http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/GroupDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/GroupDAO.java 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/GroupDAO.java
index 8b5902c..638a442 100644
--- a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/GroupDAO.java
+++ b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/GroupDAO.java
@@ -117,7 +117,7 @@ public class GroupDAO {
 
   @Transactional
   public void create(GroupEntity group) {
-    create(new HashSet<GroupEntity>(Arrays.asList(group)));
+    create(new HashSet<>(Arrays.asList(group)));
   }
 
   @Transactional

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostConfigMappingDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostConfigMappingDAO.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostConfigMappingDAO.java
index 0b6c14a..410f5cf 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostConfigMappingDAO.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostConfigMappingDAO.java
@@ -68,7 +68,7 @@ public class HostConfigMappingDAO {
     
     if (!cacheLoaded) {
       if (hostConfigMappingByHost == null) {
-        hostConfigMappingByHost = new ConcurrentHashMap<Long, 
Set<HostConfigMapping>>();
+        hostConfigMappingByHost = new ConcurrentHashMap<>();
 
         TypedQuery<HostConfigMappingEntity> query = 
entityManagerProvider.get().createNamedQuery(
             "HostConfigMappingEntity.findAll", HostConfigMappingEntity.class);
@@ -86,7 +86,7 @@ public class HostConfigMappingDAO {
           if (hostConfigMappingByHost.containsKey(hostId)) {
             setByHost = hostConfigMappingByHost.get(hostId);
           } else {
-            setByHost = new HashSet<HostConfigMapping>();
+            setByHost = new HashSet<>();
             hostConfigMappingByHost.put(hostId, setByHost);
           }
 
@@ -115,7 +115,7 @@ public class HostConfigMappingDAO {
       if (hostConfigMappingByHost.containsKey(hostId)) {
         set = hostConfigMappingByHost.get(hostId);
       } else {
-        set = new HashSet<HostConfigMapping>();
+        set = new HashSet<>();
         hostConfigMappingByHost.put(hostId, set);
       }
 
@@ -133,7 +133,7 @@ public class HostConfigMappingDAO {
       if (hostConfigMappingByHost.containsKey(hostId)) {
         set = hostConfigMappingByHost.get(hostId);
       } else {
-        set = new HashSet<HostConfigMapping>();
+        set = new HashSet<>();
         hostConfigMappingByHost.put(hostId, set);
       }
 
@@ -154,7 +154,7 @@ public class HostConfigMappingDAO {
     if (!hostConfigMappingByHost.containsKey(hostId))
       return Collections.emptySet();
       
-    Set<HostConfigMapping> set = new 
HashSet<HostConfigMapping>(hostConfigMappingByHost.get(hostId));
+    Set<HostConfigMapping> set = new 
HashSet<>(hostConfigMappingByHost.get(hostId));
      
     CollectionUtils.filter(set, new Predicate() {
         
@@ -176,7 +176,7 @@ public class HostConfigMappingDAO {
     if (!hostConfigMappingByHost.containsKey(hostId))
       return null;
     
-    Set<HostConfigMapping> set = new 
HashSet<HostConfigMapping>(hostConfigMappingByHost.get(hostId));
+    Set<HostConfigMapping> set = new 
HashSet<>(hostConfigMappingByHost.get(hostId));
     
     HostConfigMapping result = (HostConfigMapping) CollectionUtils.find(set, 
new Predicate() {
       
@@ -198,7 +198,7 @@ public class HostConfigMappingDAO {
     if (!hostConfigMappingByHost.containsKey(hostId))
       return Collections.emptySet();
     
-    Set<HostConfigMapping> set = new 
HashSet<HostConfigMapping>(hostConfigMappingByHost.get(hostId));
+    Set<HostConfigMapping> set = new 
HashSet<>(hostConfigMappingByHost.get(hostId));
     
     CollectionUtils.filter(set, new Predicate() {
       
@@ -220,13 +220,13 @@ public class HostConfigMappingDAO {
       return Collections.emptySet();
     }
     
-    HashSet<HostConfigMapping> result = new HashSet<HostConfigMapping>();
+    HashSet<HostConfigMapping> result = new HashSet<>();
 
     for (final Long hostId : hostIds) {
       if (!hostConfigMappingByHost.containsKey(hostId))
         continue;
       
-      Set<HostConfigMapping> set = new 
HashSet<HostConfigMapping>(hostConfigMappingByHost.get(hostId));
+      Set<HostConfigMapping> set = new 
HashSet<>(hostConfigMappingByHost.get(hostId));
       
       CollectionUtils.filter(set, new Predicate() {
         
@@ -249,7 +249,7 @@ public class HostConfigMappingDAO {
                                                                              
Collection<String> types) {
     populateCache();
     
-    Map<String, List<HostConfigMapping>> mappingsByType = new HashMap<String, 
List<HostConfigMapping>>();
+    Map<String, List<HostConfigMapping>> mappingsByType = new HashMap<>();
     
     for (String type : types) {
       if (!mappingsByType.containsKey(type)) {
@@ -258,7 +258,7 @@ public class HostConfigMappingDAO {
     }
 
     if (!types.isEmpty()) {
-      List<HostConfigMapping> mappings = new ArrayList<HostConfigMapping>();
+      List<HostConfigMapping> mappings = new ArrayList<>();
 
       for (Set<HostConfigMapping> entries : hostConfigMappingByHost.values()) {
         

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostDAO.java 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostDAO.java
index 0d20fd3..f355b60 100644
--- a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostDAO.java
+++ b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostDAO.java
@@ -116,7 +116,7 @@ public class HostDAO {
   }
 
   public List<String> getHostNamesByHostIds(List<Long> hostIds) {
-    List<String> hostNames = new ArrayList<String>();
+    List<String> hostNames = new ArrayList<>();
     if (hostIds != null) {
       for (Long hostId : hostIds) {
         HostEntity hostEntity = findById(hostId);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandDAO.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandDAO.java
index e834045..79b8bc9 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandDAO.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandDAO.java
@@ -236,7 +236,7 @@ public class HostRoleCommandDAO {
    */
   @RequiresSession
   private Map<Long, HostRoleCommandStatusSummaryDTO> loadAggregateCounts(Long 
requestId) {
-    Map<Long, HostRoleCommandStatusSummaryDTO> map = new HashMap<Long, 
HostRoleCommandStatusSummaryDTO>();
+    Map<Long, HostRoleCommandStatusSummaryDTO> map = new HashMap<>();
 
     EntityManager entityManager = entityManagerProvider.get();
     TypedQuery<HostRoleCommandStatusSummaryDTO> query = 
entityManager.createQuery(SUMMARY_DTO,
@@ -294,9 +294,9 @@ public class HostRoleCommandDAO {
       HostRoleCommandEntity.class);
 
     if (taskIds.size() > configuration.getTaskIdListLimit()) {
-      List<HostRoleCommandEntity> result = new 
ArrayList<HostRoleCommandEntity>();
+      List<HostRoleCommandEntity> result = new ArrayList<>();
 
-      List<List<Long>> lists = Lists.partition(new ArrayList<Long>(taskIds), 
configuration.getTaskIdListLimit());
+      List<List<Long>> lists = Lists.partition(new ArrayList<>(taskIds), 
configuration.getTaskIdListLimit());
       for (List<Long> list : lists) {
         result.addAll(daoUtils.selectList(query, list));
       }
@@ -364,9 +364,9 @@ public class HostRoleCommandDAO {
     );
 
     if (taskIds.size() > configuration.getTaskIdListLimit()) {
-      List<Long> result = new ArrayList<Long>();
+      List<Long> result = new ArrayList<>();
 
-      List<List<Long>> lists = Lists.partition(new ArrayList<Long>(taskIds), 
configuration.getTaskIdListLimit());
+      List<List<Long>> lists = Lists.partition(new ArrayList<>(taskIds), 
configuration.getTaskIdListLimit());
       for (List<Long> taskIdList : lists) {
         result.addAll(daoUtils.selectList(query, requestIds, taskIdList));
       }
@@ -424,7 +424,7 @@ public class HostRoleCommandDAO {
         "ORDER BY hostRoleCommand.hostEntity.hostName, 
hostRoleCommand.taskId", HostRoleCommandEntity.class);
     List<HostRoleCommandEntity> commandEntities = daoUtils.selectList(query, 
stageEntity);
 
