From 0b4d509011ee8f909711a31d9c1823d00bb368fd Mon Sep 17 00:00:00 2001
From: Violette Roche-Montane <violette.roche-montane@forgerock.com>
Date: Tue, 01 Apr 2014 09:07:24 +0000
Subject: [PATCH] Minor code cleanup
---
opendj-cli/src/main/java/com/forgerock/opendj/cli/ConnectionFactoryProvider.java | 28 +++++++++++++---------------
1 files changed, 13 insertions(+), 15 deletions(-)
diff --git a/opendj-cli/src/main/java/com/forgerock/opendj/cli/ConnectionFactoryProvider.java b/opendj-cli/src/main/java/com/forgerock/opendj/cli/ConnectionFactoryProvider.java
index 2c84378..be4754b 100644
--- a/opendj-cli/src/main/java/com/forgerock/opendj/cli/ConnectionFactoryProvider.java
+++ b/opendj-cli/src/main/java/com/forgerock/opendj/cli/ConnectionFactoryProvider.java
@@ -330,8 +330,9 @@
throw new ArgumentException(message);
}
- /* Couldn't have at the same time trustAll and
- trustStore related arg*/
+ /*
+ * Couldn't have at the same time trustAll and trustStore related arg
+ */
if (trustAllArg.isPresent() && trustStorePathArg.isPresent()) {
final LocalizableMessage message =
ERR_TOOL_CONFLICTING_ARGS.get(trustAllArg.getLongIdentifier(),
@@ -351,8 +352,9 @@
throw new ArgumentException(message);
}
- /* Couldn't have at the same time trustStorePasswordArg and
- trustStorePasswordFileArg*/
+ /*
+ * Couldn't have at the same time trustStorePasswordArg and trustStorePasswordFileArg
+ */
if (trustStorePasswordArg.isPresent() && trustStorePasswordFileArg.isPresent()) {
final LocalizableMessage message =
ERR_TOOL_CONFLICTING_ARGS.get(trustStorePasswordArg.getLongIdentifier(),
@@ -451,10 +453,8 @@
* <CODE>false</CODE> otherwise.
*/
private boolean canReadPath(final String path) {
- boolean canRead;
final File file = new File(path);
- canRead = file.exists() && file.canRead();
- return canRead;
+ return file.exists() && file.canRead();
}
private String getAuthID(final String mech) throws ArgumentException {
@@ -536,24 +536,24 @@
|| bindPasswordArg.isPresent()) {
bindRequest = Requests.newSimpleBindRequest(getBindName(), getPassword());
}
- } else if (mech.equals(DigestMD5SASLBindRequest.SASL_MECHANISM_NAME)) {
+ } else if (DigestMD5SASLBindRequest.SASL_MECHANISM_NAME.equals(mech)) {
bindRequest =
Requests.newDigestMD5SASLBindRequest(
getAuthID(DigestMD5SASLBindRequest.SASL_MECHANISM_NAME),
getPassword()).setAuthorizationID(getAuthzID())
.setRealm(getRealm());
- } else if (mech.equals(CRAMMD5SASLBindRequest.SASL_MECHANISM_NAME)) {
+ } else if (CRAMMD5SASLBindRequest.SASL_MECHANISM_NAME.equals(mech)) {
bindRequest =
Requests.newCRAMMD5SASLBindRequest(
getAuthID(CRAMMD5SASLBindRequest.SASL_MECHANISM_NAME),
getPassword());
- } else if (mech.equals(GSSAPISASLBindRequest.SASL_MECHANISM_NAME)) {
+ } else if (GSSAPISASLBindRequest.SASL_MECHANISM_NAME.equals(mech)) {
bindRequest =
Requests.newGSSAPISASLBindRequest(
getAuthID(GSSAPISASLBindRequest.SASL_MECHANISM_NAME), getPassword())
.setKDCAddress(getKDC()).setRealm(getRealm()).setAuthorizationID(
getAuthzID());
- } else if (mech.equals(ExternalSASLBindRequest.SASL_MECHANISM_NAME)) {
+ } else if (ExternalSASLBindRequest.SASL_MECHANISM_NAME.equals(mech)) {
if (sslContext == null) {
final LocalizableMessage message = ERR_TOOL_SASLEXTERNAL_NEEDS_SSL_OR_TLS.get();
throw new ArgumentException(message);
@@ -564,7 +564,7 @@
}
bindRequest =
Requests.newExternalSASLBindRequest().setAuthorizationID(getAuthzID());
- } else if (mech.equals(PlainSASLBindRequest.SASL_MECHANISM_NAME)) {
+ } else if (PlainSASLBindRequest.SASL_MECHANISM_NAME.equals(mech)) {
bindRequest =
Requests.newPlainSASLBindRequest(
getAuthID(PlainSASLBindRequest.SASL_MECHANISM_NAME), getPassword())
@@ -584,9 +584,7 @@
return bindRequest;
}
- /**
- * {@inheritDoc}
- */
+ /** {@inheritDoc} */
@Override
public String toString() {
return connFactory.toString();
--
Gitblit v1.10.0