From d0d27dbc1cd64b2ef276a3b280b21d9d6e1081db Mon Sep 17 00:00:00 2001
From: Gaetan Boismal <gaetan.boismal@forgerock.com>
Date: Fri, 22 May 2015 08:34:57 +0000
Subject: [PATCH] OPENDJ-2017 Code cleanup

---
 opendj-server-legacy/src/main/java/org/opends/quicksetup/installer/Installer.java | 2210 +++++++++++++++++++++++++++--------------------------------
 1 files changed, 1,022 insertions(+), 1,188 deletions(-)

diff --git a/opendj-server-legacy/src/main/java/org/opends/quicksetup/installer/Installer.java b/opendj-server-legacy/src/main/java/org/opends/quicksetup/installer/Installer.java
index 77932c1..181ce8a 100644
--- a/opendj-server-legacy/src/main/java/org/opends/quicksetup/installer/Installer.java
+++ b/opendj-server-legacy/src/main/java/org/opends/quicksetup/installer/Installer.java
@@ -148,8 +148,8 @@
  * Note that we can use freely the class org.opends.server.util.SetupUtils as
  * it is included in quicksetup.jar.
  */
-public abstract class Installer extends GuiApplication {
-
+public abstract class Installer extends GuiApplication
+{
   /** The minimum integer value that can be used for a port. */
   public static final int MIN_PORT_VALUE = 1;
 
@@ -191,15 +191,14 @@
   private boolean javaVersionCheckFailed;
 
   /** Map containing information about what has been configured remotely. */
-  private Map<ServerDescriptor, ConfiguredReplication> hmConfiguredRemoteReplication =
-      new HashMap<ServerDescriptor, ConfiguredReplication>();
+  private final Map<ServerDescriptor, ConfiguredReplication> hmConfiguredRemoteReplication = new HashMap<>();
 
   /** Set of progress steps that have been completed. */
-  protected Set<InstallProgressStep> completedProgress = new HashSet<InstallProgressStep>();
+  protected Set<InstallProgressStep> completedProgress = new HashSet<>();
 
-  private final List<WizardStep> lstSteps = new ArrayList<WizardStep>();
+  private final List<WizardStep> lstSteps = new ArrayList<>();
 
-  private final Set<WizardStep> SUBSTEPS = new HashSet<WizardStep>();
+  private final Set<WizardStep> SUBSTEPS = new HashSet<>();
   {
     SUBSTEPS.add(Step.CREATE_GLOBAL_ADMINISTRATOR);
     SUBSTEPS.add(Step.SUFFIXES_OPTIONS);
@@ -207,7 +206,7 @@
     SUBSTEPS.add(Step.REMOTE_REPLICATION_PORTS);
   }
 
-  private final Map<WizardStep, WizardStep> hmPreviousSteps = new HashMap<WizardStep, WizardStep>();
+  private final Map<WizardStep, WizardStep> hmPreviousSteps = new HashMap<>();
 
   private char[] selfSignedCertPw;
 
@@ -230,10 +229,12 @@
   public static final int THRESHOLD_CLOCK_DIFFERENCE_WARNING = 5;
 
   /** Creates a default instance. */
-  public Installer() {
+  public Installer()
+  {
     lstSteps.add(WELCOME);
-    if (LicenseFile.exists()) {
-        lstSteps.add(LICENSE);
+    if (LicenseFile.exists())
+    {
+      lstSteps.add(LICENSE);
     }
     lstSteps.add(SERVER_SETTINGS);
     lstSteps.add(REPLICATION_OPTIONS);
@@ -245,51 +246,50 @@
     lstSteps.add(REVIEW);
     lstSteps.add(PROGRESS);
     lstSteps.add(FINISHED);
-    try {
+    try
+    {
       if (!QuickSetupLog.isInitialized())
       {
-        QuickSetupLog.initLogFileHandler(
-                File.createTempFile(
-                    Constants.LOG_FILE_PREFIX,
-                    Constants.LOG_FILE_SUFFIX));
+        QuickSetupLog.initLogFileHandler(File.createTempFile(Constants.LOG_FILE_PREFIX, Constants.LOG_FILE_SUFFIX));
       }
-    } catch (IOException e) {
+    }
+    catch (IOException e)
+    {
       System.err.println("Failed to initialize log");
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public boolean isCancellable() {
+  public boolean isCancellable()
+  {
     return true;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public UserData createUserData() {
+  public UserData createUserData()
+  {
     UserData ud = new UserData();
     ud.setServerLocation(getDefaultServerLocation());
     initializeUserDataWithUserArguments(ud, getUserArguments());
     return ud;
   }
 