-    Map<String, List<HostRoleCommandEntity>> hostCommands = new 
HashMap<String, List<HostRoleCommandEntity>>();
+    Map<String, List<HostRoleCommandEntity>> hostCommands = new HashMap<>();
 
     for (HostRoleCommandEntity commandEntity : commandEntities) {
       if (!hostCommands.containsKey(commandEntity.getHostName())) {
@@ -669,7 +669,7 @@ public class HostRoleCommandDAO {
   @TransactionalLock(lockArea = LockArea.HRC_STATUS_CACHE, lockType = 
LockType.WRITE)
   public List<HostRoleCommandEntity> 
mergeAll(Collection<HostRoleCommandEntity> entities) {
     Set<Long> requestsToInvalidate = new LinkedHashSet<>();
-    List<HostRoleCommandEntity> managedList = new 
ArrayList<HostRoleCommandEntity>(entities.size());
+    List<HostRoleCommandEntity> managedList = new ArrayList<>(entities.size());
     for (HostRoleCommandEntity entity : entities) {
       EntityManager entityManager = entityManagerProvider.get();
       entity = entityManager.merge(entity);
@@ -896,7 +896,7 @@ public class HostRoleCommandDAO {
     // sorting
     SortRequest sortRequest = request.getSortRequest();
     if (null != sortRequest) {
-      JpaSortBuilder<HostRoleCommandEntity> sortBuilder = new 
JpaSortBuilder<HostRoleCommandEntity>();
+      JpaSortBuilder<HostRoleCommandEntity> sortBuilder = new 
JpaSortBuilder<>();
       List<Order> sortOrders = sortBuilder.buildSortOrders(sortRequest, 
visitor);
       query.orderBy(sortOrders);
     }

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandStatusSummaryDTO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandStatusSummaryDTO.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandStatusSummaryDTO.java
index 549cc96..fcb8de4 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandStatusSummaryDTO.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/HostRoleCommandStatusSummaryDTO.java
@@ -33,8 +33,8 @@ public class HostRoleCommandStatusSummaryDTO {
   private Long m_minTime = Long.valueOf(0L);
   private Long m_maxTime = Long.valueOf(Long.MAX_VALUE);
   private boolean m_skippable = false;
-  private Map<HostRoleStatus, Integer> m_counts = new HashMap<HostRoleStatus, 
Integer>();
-  private List<HostRoleStatus> m_tasksStatus = new ArrayList<HostRoleStatus>();
+  private Map<HostRoleStatus, Integer> m_counts = new HashMap<>();
+  private List<HostRoleStatus> m_tasksStatus = new ArrayList<>();
 
   /**
    * Constructor invoked by JPA.  See {{@link 
HostRoleCommandDAO#findAggregateCounts(Long)}}

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/MemberDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/MemberDAO.java 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/MemberDAO.java
index 15b2995..c146f9f 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/MemberDAO.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/MemberDAO.java
@@ -74,7 +74,7 @@ public class MemberDAO {
 
   @Transactional
   public void create(MemberEntity member) {
-    create(new HashSet<MemberEntity>(Arrays.asList(member)));
+    create(new HashSet<>(Arrays.asList(member)));
   }
 
   @Transactional

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/ServiceConfigDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/ServiceConfigDAO.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/ServiceConfigDAO.java
index 212a9f0..49ad682 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/ServiceConfigDAO.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/ServiceConfigDAO.java
@@ -88,7 +88,7 @@ public class ServiceConfigDAO {
     cq.where(groupVersion.get("groupId").in(configGroupIds));
     cq.groupBy(groupVersion.get("groupId"));
     List<Tuple> tuples = 
daoUtils.selectList(entityManagerProvider.get().createQuery(cq));
-    List<ServiceConfigEntity> result = new ArrayList<ServiceConfigEntity>();
+    List<ServiceConfigEntity> result = new ArrayList<>();
     //subquery look to be very poor, no bulk select then, cache should help 
here as result size is naturally limited
     for (Tuple tuple : tuples) {
       CriteriaQuery<ServiceConfigEntity> sce = 
cb.createQuery(ServiceConfigEntity.class);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/StageDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/StageDAO.java 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/StageDAO.java
index 126468a..5151fb3 100644
--- a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/StageDAO.java
+++ b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/StageDAO.java
@@ -61,7 +61,7 @@ public class StageDAO {
   /**
    * Mapping of valid status transitions that that are driven by manual input.
    */
-  private static Map<HostRoleStatus, EnumSet<HostRoleStatus>> 
manualTransitionMap = new HashMap<HostRoleStatus, EnumSet<HostRoleStatus>>();
+  private static Map<HostRoleStatus, EnumSet<HostRoleStatus>> 
manualTransitionMap = new HashMap<>();
 
   static {
     manualTransitionMap.put(HostRoleStatus.HOLDING,
@@ -154,7 +154,7 @@ public class StageDAO {
    */
   @RequiresSession
   public List<StageEntity> findByStageIds(Long requestId, Set<Long> stageIds) {
-    List<StageEntity> stageEntities = new LinkedList<StageEntity>();
+    List<StageEntity> stageEntities = new LinkedList<>();
 
     for (StageEntity stage : findByRequestId(requestId)) {
       if (stageIds.contains(stage.getStageId())) {
@@ -190,7 +190,7 @@ public class StageDAO {
 
   @RequiresSession
   public Map<Long, String> findRequestContext(List<Long> requestIds) {
-    Map<Long, String> resultMap = new HashMap<Long, String>();
+    Map<Long, String> resultMap = new HashMap<>();
     if (requestIds != null && !requestIds.isEmpty()) {
       TypedQuery<StageEntity> query = entityManagerProvider.get()
         .createQuery("SELECT stage FROM StageEntity stage WHERE " +
@@ -264,7 +264,7 @@ public class StageDAO {
     }
 
     // sorting
-    JpaSortBuilder<StageEntity> sortBuilder = new 
JpaSortBuilder<StageEntity>();
+    JpaSortBuilder<StageEntity> sortBuilder = new JpaSortBuilder<>();
     List<Order> sortOrders = 
sortBuilder.buildSortOrders(request.getSortRequest(), visitor);
     query.orderBy(sortOrders);
 
@@ -306,7 +306,7 @@ public class StageDAO {
     if (desiredStatus == HostRoleStatus.ABORTED) {
       actionManager.cancelRequest(stage.getRequestId(), "User aborted.");
     } else {
-      List <HostRoleCommandEntity> hrcWithChangedStatus = new 
ArrayList<HostRoleCommandEntity>();
+      List <HostRoleCommandEntity> hrcWithChangedStatus = new ArrayList<>();
       for (HostRoleCommandEntity hostRoleCommand : tasks) {
         HostRoleStatus hostRoleStatus = hostRoleCommand.getStatus();
         if (hostRoleStatus.equals(currentStatus)) {

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/UserDAO.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/UserDAO.java 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/UserDAO.java
index 60f6fd5..246e515 100644
--- a/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/UserDAO.java
+++ b/ambari-server/src/main/java/org/apache/ambari/server/orm/dao/UserDAO.java
@@ -95,7 +95,7 @@ public class UserDAO {
        case 1:
          return resultList.get(0);
        default:
-         ImmutableMap.Builder<UserType, UserEntity> mapBuilder = 
ImmutableMap.<UserType, UserEntity>builder();
+         ImmutableMap.Builder<UserType, UserEntity> mapBuilder = 
ImmutableMap.builder();
          for (UserEntity user: resultList) {
            mapBuilder.put(user.getUserType(), user);
          }
@@ -182,7 +182,7 @@ public class UserDAO {
 
   @Transactional
   public void create(UserEntity user) {
-    create(new HashSet<UserEntity>(Arrays.asList(user)));
+    create(new HashSet<>(Arrays.asList(user)));
   }
 
