getMembershipProvider();

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/ImpersonationImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/ImpersonationImpl.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/ImpersonationImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/ImpersonationImpl.java
 Fri Dec  7 12:39:15 2018
@@ -66,7 +66,7 @@ class ImpersonationImpl implements Imper
         if (impersonators.isEmpty()) {
             return PrincipalIteratorAdapter.EMPTY;
         } else {
-            Set<Principal> s = new HashSet<Principal>();
+            Set<Principal> s = new HashSet<>();
             for (final String pName : impersonators) {
                 Principal p = principalManager.getPrincipal(pName);
                 if (p == null) {
@@ -128,7 +128,7 @@ class ImpersonationImpl implements Imper
             return false;
         }
 
-        Set<String> principalNames = new HashSet<String>();
+        Set<String> principalNames = new HashSet<>();
         for (Principal principal : subject.getPrincipals()) {
             principalNames.add(principal.getName());
         }
@@ -154,7 +154,7 @@ class ImpersonationImpl implements Imper
 
     @NotNull
     private Set<String> getImpersonatorNames(@NotNull Tree userTree) {
-        Set<String> princNames = new HashSet<String>();
+        Set<String> princNames = new HashSet<>();
         PropertyState impersonators = userTree.getProperty(REP_IMPERSONATORS);
         if (impersonators != null) {
             for (String v : impersonators.getValue(STRINGS)) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipProvider.java
 Fri Dec  7 12:39:15 2018
@@ -135,7 +135,7 @@ class MembershipProvider extends Authori
      */
     @NotNull
     Iterator<String> getMembership(@NotNull Tree authorizableTree, final 
boolean includeInherited) {
-        return getMembership(authorizableTree, includeInherited, new 
HashSet<String>());
+        return getMembership(authorizableTree, includeInherited, new 
HashSet<>());
     }
 
     /**
@@ -220,7 +220,7 @@ class MembershipProvider extends Authori
      */
     @NotNull
     Iterator<String> getMembers(@NotNull Tree groupTree, boolean 
includeInherited) {
-        return getMembers(groupTree, getContentID(groupTree), 
includeInherited, new HashSet<String>());
+        return getMembers(groupTree, getContentID(groupTree), 
includeInherited, new HashSet<>());
     }
 
     @NotNull
@@ -482,7 +482,7 @@ class MembershipProvider extends Authori
          */
         protected void remember(@NotNull Tree groupTree) {
             if (groupTrees == null) {
-                groupTrees = new ArrayList<Tree>();
+                groupTrees = new ArrayList<>();
             }
             groupTrees.add(groupTree);
         }

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipWriter.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipWriter.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipWriter.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/MembershipWriter.java
 Fri Dec  7 12:39:15 2018
@@ -83,7 +83,7 @@ public class MembershipWriter {
                 membersList.getChildren().iterator()
         );
 
-        Set<String> failed = new HashSet<String>(memberIds.size());
+        Set<String> failed = new HashSet<>(memberIds.size());
         int bestCount = membershipSizeThreshold;
         PropertyState bestProperty = null;
         Tree bestTree = null;
@@ -137,7 +137,7 @@ public class MembershipWriter {
             // for simplicity this is achieved by introducing new tree(s)
             if ((propCnt + memberIds.size()) > membershipSizeThreshold) {
                 while (!memberIds.isEmpty()) {
-                    Set<String> s = new HashSet<String>();
+                    Set<String> s = new HashSet<>();
                     Iterator<String> it = memberIds.keySet().iterator();
                     while (propCnt < membershipSizeThreshold && it.hasNext()) {
                         s.add(it.next());

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
 Fri Dec  7 12:39:15 2018
@@ -86,7 +86,7 @@ final class PasswordHistory implements U
             PropertyState historyProp = 
passwordTree.getProperty(UserConstants.REP_PWD_HISTORY);
 
             // insert the current (old) password at the beginning of the 
password history
-            List<String> historyEntries = (historyProp == null) ? new 
ArrayList<String>() : Lists.newArrayList(historyProp.getValue(Type.STRINGS));
+            List<String> historyEntries = (historyProp == null) ? new 
ArrayList<>() : Lists.newArrayList(historyProp.getValue(Type.STRINGS));
             historyEntries.add(0, currentPasswordHash);
 
             /* remove oldest history entries exceeding configured history max 
size (e.g. after