-  private void initializeUserDataWithUserArguments(UserData ud,
-      String[] userArguments)
+  private void initializeUserDataWithUserArguments(UserData ud, String[] userArguments)
   {
-    for (int i=0; i<userArguments.length; i++)
+    for (int i = 0; i < userArguments.length; i++)
     {
       if ("--connectTimeout".equalsIgnoreCase(userArguments[i]))
       {
         if (i < userArguments.length - 1)
         {
-          String sTimeout = userArguments[i+1];
+          String sTimeout = userArguments[i + 1];
           try
           {
             ud.setConnectTimeout(Integer.valueOf(sTimeout));
           }
           catch (Throwable t)
           {
-            logger.warn(LocalizableMessage.raw("Error getting connect timeout: "+t, t));
+            logger.warn(LocalizableMessage.raw("Error getting connect timeout: " + t, t));
           }
         }
         break;
@@ -297,61 +297,52 @@
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void forceToDisplay() {
+  public void forceToDisplay()
+  {
     forceToDisplaySetup = true;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public boolean canGoBack(WizardStep step) {
-    return step != WELCOME &&
-            step != PROGRESS &&
-            step != FINISHED;
+  public boolean canGoBack(WizardStep step)
+  {
+    return step != WELCOME && step != PROGRESS && step != FINISHED;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public boolean canGoForward(WizardStep step) {
-    return step != REVIEW &&
-            step != PROGRESS &&
-            step != FINISHED;
+  public boolean canGoForward(WizardStep step)
+  {
+    return step != REVIEW && step != PROGRESS && step != FINISHED;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public boolean canFinish(WizardStep step) {
+  public boolean canFinish(WizardStep step)
+  {
     return step == REVIEW;
   }
 
-  /** {@inheritDoc} */
-  @Override
+    @Override
   public boolean isSubStep(WizardStep step)
   {
     return SUBSTEPS.contains(step);
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isVisible(WizardStep step, UserData userData)
   {
     if (step == CREATE_GLOBAL_ADMINISTRATOR)
     {
-       return userData.mustCreateAdministrator();
+      return userData.mustCreateAdministrator();
     }
     else if (step == NEW_SUFFIX_OPTIONS)
     {
-      SuffixesToReplicateOptions suf =
-        userData.getSuffixesToReplicateOptions();
-      return suf != null && suf.getType() !=
-          SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES;
+      SuffixesToReplicateOptions suf = userData.getSuffixesToReplicateOptions();
+      return suf != null && suf.getType() != SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES;
     }
     else if (step == SUFFIXES_OPTIONS)
     {
       DataReplicationOptions repl = userData.getReplicationOptions();
-      return repl != null
-          && repl.getType() != DataReplicationOptions.Type.STANDALONE
+      return repl != null && repl.getType() != DataReplicationOptions.Type.STANDALONE
           && repl.getType() != DataReplicationOptions.Type.FIRST_IN_TOPOLOGY;
     }
     else if (step == REMOTE_REPLICATION_PORTS)
@@ -364,104 +355,111 @@
     return true;
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isVisible(WizardStep step, QuickSetup qs)
   {
     return isVisible(step, getUserData());
   }
 
-  /** {@inheritDoc} */
   @Override
-  public boolean finishClicked(final WizardStep cStep, final QuickSetup qs) {
-    if (cStep == Step.REVIEW) {
-        updateUserDataForReviewPanel(qs);
-        qs.launch();
-        qs.setCurrentStep(Step.PROGRESS);
-    } else {
-        throw new IllegalStateException(
-                "Cannot click on finish when we are not in the Review window");
+  public boolean finishClicked(final WizardStep cStep, final QuickSetup qs)
+  {
+    if (cStep == Step.REVIEW)
+    {
+      updateUserDataForReviewPanel(qs);
+      qs.launch();
+      qs.setCurrentStep(Step.PROGRESS);
+    }
+    else
+    {
+      throw new IllegalStateException("Cannot click on finish when we are not in the Review window");
     }
     // Installer responsible for updating the user data and launching
     return false;
   }
 