   @Transactional

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertCurrentEntity_.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertCurrentEntity_.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertCurrentEntity_.java
index 52c27df..d09d906 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertCurrentEntity_.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertCurrentEntity_.java
@@ -63,7 +63,7 @@ public class AlertCurrentEntity_ {
    */
   @SuppressWarnings("unchecked")
   public static Map<String, List<? extends SingularAttribute<?, ?>>> 
getPredicateMapping() {
-    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<String, List<? extends SingularAttribute<?, ?>>>();
+    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<>();
 
     mapping.put(AlertResourceProvider.ALERT_ID,
         Collections.singletonList(alertId));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertDefinitionEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertDefinitionEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertDefinitionEntity.java
index 0eebf4b..6337487 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertDefinitionEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertDefinitionEntity.java
@@ -555,7 +555,7 @@ public class AlertDefinitionEntity {
    */
   protected void addAlertGroup(AlertGroupEntity alertGroup) {
     if (null == alertGroups) {
-      alertGroups = new HashSet<AlertGroupEntity>();
+      alertGroups = new HashSet<>();
     }
 
     alertGroups.add(alertGroup);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertHistoryEntity_.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertHistoryEntity_.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertHistoryEntity_.java
index c6f5e6a..c8c764e 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertHistoryEntity_.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertHistoryEntity_.java
@@ -67,7 +67,7 @@ public class AlertHistoryEntity_ {
    */
   @SuppressWarnings("unchecked")
   public static Map<String, List<? extends SingularAttribute<?, ?>>> 
getPredicateMapping() {
-    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<String, List<? extends SingularAttribute<?, ?>>>();
+    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<>();
 
     mapping.put(AlertHistoryResourceProvider.ALERT_HISTORY_ID,
         Collections.singletonList(alertId));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertNoticeEntity_.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertNoticeEntity_.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertNoticeEntity_.java
index 64a11c2..70ea3ab 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertNoticeEntity_.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertNoticeEntity_.java
@@ -61,7 +61,7 @@ public class AlertNoticeEntity_ {
    */
   @SuppressWarnings("unchecked")
   public static Map<String, List<? extends SingularAttribute<?, ?>>> 
getPredicateMapping() {
-    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<String, List<? extends SingularAttribute<?, ?>>>();
+    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<>();
 
     mapping.put(AlertNoticeResourceProvider.ALERT_NOTICE_ID,
         Collections.singletonList(notificationId));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertTargetEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertTargetEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertTargetEntity.java
index 7753b63..fd17b80 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertTargetEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/AlertTargetEntity.java
@@ -328,7 +328,7 @@ public class AlertTargetEntity {
    */
   protected void addAlertGroup(AlertGroupEntity alertGroup) {
     if (null == alertGroups) {
-      alertGroups = new HashSet<AlertGroupEntity>();
+      alertGroups = new HashSet<>();
     }
 
     alertGroups.add(alertGroup);
@@ -356,7 +356,7 @@ public class AlertTargetEntity {
    */
   protected void addAlertNotice(AlertNoticeEntity notice) {
     if (null == alertNotices) {
-      alertNotices = new ArrayList<AlertNoticeEntity>();
+      alertNotices = new ArrayList<>();
     }
 
     alertNotices.add(notice);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/HostRoleCommandEntity_.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/HostRoleCommandEntity_.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/HostRoleCommandEntity_.java
index 895528f..af05e19 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/HostRoleCommandEntity_.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/HostRoleCommandEntity_.java
@@ -73,7 +73,7 @@ public class HostRoleCommandEntity_ {
    * @return
    */
   public static Map<String, List<? extends SingularAttribute<?, ?>>> 
getPredicateMapping() {
-    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<String, List<? extends SingularAttribute<?, ?>>>();
+    Map<String, List<? extends SingularAttribute<?, ?>>> mapping = new 
HashMap<>();
 
     mapping.put(TaskResourceProvider.TASK_ID_PROPERTY_ID,
         Collections.singletonList(taskId));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/OperatingSystemEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/OperatingSystemEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/OperatingSystemEntity.java
index f615da6..8fb32a1 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/OperatingSystemEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/OperatingSystemEntity.java
@@ -26,7 +26,7 @@ import java.util.List;
 public class OperatingSystemEntity {
 
   private String osType;
-  private List<RepositoryEntity> repositories = new 
ArrayList<RepositoryEntity>();
+  private List<RepositoryEntity> repositories = new ArrayList<>();
   private boolean ambariManagedRepos = true;
 
   public String getOsType() {

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/PrincipalEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/PrincipalEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/PrincipalEntity.java
index fc92a5f..d363fe6 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/PrincipalEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/PrincipalEntity.java
@@ -67,7 +67,7 @@ public class PrincipalEntity {
   private PrincipalTypeEntity principalType;
 
   @OneToMany(mappedBy = "principal")
-  private Set<PrivilegeEntity> privileges = new HashSet<PrivilegeEntity>();
+  private Set<PrivilegeEntity> privileges = new HashSet<>();
 
 
   // ----- PrincipalEntity ---------------------------------------------------

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ResourceEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ResourceEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ResourceEntity.java
index 3dd96d7..53146b1 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ResourceEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ResourceEntity.java
@@ -69,7 +69,7 @@ public class ResourceEntity {
    * The list of privileges.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "resource")
-  private Collection<PrivilegeEntity> privileges = new 
HashSet<PrivilegeEntity>();
+  private Collection<PrivilegeEntity> privileges = new HashSet<>();
 
 
   // ----- ResourceEntity ---------------------------------------------------

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/StageEntity_.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/StageEntity_.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/StageEntity_.java
index b63572b..dc39e55 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/StageEntity_.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/StageEntity_.java
@@ -60,7 +60,7 @@ public class StageEntity_ {
    * @return a mapping of between a resource provider property
    */
   public static Map<String, List<? extends SingularAttribute<StageEntity, ?>>> 
getPredicateMapping() {
-    Map<String, List<? extends SingularAttribute<StageEntity, ?>>> mapping = 
new HashMap<String, List<? extends SingularAttribute<StageEntity, ?>>>();
+    Map<String, List<? extends SingularAttribute<StageEntity, ?>>> mapping = 
new HashMap<>();
 
     mapping.put(StageResourceProvider.STAGE_REQUEST_ID,
         Collections.singletonList(requestId));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/UserEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/UserEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/UserEntity.java
index caa68c1..576ca97 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/UserEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/UserEntity.java
@@ -93,7 +93,7 @@ public class UserEntity {
   private Integer active = 1;
 
   @OneToMany(mappedBy = "user", cascade = CascadeType.ALL)
-  private Set<MemberEntity> memberEntities = new HashSet<MemberEntity>();
+  private Set<MemberEntity> memberEntities = new HashSet<>();
 
   @OneToOne
   @JoinColumns({

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewEntity.java
index 264d3d3..6ccec36 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewEntity.java
@@ -134,19 +134,19 @@ public class ViewEntity implements ViewDefinition {
   * The list of view parameters.
   */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "view")
-  private Collection<ViewParameterEntity> parameters = new 
HashSet<ViewParameterEntity>();
+  private Collection<ViewParameterEntity> parameters = new HashSet<>();
 
   /**
    * The list of view resources.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "view")
-  private Collection<ViewResourceEntity> resources = new 
HashSet<ViewResourceEntity>();
+  private Collection<ViewResourceEntity> resources = new HashSet<>();
 
    /**
    * The list of view instances.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "view")
-  private Collection<ViewInstanceEntity> instances = new 
HashSet<ViewInstanceEntity>();
+  private Collection<ViewInstanceEntity> instances = new HashSet<>();
 
   /**
    * The list of view permissions.
@@ -155,7 +155,7 @@ public class ViewEntity implements ViewDefinition {
   @JoinColumns({
       @JoinColumn(name = "resource_type_id", referencedColumnName = 
"resource_type_id", nullable = false)
   })
-  private Collection<PermissionEntity> permissions = new 
HashSet<PermissionEntity>();
+  private Collection<PermissionEntity> permissions = new HashSet<>();
 
   /**
    * The resource type.
@@ -196,19 +196,19 @@ public class ViewEntity implements ViewDefinition {
    * The mapping of resource type to resource provider.
    */
   @Transient
-  private final Map<Resource.Type, ResourceProvider> resourceProviders = new 
HashMap<Resource.Type, ResourceProvider>();
+  private final Map<Resource.Type, ResourceProvider> resourceProviders = new 
HashMap<>();
 
   /**
    * The mapping of resource type to resource definition.
    */
   @Transient
-  private final Map<Resource.Type, ViewSubResourceDefinition> 
resourceDefinitions = new HashMap<Resource.Type, ViewSubResourceDefinition>();
+  private final Map<Resource.Type, ViewSubResourceDefinition> 
resourceDefinitions = new HashMap<>();
 
   /**
    * The mapping of resource type to resource configuration.
    */
   @Transient
-  private final Map<Resource.Type, ResourceConfig> resourceConfigurations = 
new HashMap<Resource.Type, ResourceConfig>();
+  private final Map<Resource.Type, ResourceConfig> resourceConfigurations = 
new HashMap<>();
 
   /**
    * The name of the view shared across versions.