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
 Fri Dec  7 12:39:15 2018
@@ -150,7 +150,7 @@ class UserImporter implements ProtectedP
      * memberships during processing. if both would be handled only via the 
reference tracker {@link Membership#process()}
      * would remove the members from the property importer.
      */
-    private Map<String, Membership> memberships = new HashMap<String, 
Membership>();
+    private Map<String, Membership> memberships = new HashMap<>();
 
     /**
      * Temporary store for the pw an imported new user to be able to call
@@ -161,7 +161,7 @@ class UserImporter implements ProtectedP
     /**
      * Remember all new principals for impersonation handling.
      */
-    private Map<String, Principal> principals = new HashMap<String, 
Principal>();
+    private Map<String, Principal> principals = new HashMap<>();
 
     UserImporter(ConfigurationParameters config) {
         importBehavior = UserUtil.getImportBehavior(config);
@@ -267,7 +267,7 @@ class UserImporter implements ProtectedP
              of impersonators
              */
                 if (principals == null) {
-                    principals = new HashMap<String, Principal>();
+                    principals = new HashMap<>();
                 }
                 principals.put(principalName, a.getPrincipal());
 
@@ -370,7 +370,7 @@ class UserImporter implements ProtectedP
         }
         memberships.clear();
 
-        List<Object> processed = new ArrayList<Object>();
+        List<Object> processed = new ArrayList<>();
         for (Iterator<Object> it = referenceTracker.getProcessedReferences(); 
it.hasNext(); ) {
             Object reference = it.next();
             if (reference instanceof Membership) {
@@ -558,7 +558,7 @@ class UserImporter implements ProtectedP
 
         private final String authorizablePath;
 
-        private final Set<String> members = new TreeSet<String>();
+        private final Set<String> members = new TreeSet<>();
 
         Membership(String authorizablePath) {
             this.authorizablePath = authorizablePath;
@@ -582,7 +582,7 @@ class UserImporter implements ProtectedP
             Group gr = (Group) a;
 
             // 1. collect members to add and to remove.
-            Map<String, Authorizable> toRemove = new HashMap<String, 
Authorizable>();
+            Map<String, Authorizable> toRemove = new HashMap<>();
             for (Iterator<Authorizable> declMembers = gr.getDeclaredMembers(); 
declMembers.hasNext(); ) {
                 Authorizable dm = declMembers.next();
                 toRemove.put(dm.getID(), dm);
@@ -660,7 +660,7 @@ class UserImporter implements ProtectedP
     private final class Impersonators {
 
         private final String userPath;
-        private final Set<String> principalNames = new HashSet<String>();
+        private final Set<String> principalNames = new HashSet<>();
 
         private Impersonators(String userPath, List<? extends TextValue> 
values) {
             this.userPath = userPath;
@@ -678,13 +678,13 @@ class UserImporter implements ProtectedP
             Impersonation imp = checkNotNull(((User) a).getImpersonation());
 
             // 1. collect principals to add and to remove.
-            Map<String, Principal> toRemove = new HashMap<String, Principal>();
+            Map<String, Principal> toRemove = new HashMap<>();
             for (PrincipalIterator pit = imp.getImpersonators(); 
pit.hasNext(); ) {
                 Principal p = pit.nextPrincipal();
                 toRemove.put(p.getName(), p);
             }
 
-            List<String> toAdd = new ArrayList<String>();
+            List<String> toAdd = new ArrayList<>();
             for (final String principalName : principalNames) {
                 if (toRemove.remove(principalName) == null) {
                     // add it to the list of new impersonators to be added.
@@ -699,7 +699,7 @@ class UserImporter implements ProtectedP
                     handleFailure("Failed to revoke impersonation for " + 
principalName + " on " + a);
                 }
             }
-            List<String> nonExisting = new ArrayList<String>();
+            List<String> nonExisting = new ArrayList<>();
             for (String principalName : toAdd) {
                 Principal principal = (principals.containsKey(principalName)) ?
                         principals.get(principalName) :