-  /** {@inheritDoc} */
-  @Override
-  public void nextClicked(WizardStep cStep, QuickSetup qs) {
-    if (cStep == PROGRESS) {
-      throw new IllegalStateException(
-          "Cannot click on next from progress step");
-    } else if (cStep == REVIEW) {
+    @Override
+  public void nextClicked(WizardStep cStep, QuickSetup qs)
+  {
+    if (cStep == PROGRESS)
+    {
+      throw new IllegalStateException("Cannot click on next from progress step");
+    }
+    else if (cStep == REVIEW)
+    {
       throw new IllegalStateException("Cannot click on next from review step");
-    } else if (cStep == FINISHED) {
-      throw new IllegalStateException(
-          "Cannot click on next from finished step");
+    }
+    else if (cStep == FINISHED)
+    {
+      throw new IllegalStateException("Cannot click on next from finished step");
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void closeClicked(WizardStep cStep, QuickSetup qs) {
-    if (cStep == PROGRESS) {
+  public void closeClicked(WizardStep cStep, QuickSetup qs)
+  {
+    if (cStep == PROGRESS)
+    {
       if (isFinished()
-              || qs.displayConfirmation(INFO_CONFIRM_CLOSE_INSTALL_MSG.get(),
-              INFO_CONFIRM_CLOSE_INSTALL_TITLE.get())) {
+          || qs.displayConfirmation(INFO_CONFIRM_CLOSE_INSTALL_MSG.get(), INFO_CONFIRM_CLOSE_INSTALL_TITLE.get()))
+      {
         qs.quit();
       }
     }
     else if (cStep == FINISHED)
     {
       qs.quit();
-    } else {
-      throw new IllegalStateException(
-              "Close only can be clicked on PROGRESS step");
+    }
+    else
+    {
+      throw new IllegalStateException("Close only can be clicked on PROGRESS step");
     }
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isFinished()
   {
     return getCurrentProgressStep() == InstallProgressStep.FINISHED_SUCCESSFULLY
-            || getCurrentProgressStep() == InstallProgressStep.FINISHED_CANCELED
+        || getCurrentProgressStep() == InstallProgressStep.FINISHED_CANCELED
         || getCurrentProgressStep() == InstallProgressStep.FINISHED_WITH_ERROR;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void cancel() {
+  public void cancel()
+  {
     setCurrentProgressStep(InstallProgressStep.WAITING_TO_CANCEL);
     notifyListeners(null);
     this.canceled = true;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void quitClicked(WizardStep cStep, QuickSetup qs) {
+  public void quitClicked(WizardStep cStep, QuickSetup qs)
+  {
     if (cStep == FINISHED)
     {
       qs.quit();
     }
-    else if (cStep == PROGRESS) {
-      throw new IllegalStateException(
-              "Cannot click on quit from progress step");
-    } else if (installStatus.isInstalled()) {
-      qs.quit();
-
-    } else if (javaVersionCheckFailed)
+    else if (cStep == PROGRESS)
+    {
+      throw new IllegalStateException("Cannot click on quit from progress step");
+    }
+    else if (installStatus.isInstalled())
     {
       qs.quit();
-
-    } else if (qs.displayConfirmation(INFO_CONFIRM_QUIT_INSTALL_MSG.get(),
-            INFO_CONFIRM_QUIT_INSTALL_TITLE.get())) {
+    }
+    else if (javaVersionCheckFailed)
+    {
+      qs.quit();
+    }
+    else if (qs.displayConfirmation(INFO_CONFIRM_QUIT_INSTALL_MSG.get(), INFO_CONFIRM_QUIT_INSTALL_TITLE.get()))
+    {
       qs.quit();
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public ButtonName getInitialFocusButtonName() {
+  public ButtonName getInitialFocusButtonName()
+  {
     if (!installStatus.isInstalled() || forceToDisplaySetup)
     {
       return ButtonName.NEXT;
@@ -476,194 +474,227 @@
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public JPanel createFramePanel(QuickSetupDialog dlg) {
+  public JPanel createFramePanel(QuickSetupDialog dlg)
+  {
     JPanel p;
     javaVersionCheckFailed = true;
     try
     {
       Utils.checkJavaVersion();
       javaVersionCheckFailed = false;
-      if (installStatus.isInstalled() && !forceToDisplaySetup) {
+      if (installStatus.isInstalled() && !forceToDisplaySetup)
+      {
         p = dlg.getInstalledPanel();
-      } else {
+      }
+      else
+      {
         p = super.createFramePanel(dlg);
       }
     }
     catch (IncompatibleVersionException ijv)
     {
       LocalizableMessageBuilder sb = new LocalizableMessageBuilder();
-      sb.append(Utils.breakHtmlString(
-          Utils.getHtml(ijv.getMessageObject().toString()),
+      sb.append(Utils.breakHtmlString(Utils.getHtml(ijv.getMessageObject().toString()),
           Constants.MAX_CHARS_PER_LINE_IN_DIALOG));
-      QuickSetupErrorPanel errPanel =
-        new QuickSetupErrorPanel(this, sb.toMessage());
+      QuickSetupErrorPanel errPanel = new QuickSetupErrorPanel(this, sb.toMessage());
       final QuickSetupDialog fDlg = dlg;
-      errPanel.addButtonActionListener(
-          new ButtonActionListener()
-          {
-            /**
-             * ButtonActionListener implementation. It assumes that we are
-             * called in the event thread.
-             *
-             * @param ev the ButtonEvent we receive.
-             */
-            @Override
-            public void buttonActionPerformed(ButtonEvent ev)
-            {
-              // Simulate a close button event
-              fDlg.notifyButtonEvent(ButtonName.QUIT);
-            }
-          });
+      errPanel.addButtonActionListener(new ButtonActionListener()
+      {
+        /**
+         * ButtonActionListener implementation. It assumes that we are called in
+         * the event thread.
+         *
+         * @param ev
+         *          the ButtonEvent we receive.
+         */
+        @Override
+        public void buttonActionPerformed(ButtonEvent ev)
+        {
+          // Simulate a close button event
+          fDlg.notifyButtonEvent(ButtonName.QUIT);
+        }
+      });
       p = errPanel;
     }
     return p;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public Set<? extends WizardStep> getWizardSteps() {
+  public Set<? extends WizardStep> getWizardSteps()
+  {
     return Collections.unmodifiableSet(new HashSet<WizardStep>(lstSteps));
   }
 