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewInstanceEntity.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewInstanceEntity.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewInstanceEntity.java
index a803277..95ec52d 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewInstanceEntity.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/entities/ViewInstanceEntity.java
@@ -185,19 +185,19 @@ public class ViewInstanceEntity implements 
ViewInstanceDefinition {
    * The instance properties.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "viewInstance")
-  private Collection<ViewInstancePropertyEntity> properties = new 
HashSet<ViewInstancePropertyEntity>();
+  private Collection<ViewInstancePropertyEntity> properties = new HashSet<>();
 
   /**
    * The instance data.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "viewInstance")
-  private Collection<ViewInstanceDataEntity> data = new 
HashSet<ViewInstanceDataEntity>();
+  private Collection<ViewInstanceDataEntity> data = new HashSet<>();
 
   /**
    * The list of view entities.
    */
   @OneToMany(cascade = CascadeType.ALL, mappedBy = "viewInstance")
-  private Collection<ViewEntityEntity> entities = new 
HashSet<ViewEntityEntity>();
+  private Collection<ViewEntityEntity> entities = new HashSet<>();
 
   @ManyToOne
   @JoinColumn(name = "view_name", referencedColumnName = "view_name", nullable 
= false)
@@ -224,14 +224,14 @@ public class ViewInstanceEntity implements 
ViewInstanceDefinition {
    * instance is added.
    */
   @Transient
-  private final Map<Resource.Type, ResourceProvider> resourceProviders = new 
HashMap<Resource.Type, ResourceProvider>();
+  private final Map<Resource.Type, ResourceProvider> resourceProviders = new 
HashMap<>();
 
   /**
    * The mapping of the resource plural name to service.  Calculated when the
    * instance is added.
    */
   @Transient
-  private final Map<String, Object> services = new HashMap<String, Object>();
+  private final Map<String, Object> services = new HashMap<>();
 
   /**
    * Helper class.
@@ -324,7 +324,7 @@ public class ViewInstanceEntity implements 
ViewInstanceDefinition {
 
   @Override
   public Map<String, String> getPropertyMap() {
-    Map<String, String> propertyMap = new HashMap<String, String>();
+    Map<String, String> propertyMap = new HashMap<>();
 
     for (ViewInstancePropertyEntity viewInstancePropertyEntity : 
getProperties()) {
       propertyMap.put(viewInstancePropertyEntity.getName(), 
viewInstancePropertyEntity.getValue());
@@ -340,7 +340,7 @@ public class ViewInstanceEntity implements 
ViewInstanceDefinition {
 
   @Override
   public Map<String, String> getInstanceDataMap() {
-    Map<String, String> applicationData = new HashMap<String, String>();
+    Map<String, String> applicationData = new HashMap<>();
 
     String user = getCurrentUserName();
 
@@ -894,14 +894,14 @@ public class ViewInstanceEntity implements 
ViewInstanceDefinition {
   public InstanceValidationResultImpl getValidationResult(ViewEntity 
viewEntity, Validator.ValidationContext context)
       throws IllegalStateException {
 
-    Map<String, ValidationResult> propertyResults = new HashMap<String, 
ValidationResult>();
+    Map<String, ValidationResult> propertyResults = new HashMap<>();
 
     if (context.equals(Validator.ValidationContext.PRE_CREATE) ||
         context.equals(Validator.ValidationContext.PRE_UPDATE)) {
 
       // make sure that there is an instance property value defined
       // for each required view parameter
-      Set<String> requiredParameterNames = new HashSet<String>();
+      Set<String> requiredParameterNames = new HashSet<>();
       for (ViewParameterEntity parameter : viewEntity.getParameters()) {
         if (parameter.isRequired()) {
           // Don't enforce 'required' validation for cluster config parameters 
since

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/orm/models/HostComponentSummary.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/models/HostComponentSummary.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/models/HostComponentSummary.java
index cdc06fe..be73cad 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/orm/models/HostComponentSummary.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/orm/models/HostComponentSummary.java
@@ -81,7 +81,7 @@ public class HostComponentSummary {
   }
 
   public static List<HostComponentSummary> getHostComponentSummaries(String 
serviceName, String componentName) {
-    List<HostComponentSummary> hostComponentSummaries = new 
ArrayList<HostComponentSummary>();
+    List<HostComponentSummary> hostComponentSummaries = new ArrayList<>();
     List<HostComponentStateEntity> hostComponentStates = 
hostComponentStateDao.findByServiceAndComponent(serviceName, componentName);
 
     if (hostComponentStates != null) {

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/proxy/ProxyService.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/proxy/ProxyService.java 
b/ambari-server/src/main/java/org/apache/ambari/server/proxy/ProxyService.java
index a407769..c98495c 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/proxy/ProxyService.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/proxy/ProxyService.java
@@ -129,7 +129,7 @@ public class ProxyService {
   }
 
   private Map<String, List<String>> getHeaderParamsToForward(HttpHeaders 
headers) {
-    Map<String, List<String>> headerParamsToForward = new HashMap<String, 
List<String>>();
+    Map<String, List<String>> headerParamsToForward = new HashMap<>();
     for (String paramName: headers.getRequestHeaders().keySet()) {
       if (paramName.startsWith(AMBARI_PROXY_PREFIX)) {
         
headerParamsToForward.put(paramName.replaceAll(AMBARI_PROXY_PREFIX,""), 
headers.getRequestHeader(paramName));

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/SecurePasswordHelper.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/SecurePasswordHelper.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/SecurePasswordHelper.java
index 1b0b940..5849bdd 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/SecurePasswordHelper.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/SecurePasswordHelper.java
@@ -146,7 +146,7 @@ public class SecurePasswordHelper {
     }
 
     // Gather the set of characters that meet the specified requirements
-    List<Character> characters = new ArrayList<Character>(length);
+    List<Character> characters = new ArrayList<>(length);
 
     for (int i = 0; i < minLowercaseLetters; i++) {
       
characters.add(SecurePasswordHelper.SECURE_PASSWORD_CHARACTER_CLASS_LOWERCASE_LETTERS[secureRandom.nextInt(SecurePasswordHelper.SECURE_PASSWORD_CHARACTER_CLASS_LOWERCASE_LETTERS.length)]);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authentication/kerberos/AmbariKerberosAuthenticationProperties.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authentication/kerberos/AmbariKerberosAuthenticationProperties.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authentication/kerberos/AmbariKerberosAuthenticationProperties.java
index c59ec35..09422e5 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authentication/kerberos/AmbariKerberosAuthenticationProperties.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authentication/kerberos/AmbariKerberosAuthenticationProperties.java
@@ -127,7 +127,7 @@ public class AmbariKerberosAuthenticationProperties {
     if (orderedUserTypes == null) {
       this.orderedUserTypes = Collections.emptyList();
     } else {
-      this.orderedUserTypes = Collections.unmodifiableList(new 
ArrayList<UserType>(orderedUserTypes));
+      this.orderedUserTypes = Collections.unmodifiableList(new 
ArrayList<>(orderedUserTypes));
     }
   }
 

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariLdapAuthenticationProvider.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariLdapAuthenticationProvider.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariLdapAuthenticationProvider.java
index a35e7eb..b7ff297 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariLdapAuthenticationProvider.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariLdapAuthenticationProvider.java
@@ -49,8 +49,8 @@ public class AmbariLdapAuthenticationProvider implements 
AuthenticationProvider
   private AmbariLdapAuthoritiesPopulator authoritiesPopulator;
   private UserDAO userDAO;
 
-  private ThreadLocal<LdapServerProperties> ldapServerProperties = new 
ThreadLocal<LdapServerProperties>();
-  private ThreadLocal<LdapAuthenticationProvider> providerThreadLocal = new 
ThreadLocal<LdapAuthenticationProvider>();
+  private ThreadLocal<LdapServerProperties> ldapServerProperties = new 
ThreadLocal<>();
+  private ThreadLocal<LdapAuthenticationProvider> providerThreadLocal = new 
ThreadLocal<>();
   private ThreadLocal<String> ldapUserSearchFilterThreadLocal = new 
ThreadLocal<>();
 
   @Inject

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariPamAuthenticationProvider.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariPamAuthenticationProvider.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariPamAuthenticationProvider.java
index ab66271..ca7cd31 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariPamAuthenticationProvider.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/AmbariPamAuthenticationProvider.java
@@ -112,7 +112,7 @@ public class AmbariPamAuthenticationProvider implements 
AuthenticationProvider {
 
           //Get all the groups that user belongs to
           //Change all group names to lower case.
-          Set<String> groups = new HashSet<String>();
+          Set<String> groups = new HashSet<>();
 
           for(String group: unixUser.getGroups()){
             groups.add(group.toLowerCase());
@@ -241,7 +241,7 @@ public class AmbariPamAuthenticationProvider implements 
AuthenticationProvider {
    */
   private Set<String> getUserGroups(String userName, UserType userType) {
     UserEntity userEntity = userDAO.findUserByNameAndType(userName, userType);
-    Set<String> groups = new HashSet<String>();
+    Set<String> groups = new HashSet<>();
     for (MemberEntity memberEntity: userEntity.getMemberEntities()) {
       groups.add(memberEntity.getGroup().getGroupName());
     }