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
 Fri Dec  7 12:39:15 2018
@@ -128,7 +128,7 @@ class UserPrincipalProvider implements P
     @NotNull
     @Override
     public Set<? extends Principal> getPrincipals(@NotNull String userID) {
-        Set<Principal> principals = new HashSet<Principal>();
+        Set<Principal> principals = new HashSet<>();
         Tree tree = userProvider.getAuthorizable(userID);
         if (tree != null && UserUtil.isType(tree, AuthorizableType.USER)) {
             Principal userPrincipal = createUserPrincipal(userID, tree);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/Condition.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/Condition.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/Condition.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/Condition.java
 Fri Dec  7 12:39:15 2018
@@ -158,7 +158,7 @@ interface Condition {
     //-------------------------------------------------< Compound Condition 
>---
     abstract class Compound implements Condition, Iterable<Condition> {
 
-        private final List<Condition> conditions = new ArrayList<Condition>();
+        private final List<Condition> conditions = new ArrayList<>();
 
         public Compound(Condition condition1, Condition condition2) {
             conditions.add(condition1);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
 Fri Dec  7 12:39:15 2018
@@ -38,7 +38,7 @@ class GroupPredicate implements Predicat
     static final Logger log = LoggerFactory.getLogger(GroupPredicate.class);
 
     private final Iterator<Authorizable> membersIterator;
-    private final Set<String> memberIds = new HashSet<String>();
+    private final Set<String> memberIds = new HashSet<>();
 
     GroupPredicate(UserManager userManager, String groupId, boolean 
declaredMembersOnly) throws RepositoryException {
         Authorizable authorizable = userManager.getAuthorizable(groupId);

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultIterator.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultIterator.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultIterator.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultIterator.java
 Fri Dec  7 12:39:15 2018
@@ -69,7 +69,7 @@ public final class ResultIterator<T> imp
             // no constraints on offset nor max -> return the original 
iterator.
             return iterator;
         } else {
-            return new ResultIterator<T>(offset, max, iterator);
+            return new ResultIterator<>(offset, max, iterator);
         }
     }
 

Modified: 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/CompositeConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/CompositeConfiguration.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/CompositeConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/CompositeConfiguration.java
 Fri Dec  7 12:39:15 2018
@@ -69,7 +69,7 @@ public abstract class CompositeConfigura
      */
     private static final int NO_RANKING = Integer.MIN_VALUE;
 
-    private final List<T> configurations = new CopyOnWriteArrayList<T>();
+    private final List<T> configurations = new CopyOnWriteArrayList<>();
 
     private final Ranking rankings = new Ranking();
 

Modified: 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParameters.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParameters.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParameters.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/ConfigurationParameters.java
 Fri Dec  7 12:39:15 2018
@@ -81,7 +81,7 @@ public final class ConfigurationParamete
      */
     @NotNull
     public static ConfigurationParameters of(@NotNull 
ConfigurationParameters... params) {
-        Map<String, Object> m = new HashMap<String, Object>();
+        Map<String, Object> m = new HashMap<>();
         for (ConfigurationParameters cp : params) {
             if (cp != null) {
                 m.putAll(cp.options);
@@ -100,7 +100,7 @@ public final class ConfigurationParamete
         if (properties.isEmpty()) {
             return EMPTY;
         }
-        Map<String, Object> options = new HashMap<String, 
Object>(properties.size());
+        Map<String, Object> options = new HashMap<>(properties.size());
         for (Object name : properties.keySet()) {
             final String key = name.toString();
             options.put(key, properties.get(key));
@@ -118,7 +118,7 @@ public final class ConfigurationParamete
         if (properties.isEmpty()) {
             return EMPTY;
         }
-        Map<String, Object> options = new HashMap<String, 
Object>(properties.size());
+        Map<String, Object> options = new HashMap<>(properties.size());
         for (Enumeration<String> keys = properties.keys(); 
keys.hasMoreElements();) {
             String key = keys.nextElement();
             options.put(key, properties.get(key));
@@ -139,7 +139,7 @@ public final class ConfigurationParamete
         if (map instanceof ConfigurationParameters) {
             return (ConfigurationParameters) map;
         }
-        Map<String, Object> options = new HashMap<String, Object>(map.size());
+        Map<String, Object> options = new HashMap<>(map.size());
         for (Map.Entry<?,?> e : map.entrySet()) {
             options.put(String.valueOf(e.getKey()), e.getValue());
         }