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/LdapServerProperties.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/LdapServerProperties.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/LdapServerProperties.java
index 7ee3adc..e06d8f2 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/LdapServerProperties.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/LdapServerProperties.java
@@ -72,7 +72,7 @@ public class LdapServerProperties {
     if (StringUtils.isEmpty(primaryUrl)) {
       return Collections.emptyList();
     } else {
-      List<String> list = new ArrayList<String>();
+      List<String> list = new ArrayList<>();
       list.add(protocol + primaryUrl);
       if (!StringUtils.isEmpty(secondaryUrl)) {
         list.add(protocol + secondaryUrl);

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/User.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/User.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/User.java
index 18509d3..8039759 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/User.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/User.java
@@ -39,7 +39,7 @@ public class User {
   final UserType userType;
   final Date createTime;
   final boolean active;
-  final Collection<String> groups = new ArrayList<String>();
+  final Collection<String> groups = new ArrayList<>();
   boolean admin = false;
   final List<GrantedAuthority> authorities = new ArrayList<>();
 

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/Users.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/Users.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/Users.java
index fbd40a0..4ed777b 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/Users.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/Users.java
@@ -108,7 +108,7 @@ public class Users {
 
   public List<User> getAllUsers() {
     List<UserEntity> userEntities = userDAO.findAll();
-    List<User> users = new ArrayList<User>(userEntities.size());
+    List<User> users = new ArrayList<>(userEntities.size());
 
     for (UserEntity userEntity : userEntities) {
       users.add(new User(userEntity));
@@ -393,7 +393,7 @@ public class Users {
     if (groupEntity == null) {
       return null;
     } else {
-      final Set<User> users = new HashSet<User>();
+      final Set<User> users = new HashSet<>();
       for (MemberEntity memberEntity : groupEntity.getMemberEntities()) {
         if (memberEntity.getUser() != null) {
           users.add(new User(memberEntity.getUser()));
@@ -438,7 +438,7 @@ public class Users {
    */
   public List<Group> getAllGroups() {
     final List<GroupEntity> groupEntities = groupDAO.findAll();
-    final List<Group> groups = new ArrayList<Group>(groupEntities.size());
+    final List<Group> groups = new ArrayList<>(groupEntities.size());
 
     for (GroupEntity groupEntity : groupEntities) {
       groups.add(new Group(groupEntity));
@@ -454,7 +454,7 @@ public class Users {
    * @return list of user names
    */
   public List<String> getAllMembers(String groupName) throws AmbariException {
-    final List<String> members = new ArrayList<String>();
+    final List<String> members = new ArrayList<>();
     final GroupEntity groupEntity = groupDAO.findGroupByName(groupName);
     if (groupEntity == null) {
       throw new AmbariException("Group " + groupName + " doesn't exist");
@@ -607,7 +607,7 @@ public class Users {
    */
   public synchronized boolean isUserCanBeRemoved(UserEntity userEntity) {
     List<PrincipalEntity> adminPrincipals = 
principalDAO.findByPermissionId(PermissionEntity.AMBARI_ADMINISTRATOR_PERMISSION);
-    Set<UserEntity> userEntitysSet = new 
HashSet<UserEntity>(userDAO.findUsersByPrincipal(adminPrincipals));
+    Set<UserEntity> userEntitysSet = new 
HashSet<>(userDAO.findUsersByPrincipal(adminPrincipals));
     return (userEntitysSet.contains(userEntity) && userEntitysSet.size() < 2) 
? false : true;
   }
 
@@ -633,8 +633,8 @@ public class Users {
    * @param batchInfo DTO with batch information
    */
   public void processLdapSync(LdapBatchDto batchInfo) {
-    final Map<String, UserEntity> allUsers = new HashMap<String, UserEntity>();
-    final Map<String, GroupEntity> allGroups = new HashMap<String, 
GroupEntity>();
+    final Map<String, UserEntity> allUsers = new HashMap<>();
+    final Map<String, GroupEntity> allGroups = new HashMap<>();
 
     // prefetch all user and group data to avoid heavy queries in membership 
creation
 
@@ -652,7 +652,7 @@ public class Users {
         .ensurePrincipalTypeCreated(PrincipalTypeEntity.GROUP_PRINCIPAL_TYPE);
 
     // remove users
-    final Set<UserEntity> usersToRemove = new HashSet<UserEntity>();
+    final Set<UserEntity> usersToRemove = new HashSet<>();
     for (String userName : batchInfo.getUsersToBeRemoved()) {
       UserEntity userEntity = userDAO.findUserByName(userName);
       if (userEntity == null) {
@@ -664,7 +664,7 @@ public class Users {
     userDAO.remove(usersToRemove);
 
     // remove groups
-    final Set<GroupEntity> groupsToRemove = new HashSet<GroupEntity>();
+    final Set<GroupEntity> groupsToRemove = new HashSet<>();
     for (String groupName : batchInfo.getGroupsToBeRemoved()) {
       final GroupEntity groupEntity = groupDAO.findGroupByName(groupName);
       allGroups.remove(groupEntity.getGroupName());
@@ -673,7 +673,7 @@ public class Users {
     groupDAO.remove(groupsToRemove);
 
     // update users
-    final Set<UserEntity> usersToBecomeLdap = new HashSet<UserEntity>();
+    final Set<UserEntity> usersToBecomeLdap = new HashSet<>();
     for (String userName : batchInfo.getUsersToBecomeLdap()) {
       UserEntity userEntity = userDAO.findLocalUserByName(userName);
       if (userEntity == null) {
@@ -689,7 +689,7 @@ public class Users {
     userDAO.merge(usersToBecomeLdap);
 
     // update groups
-    final Set<GroupEntity> groupsToBecomeLdap = new HashSet<GroupEntity>();
+    final Set<GroupEntity> groupsToBecomeLdap = new HashSet<>();
     for (String groupName : batchInfo.getGroupsToBecomeLdap()) {
       final GroupEntity groupEntity = groupDAO.findGroupByName(groupName);
       groupEntity.setGroupType(GroupType.LDAP);
@@ -699,10 +699,10 @@ public class Users {
     groupDAO.merge(groupsToBecomeLdap);
 
     // prepare create principals
-    final List<PrincipalEntity> principalsToCreate = new 
ArrayList<PrincipalEntity>();
+    final List<PrincipalEntity> principalsToCreate = new ArrayList<>();
 
     // prepare create users
-    final Set<UserEntity> usersToCreate = new HashSet<UserEntity>();
+    final Set<UserEntity> usersToCreate = new HashSet<>();
     for (String userName : batchInfo.getUsersToBeCreated()) {
       final PrincipalEntity principalEntity = new PrincipalEntity();
       principalEntity.setPrincipalType(userPrincipalType);
@@ -719,7 +719,7 @@ public class Users {
     }
 
     // prepare create groups
-    final Set<GroupEntity> groupsToCreate = new HashSet<GroupEntity>();
+    final Set<GroupEntity> groupsToCreate = new HashSet<>();
     for (String groupName : batchInfo.getGroupsToBeCreated()) {
       final PrincipalEntity principalEntity = new PrincipalEntity();
       principalEntity.setPrincipalType(groupPrincipalType);
@@ -740,8 +740,8 @@ public class Users {
     groupDAO.create(groupsToCreate);
 
     // create membership
-    final Set<MemberEntity> membersToCreate = new HashSet<MemberEntity>();
-    final Set<GroupEntity> groupsToUpdate = new HashSet<GroupEntity>();
+    final Set<MemberEntity> membersToCreate = new HashSet<>();
+    final Set<GroupEntity> groupsToUpdate = new HashSet<>();
     for (LdapUserGroupMemberDto member : batchInfo.getMembershipToAdd()) {
       final MemberEntity memberEntity = new MemberEntity();
       final GroupEntity groupEntity = allGroups.get(member.getGroupName());
@@ -755,7 +755,7 @@ public class Users {
     groupDAO.merge(groupsToUpdate); // needed for Derby DB as it doesn't fetch 
newly added members automatically
 
     // remove membership
-    final Set<MemberEntity> membersToRemove = new HashSet<MemberEntity>();
+    final Set<MemberEntity> membersToRemove = new HashSet<>();
     for (LdapUserGroupMemberDto member : batchInfo.getMembershipToRemove()) {
       MemberEntity memberEntity = 
memberDAO.findByUserAndGroup(member.getUserName(), member.getGroupName());
       if (memberEntity != null) {
@@ -820,7 +820,7 @@ public class Users {
     }
 
     // get all of the privileges for the user
-    List<PrincipalEntity> principalEntities = new 
LinkedList<PrincipalEntity>();
+    List<PrincipalEntity> principalEntities = new LinkedList<>();
 
     principalEntities.add(userEntity.getPrincipal());
 
@@ -837,7 +837,7 @@ public class Users {
     if (implicitPrivilegeEntities.isEmpty()) {
       privilegeEntities = explicitPrivilegeEntities;
     } else {
-      privilegeEntities = new LinkedList<PrivilegeEntity>();
+      privilegeEntities = new LinkedList<>();
       privilegeEntities.addAll(explicitPrivilegeEntities);
       privilegeEntities.addAll(implicitPrivilegeEntities);
     }
@@ -867,7 +867,7 @@ public class Users {
     }
 
     // get all of the privileges for the group
-    List<PrincipalEntity> principalEntities = new 
LinkedList<PrincipalEntity>();
+    List<PrincipalEntity> principalEntities = new LinkedList<>();
 
     principalEntities.add(groupEntity.getPrincipal());
 
@@ -878,7 +878,7 @@ public class Users {
     if (implicitPrivilegeEntities.isEmpty()) {
       privilegeEntities = explicitPrivilegeEntities;
     } else {
-      privilegeEntities = new LinkedList<PrivilegeEntity>();
+      privilegeEntities = new LinkedList<>();
       privilegeEntities.addAll(explicitPrivilegeEntities);
       privilegeEntities.addAll(implicitPrivilegeEntities);
     }
@@ -938,13 +938,13 @@ public class Users {
       return Collections.emptyList();
     }
 
-    List<PrivilegeEntity> implicitPrivileges = new 
LinkedList<PrivilegeEntity>();
+    List<PrivilegeEntity> implicitPrivileges = new LinkedList<>();
 
     // A list of principals representing roles/permissions. This collection of 
roles will be used to
     // find additional inherited privileges based on the assigned roles.
     // For example a File View instance may be set to be accessible to all 
authenticated user with
     // the Cluster User role.
-    List<PrincipalEntity> rolePrincipals = new ArrayList<PrincipalEntity>();
+    List<PrincipalEntity> rolePrincipals = new ArrayList<>();
 
     for (PrivilegeEntity privilegeEntity : privilegeEntities) {
       // Add the principal representing the role associated with this 
PrivilegeEntity to the collection

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/jwt/JwtAuthenticationProperties.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/jwt/JwtAuthenticationProperties.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/jwt/JwtAuthenticationProperties.java
index 7d84213..cb456fa 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/jwt/JwtAuthenticationProperties.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/authorization/jwt/JwtAuthenticationProperties.java
@@ -62,7 +62,7 @@ public class JwtAuthenticationProperties {
     if (StringUtils.isNotEmpty(audiencesString)) {
       // parse into the list
       String[] audArray = audiencesString.split(",");
-      audiences = new ArrayList<String>();
+      audiences = new ArrayList<>();
       Collections.addAll(audiences, audArray);
     } else {
       audiences = null;

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/AbstractCredentialStore.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/AbstractCredentialStore.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/AbstractCredentialStore.java
index 76c0ac0..fb5e0db 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/AbstractCredentialStore.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/AbstractCredentialStore.java
@@ -159,7 +159,7 @@ public abstract class AbstractCredentialStore implements 
CredentialStore {
           Enumeration<String> aliases = ks.aliases();
 
           if (aliases != null) {
-            credentials = new HashSet<String>();
+            credentials = new HashSet<>();
             while (aliases.hasMoreElements()) {
               credentials.add(aliases.nextElement());
             }

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/CredentialStoreServiceImpl.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/CredentialStoreServiceImpl.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/CredentialStoreServiceImpl.java
index c48029b..c36d21f 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/CredentialStoreServiceImpl.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/CredentialStoreServiceImpl.java
@@ -201,7 +201,7 @@ public class CredentialStoreServiceImpl implements 
CredentialStoreService {
         ? temporaryCredentialStore.listCredentials()
         : null;
 
-    Map<String, CredentialStoreType> map = new HashMap<String, 
CredentialStoreType>();
+    Map<String, CredentialStoreType> map = new HashMap<>();
 
     if (persistedAliases != null) {
       for (String alias : persistedAliases) {

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/InMemoryCredentialStore.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/InMemoryCredentialStore.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/InMemoryCredentialStore.java
index 930136e..c0ee6a8 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/InMemoryCredentialStore.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/InMemoryCredentialStore.java
@@ -195,7 +195,7 @@ public class InMemoryCredentialStore extends 
AbstractCredentialStore {
     Lock lock = getLock();
     lock.lock();
     try {
-      return new HashSet<String>(cache.asMap().keySet());
+      return new HashSet<>(cache.asMap().keySet());
     } finally {
       lock.unlock();
     }

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/MasterKeyServiceImpl.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/MasterKeyServiceImpl.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/MasterKeyServiceImpl.java
index 1dd0f85..1d6b73d 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/MasterKeyServiceImpl.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/encryption/MasterKeyServiceImpl.java
@@ -180,7 +180,7 @@ public class MasterKeyServiceImpl implements 
MasterKeyService {
 
     if (atom != null) {
       try {
-        ArrayList<String> lines = new ArrayList<String>();
+        ArrayList<String> lines = new ArrayList<>();
         lines.add(MASTER_PERSISTENCE_TAG_PREFIX + 
TimeStamp.getCurrentTime().toDateString());
 
         String line = Base64.encodeBase64String((

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/AmbariLdapDataPopulator.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/AmbariLdapDataPopulator.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/AmbariLdapDataPopulator.java
index c134c51..32dd6dc 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/AmbariLdapDataPopulator.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/AmbariLdapDataPopulator.java
@@ -245,7 +245,7 @@ public class AmbariLdapDataPopulator {
    */
   public LdapBatchDto synchronizeLdapGroups(Set<String> groups, LdapBatchDto 
batchInfo) throws AmbariException {
     LOG.trace("Synchronize LDAP groups...");
-    final Set<LdapGroupDto> specifiedGroups = new HashSet<LdapGroupDto>();
+    final Set<LdapGroupDto> specifiedGroups = new HashSet<>();
     for (String group : groups) {
       Set<LdapGroupDto> groupDtos = getLdapGroups(group);
       if (groupDtos.isEmpty()) {
@@ -275,7 +275,7 @@ public class AmbariLdapDataPopulator {
    */
   public LdapBatchDto synchronizeLdapUsers(Set<String> users, LdapBatchDto 
batchInfo) throws AmbariException {
     LOG.trace("Synchronize LDAP users...");
-    final Set<LdapUserDto> specifiedUsers = new HashSet<LdapUserDto>();
+    final Set<LdapUserDto> specifiedUsers = new HashSet<>();
 
     for (String user : users) {
       Set<LdapUserDto> userDtos = getLdapUsers(user);
@@ -369,10 +369,10 @@ public class AmbariLdapDataPopulator {
   protected void refreshGroupMembers(LdapBatchDto batchInfo, LdapGroupDto 
group, Map<String, User> internalUsers,
                                      Map<String, Group> internalGroupsMap, 
Set<String> groupMemberAttributes, boolean recursive)
       throws AmbariException {
-    Set<String> externalMembers = new HashSet<String>();
+    Set<String> externalMembers = new HashSet<>();
 
     if (groupMemberAttributes == null) {
-      groupMemberAttributes = new HashSet<String>();
+      groupMemberAttributes = new HashSet<>();
     }
 
     for (String memberAttributeValue : group.getMemberAttributes()) {
@@ -623,7 +623,7 @@ public class AmbariLdapDataPopulator {
   }
 
   private Set<LdapGroupDto> getFilteredLdapGroups(String baseDn, Filter 
filter) {
-    final Set<LdapGroupDto> groups = new HashSet<LdapGroupDto>();
+    final Set<LdapGroupDto> groups = new HashSet<>();
     final LdapTemplate ldapTemplate = loadLdapTemplate();
     LOG.trace("LDAP Group Query - Base DN: '{}' ; Filter: '{}'", baseDn, 
filter.encode());
     ldapTemplate.search(baseDn, filter.encode(),
@@ -651,7 +651,7 @@ public class AmbariLdapDataPopulator {
   }
 