Modified: 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManager.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManager.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManager.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/accesscontrol/AbstractAccessControlManager.java
 Fri Dec  7 12:39:15 2018
@@ -217,7 +217,7 @@ public abstract class AbstractAccessCont
         if (pNames.isEmpty()) {
             return new Privilege[0];
         } else {
-            Set<Privilege> privileges = new HashSet<Privilege>(pNames.size());
+            Set<Privilege> privileges = new HashSet<>(pNames.size());
             for (String name : pNames) {
                 
privileges.add(privilegeManager.getPrivilege(namePathMapper.getJcrName(name)));
             }
@@ -242,7 +242,7 @@ public abstract class AbstractAccessCont
             log.debug("No privileges passed -> allowed.");
             return true;
         } else {
-            Set<String> privilegeNames = new 
HashSet<String>(privileges.length);
+            Set<String> privilegeNames = new HashSet<>(privileges.length);
             for (Privilege privilege : privileges) {
                 
privilegeNames.add(namePathMapper.getOakName(privilege.getName()));
             }

Modified: 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/Permissions.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/Permissions.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/Permissions.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/permission/Permissions.java
 Fri Dec  7 12:39:15 2018
@@ -160,7 +160,7 @@ public final class Permissions {
             USER_MANAGEMENT,
             INDEX_DEFINITION_MANAGEMENT);
 
-    public static final Map<Long, String> PERMISSION_NAMES = new 
LinkedHashMap<Long, String>();
+    public static final Map<Long, String> PERMISSION_NAMES = new 
LinkedHashMap<>();
     static {
         PERMISSION_NAMES.put(ALL, "ALL");
         PERMISSION_NAMES.put(READ, "READ");
@@ -190,7 +190,7 @@ public final class Permissions {
         PERMISSION_NAMES.put(INDEX_DEFINITION_MANAGEMENT, 
"INDEX_DEFINITION_MANAGEMENT");
     }
 
-    private static final Map<String, Long> PERMISSION_LOOKUP = new 
LinkedHashMap<String, Long>();
+    private static final Map<String, Long> PERMISSION_LOOKUP = new 
LinkedHashMap<>();
     static {
         PERMISSION_LOOKUP.put("ALL", ALL);
         PERMISSION_LOOKUP.put("READ", READ);
@@ -230,7 +230,7 @@ public final class Permissions {
             JackrabbitSession.ACTION_REMOVE_PROPERTY
     );
 
-    private static final Map<String, Long> ACTIONS_MAP = new 
LinkedHashMap<String, Long>();
+    private static final Map<String, Long> ACTIONS_MAP = new LinkedHashMap<>();
     static {
         ACTIONS_MAP.put(Session.ACTION_ADD_NODE, ADD_NODE);
         ACTIONS_MAP.put(JackrabbitSession.ACTION_ADD_PROPERTY, ADD_PROPERTY);
@@ -256,7 +256,7 @@ public final class Permissions {
         if (PERMISSION_NAMES.containsKey(permissions)) {
             return ImmutableSet.of(PERMISSION_NAMES.get(permissions));
         } else {
-            Set<String> names = new HashSet<String>();
+            Set<String> names = new HashSet<>();
             for (Map.Entry<Long, String> entry : PERMISSION_NAMES.entrySet()) {
                 long key = entry.getKey();
                 if ((permissions & key) == key) {

Modified: 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/AbstractRestrictionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/AbstractRestrictionProvider.java?rev=1848394&r1=1848393&r2=1848394&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/AbstractRestrictionProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/authorization/restriction/AbstractRestrictionProvider.java
 Fri Dec  7 12:39:15 2018
@@ -107,7 +107,7 @@ public abstract class AbstractRestrictio
         if (isUnsupportedPath(oakPath)) {
             return Collections.emptySet();
         } else {
-            Set<Restriction> restrictions = new HashSet<Restriction>();
+            Set<Restriction> restrictions = new HashSet<>();
             for (PropertyState propertyState : 
getRestrictionsTree(aceTree).getProperties()) {
                 String propName = propertyState.getName();
                 if (isRestrictionProperty(propName) && 
supported.containsKey(propName)) {
@@ -213,7 +213,7 @@ public abstract class AbstractRestrictio
     @NotNull
     private Map<String, PropertyState> getRestrictionProperties(Tree aceTree) {
         Tree rTree = getRestrictionsTree(aceTree);
-        Map<String, PropertyState> restrictionProperties = new HashMap<String, 
PropertyState>();
+        Map<String, PropertyState> restrictionProperties = new HashMap<>();
         for (PropertyState property : rTree.getProperties()) {
             String name = property.getName();
             if (isRestrictionProperty(name)) {


Reply via email to