   private Set<LdapUserDto> getFilteredLdapUsers(String baseDn, Filter filter) {
-    final Set<LdapUserDto> users = new HashSet<LdapUserDto>();
+    final Set<LdapUserDto> users = new HashSet<>();
     final LdapTemplate ldapTemplate = loadLdapTemplate();
     PagedResultsDirContextProcessor processor = createPagingProcessor();
     SearchControls searchControls = new SearchControls();
@@ -682,7 +682,7 @@ public class AmbariLdapDataPopulator {
    */
   protected Map<String, Group> getInternalGroups() {
     final List<Group> internalGroups = users.getAllGroups();
-    final Map<String, Group> internalGroupsMap = new HashMap<String, Group>();
+    final Map<String, Group> internalGroupsMap = new HashMap<>();
     for (Group group : internalGroups) {
       internalGroupsMap.put(group.getGroupName(), group);
     }
@@ -696,7 +696,7 @@ public class AmbariLdapDataPopulator {
    */
   protected Map<String, User> getInternalUsers() {
     final List<User> internalUsers = users.getAllUsers();
-    final Map<String, User> internalUsersMap = new HashMap<String, User>();
+    final Map<String, User> internalUsersMap = new HashMap<>();
     LOG.trace("Get all users from Ambari Server.");
     for (User user : internalUsers) {
       internalUsersMap.put(user.getUserName(), user);
@@ -715,7 +715,7 @@ public class AmbariLdapDataPopulator {
     if (internalMembers == null) {
       return Collections.emptyMap();
     }
-    final Map<String, User> internalMembersMap = new HashMap<String, User>();
+    final Map<String, User> internalMembersMap = new HashMap<>();
     for (User user : internalMembers) {
       internalMembersMap.put(user.getUserName(), user);
     }

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapBatchDto.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapBatchDto.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapBatchDto.java
index e328722..7e3a575 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapBatchDto.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapBatchDto.java
@@ -24,16 +24,16 @@ import java.util.Set;
  * Contains information for batch database update on LDAP synchronization.
  */
 public class LdapBatchDto {
-  private final Set<String> groupsToBecomeLdap = new HashSet<String>();
-  private final Set<String> groupsToBeCreated = new HashSet<String>();
-  private final Set<String> groupsToBeRemoved = new HashSet<String>();
+  private final Set<String> groupsToBecomeLdap = new HashSet<>();
+  private final Set<String> groupsToBeCreated = new HashSet<>();
+  private final Set<String> groupsToBeRemoved = new HashSet<>();
   private final Set<String> groupsProcessedInternal = new HashSet<>();
-  private final Set<String> usersSkipped = new HashSet<String>();
-  private final Set<String> usersToBecomeLdap = new HashSet<String>();
-  private final Set<String> usersToBeCreated = new HashSet<String>();
-  private final Set<String> usersToBeRemoved = new HashSet<String>();
-  private final Set<LdapUserGroupMemberDto> membershipToAdd = new 
HashSet<LdapUserGroupMemberDto>();
-  private final Set<LdapUserGroupMemberDto> membershipToRemove = new 
HashSet<LdapUserGroupMemberDto>();
+  private final Set<String> usersSkipped = new HashSet<>();
+  private final Set<String> usersToBecomeLdap = new HashSet<>();
+  private final Set<String> usersToBeCreated = new HashSet<>();
+  private final Set<String> usersToBeRemoved = new HashSet<>();
+  private final Set<LdapUserGroupMemberDto> membershipToAdd = new HashSet<>();
+  private final Set<LdapUserGroupMemberDto> membershipToRemove = new 
HashSet<>();
 
   public Set<String> getUsersSkipped() {
     return usersSkipped;

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapGroupDto.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapGroupDto.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapGroupDto.java
index 132cbe5..4b1e376 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapGroupDto.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapGroupDto.java
@@ -32,7 +32,7 @@ public class LdapGroupDto {
   /**
    * Set of member attributes. Usually it's either UID or DN of users.
    */
-  private Set<String> memberAttributes = new HashSet<String>();
+  private Set<String> memberAttributes = new HashSet<>();
 
   /**
    * Determines if the LDAP group is synchronized with internal group in 
database.

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapSyncDto.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapSyncDto.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapSyncDto.java
index 6bd2ab9..3f60350 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapSyncDto.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/ldap/LdapSyncDto.java
@@ -27,12 +27,12 @@ public class LdapSyncDto {
   /**
    * LDAP groups.
    */
-  private Set<LdapGroupDto> groups = new HashSet<LdapGroupDto>();
+  private Set<LdapGroupDto> groups = new HashSet<>();
 
   /**
    * LDAP users.
    */
-  private Set<LdapUserDto> users = new HashSet<LdapUserDto>();
+  private Set<LdapUserDto> users = new HashSet<>();
 
   /**
    * Get the LDAP groups.

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/security/unsecured/rest/ConnectionInfo.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/security/unsecured/rest/ConnectionInfo.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/security/unsecured/rest/ConnectionInfo.java
index cb25f0b..3ed84a0 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/security/unsecured/rest/ConnectionInfo.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/security/unsecured/rest/ConnectionInfo.java
@@ -35,7 +35,7 @@ import com.google.inject.Inject;
 @Path("/connection_info")
 public class ConnectionInfo {
     private static Log LOG = LogFactory.getLog(ConnectionInfo.class);
-    private static HashMap<String,String> response=new 
HashMap<String,String>();
+    private static HashMap<String,String> response= new HashMap<>();
     private static Configuration conf;
 
 

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/ServerActionExecutor.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/ServerActionExecutor.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/ServerActionExecutor.java
index b23d555..b0be6b3 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/ServerActionExecutor.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/ServerActionExecutor.java
@@ -81,7 +81,7 @@ public class ServerActionExecutor {
    * requestSharedDataMap object
    */
   private final Map<Long, ConcurrentMap<String, Object>> requestSharedDataMap =
-      new HashMap<Long, ConcurrentMap<String, Object>>();
+    new HashMap<>();
 
   /**
    * The hostname of the (Ambari) server.
@@ -233,7 +233,7 @@ public class ServerActionExecutor {
       ConcurrentMap<String, Object> map = requestSharedDataMap.get(requestId);
 
       if (map == null) {
-        map = new ConcurrentHashMap<String, Object>();
+        map = new ConcurrentHashMap<>();
         requestSharedDataMap.put(requestId, map);
       }
 

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/ADKerberosOperationHandler.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/ADKerberosOperationHandler.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/ADKerberosOperationHandler.java
index 87dbeea..cd19174 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/ADKerberosOperationHandler.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/ADKerberosOperationHandler.java
@@ -266,7 +266,7 @@ public class ADKerberosOperationHandler extends 
KerberosOperationHandler {
       realm = "";
     }
 
-    Map<String, Object> context = new HashMap<String, Object>();
+    Map<String, Object> context = new HashMap<>();
     context.put("normalized_principal", 
deconstructedPrincipal.getNormalizedPrincipal());
     context.put("principal_name", deconstructedPrincipal.getPrincipalName());
     context.put("principal_primary", deconstructedPrincipal.getPrimary());

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/AbstractPrepareKerberosServerAction.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/AbstractPrepareKerberosServerAction.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/AbstractPrepareKerberosServerAction.java
index 7824019..7aac346 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/AbstractPrepareKerberosServerAction.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/AbstractPrepareKerberosServerAction.java
@@ -92,7 +92,7 @@ public abstract class AbstractPrepareKerberosServerAction 
extends KerberosServer
       KerberosIdentityDataFileWriter kerberosIdentityDataFileWriter;
 
       // Create the context to use for filtering Kerberos Identities based on 
the state of the cluster
-      Map<String, Object> filterContext = new HashMap<String, Object>();
+      Map<String, Object> filterContext = new HashMap<>();
       filterContext.put("configurations", currentConfigurations);
       filterContext.put("services", cluster.getServices().keySet());
 
@@ -231,7 +231,7 @@ public abstract class AbstractPrepareKerberosServerAction 
extends KerberosServer
     Map<String, Map<String, String>> identityConfigurations = 
kerberosHelper.getIdentityConfigurations(identities);
     if ((identityConfigurations != null) && !identityConfigurations.isEmpty()) 
{
       if (propertiesToIgnore == null) {
-        propertiesToIgnore = new HashMap<String, Set<String>>();
+        propertiesToIgnore = new HashMap<>();
       }
 
       for (Map.Entry<String, Map<String, String>> entry : 
identityConfigurations.entrySet()) {
@@ -241,7 +241,7 @@ public abstract class AbstractPrepareKerberosServerAction 
extends KerberosServer
         if ((properties != null) && !properties.isEmpty()) {
           Set<String> propertyNames = propertiesToIgnore.get(configType);
           if (propertyNames == null) {
-            propertyNames = new HashSet<String>();
+            propertyNames = new HashSet<>();
             propertiesToIgnore.put(configType, propertyNames);
           }
           propertyNames.addAll(properties.keySet());

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreateKeytabFilesServerAction.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreateKeytabFilesServerAction.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreateKeytabFilesServerAction.java
index 5d6ccc0..9ee5f11 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreateKeytabFilesServerAction.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreateKeytabFilesServerAction.java
@@ -86,7 +86,7 @@ public class CreateKeytabFilesServerAction extends 
KerberosServerAction {
    * A map of data used to track what has been processed in order to optimize 
the creation of keytabs
    * such as knowing when to create a cached keytab file or use a cached 
keytab file.
    */
-  Map<String, Set<String>> visitedIdentities = new HashMap<String, 
Set<String>>();
+  Map<String, Set<String>> visitedIdentities = new HashMap<>();
 
   /**
    * Called to execute this action.  Upon invocation, calls
@@ -274,7 +274,7 @@ public class CreateKeytabFilesServerAction extends 
KerberosServerAction {
                   }
 
                   if (visitedPrincipalKeys == null) {
-                    visitedPrincipalKeys = new HashSet<String>();
+                    visitedPrincipalKeys = new HashSet<>();
                     visitedIdentities.put(evaluatedPrincipal, 
visitedPrincipalKeys);
                   }
 

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreatePrincipalsServerAction.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreatePrincipalsServerAction.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreatePrincipalsServerAction.java
index c7df55f..2fd5abe 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreatePrincipalsServerAction.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/CreatePrincipalsServerAction.java
@@ -71,7 +71,7 @@ public class CreatePrincipalsServerAction extends 
KerberosServerAction {
    * A set of visited principal names used to prevent unnecessary processing 
on already processed
    * principal names
    */
-  private Set<String> seenPrincipals = new HashSet<String>();
+  private Set<String> seenPrincipals = new HashSet<>();
 
   /**
    * Called to execute this action.  Upon invocation, calls

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/DestroyPrincipalsServerAction.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/DestroyPrincipalsServerAction.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/DestroyPrincipalsServerAction.java
index 3f631b4..fc2de99 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/DestroyPrincipalsServerAction.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/DestroyPrincipalsServerAction.java
@@ -56,7 +56,7 @@ public class DestroyPrincipalsServerAction extends 
KerberosServerAction {
    * A set of visited principal names used to prevent unnecessary processing 
on already processed
    * principal names
    */
-  private Set<String> seenPrincipals = new HashSet<String>();
+  private Set<String> seenPrincipals = new HashSet<>();
 
   /**
    * Called to execute this action.  Upon invocation, calls

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java
index 37779c6..5923b72 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java
@@ -643,8 +643,8 @@ public class IPAKerberosOperationHandler extends 
KerberosOperationHandler {
     PrincipalKeyCredential administratorCredentials = 
getAdministratorCredential();
     String defaultRealm = getDefaultRealm();
 
-    List<String> command = new ArrayList<String>();
-    List<String> kinit = new ArrayList<String>();
+    List<String> command = new ArrayList<>();
+    List<String> kinit = new ArrayList<>();
 
     String adminPrincipal = (administratorCredentials == null)
             ? null

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/KerberosOperationHandler.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/KerberosOperationHandler.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/KerberosOperationHandler.java
index 3e5e54c..eea5071 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/KerberosOperationHandler.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/KerberosOperationHandler.java
@@ -213,7 +213,7 @@ public abstract class KerberosOperationHandler {
 
   private PrincipalKeyCredential administratorCredential = null;
   private String defaultRealm = null;
-  private Set<EncryptionType> keyEncryptionTypes = new 
HashSet<EncryptionType>(DEFAULT_CIPHERS);
+  private Set<EncryptionType> keyEncryptionTypes = new 
HashSet<>(DEFAULT_CIPHERS);
   private boolean open = false;
 
   /**
@@ -338,8 +338,8 @@ public abstract class KerberosOperationHandler {
       throw new KerberosOperationException(String.format("Failed to create 
keytab file for %s, missing password", principal));
     }
 
-    Set<EncryptionType> ciphers = new 
HashSet<EncryptionType>(keyEncryptionTypes);
-    List<KeytabEntry> keytabEntries = new ArrayList<KeytabEntry>();
+    Set<EncryptionType> ciphers = new HashSet<>(keyEncryptionTypes);
+    List<KeytabEntry> keytabEntries = new ArrayList<>();
     Keytab keytab = new Keytab();
 
 
@@ -443,11 +443,11 @@ public abstract class KerberosOperationHandler {
   protected Keytab mergeKeytabs(Keytab keytab, Keytab updates) {
     List<KeytabEntry> keytabEntries = (keytab == null)
         ? Collections.<KeytabEntry>emptyList()
-        : new ArrayList<KeytabEntry>(keytab.getEntries());
+        : new ArrayList<>(keytab.getEntries());
     List<KeytabEntry> updateEntries = (updates == null)
         ? Collections.<KeytabEntry>emptyList()
-        : new ArrayList<KeytabEntry>(updates.getEntries());
-    List<KeytabEntry> mergedEntries = new ArrayList<KeytabEntry>();
+        : new ArrayList<>(updates.getEntries());
+    List<KeytabEntry> mergedEntries = new ArrayList<>();
 
     if (keytabEntries.isEmpty()) {
       mergedEntries.addAll(updateEntries);
@@ -569,10 +569,10 @@ public abstract class KerberosOperationHandler {
    * @param keyEncryptionTypes a Set of EncryptionKey values or null to 
indicate the default set
    */
   public void setKeyEncryptionTypes(Set<EncryptionType> keyEncryptionTypes) {
-    this.keyEncryptionTypes = new HashSet<EncryptionType>(
-        (keyEncryptionTypes == null)
-            ? DEFAULT_CIPHERS
-            : keyEncryptionTypes
+    this.keyEncryptionTypes = new HashSet<>(
+      (keyEncryptionTypes == null)
+        ? DEFAULT_CIPHERS
+        : keyEncryptionTypes
     );
   }
 
@@ -620,7 +620,7 @@ public abstract class KerberosOperationHandler {
     List<String> searchPaths = null;
 
     if (delimitedExecutableSearchPaths != null) {
-      searchPaths = new ArrayList<String>();
+      searchPaths = new ArrayList<>();
       for (String path : delimitedExecutableSearchPaths.split(",")) {
         path = path.trim();
         if (!path.isEmpty()) {
@@ -820,7 +820,7 @@ public abstract class KerberosOperationHandler {
    * @return a Set of EncryptionType values
    */
   protected Set<EncryptionType> translateEncryptionTypes(String names, String 
delimiter) {
-    Set<EncryptionType> encryptionTypes = new HashSet<EncryptionType>();
+    Set<EncryptionType> encryptionTypes = new HashSet<>();
 
     if (!StringUtils.isEmpty(names)) {
       for (String name : names.split((delimiter == null) ? "\\s+" : 
delimiter)) {

http://git-wip-us.apache.org/repos/asf/ambari/blob/edbb5492/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/MITKerberosOperationHandler.java
----------------------------------------------------------------------
diff --git 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/MITKerberosOperationHandler.java
 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/MITKerberosOperationHandler.java
index 309170b..55d7366 100644
--- 
a/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/MITKerberosOperationHandler.java
+++ 
b/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/MITKerberosOperationHandler.java
@@ -398,7 +398,7 @@ public class MITKerberosOperationHandler extends 
KerberosOperationHandler {
     PrincipalKeyCredential administratorCredential = 
getAdministratorCredential();
     String defaultRealm = getDefaultRealm();
 
-    List<String> command = new ArrayList<String>();
+    List<String> command = new ArrayList<>();
 
     String adminPrincipal = (administratorCredential == null)
         ? null
@@ -537,7 +537,7 @@ public class MITKerberosOperationHandler extends 
KerberosOperationHandler {
      * @param userPassword  the user's password (optional)
      */
     public InteractivePasswordHandler(String adminPassword, String 
userPassword) {
-      responses = new LinkedList<String>();
+      responses = new LinkedList<>();
 
       if (adminPassword != null) {
         responses.offer(adminPassword);
@@ -548,7 +548,7 @@ public class MITKerberosOperationHandler extends 
KerberosOperationHandler {
         responses.offer(userPassword);  // Add a 2nd time for the password 
"confirmation" request
       }
 
-      currentResponses = new LinkedList<String>(responses);
+      currentResponses = new LinkedList<>(responses);
     }
 
     @Override
@@ -563,7 +563,7 @@ public class MITKerberosOperationHandler extends 
KerberosOperationHandler {
 
     @Override
     public void start() {
-      currentResponses = new LinkedList<String>(responses);
+      currentResponses = new LinkedList<>(responses);
     }
   }
 }

Reply via email to