-  /** {@inheritDoc} */
   @Override
-  public QuickSetupStepPanel createWizardStepPanel(WizardStep step) {
+  public QuickSetupStepPanel createWizardStepPanel(WizardStep step)
+  {
     QuickSetupStepPanel p = null;
-    if (step == WELCOME) {
-        p = new InstallWelcomePanel(this);
-    } else if (step == LICENSE) {
-        p = new InstallLicensePanel(this);
-    } else if (step == SERVER_SETTINGS) {
-        p = new ServerSettingsPanel(this);
-    } else if (step == REPLICATION_OPTIONS) {
+    if (step == WELCOME)
+    {
+      p = new InstallWelcomePanel(this);
+    }
+    else if (step == LICENSE)
+    {
+      p = new InstallLicensePanel(this);
+    }
+    else if (step == SERVER_SETTINGS)
+    {
+      p = new ServerSettingsPanel(this);
+    }
+    else if (step == REPLICATION_OPTIONS)
+    {
       p = new DataReplicationPanel(this);
-    } else if (step == CREATE_GLOBAL_ADMINISTRATOR) {
+    }
+    else if (step == CREATE_GLOBAL_ADMINISTRATOR)
+    {
       p = new GlobalAdministratorPanel(this);
-    } else if (step == SUFFIXES_OPTIONS) {
+    }
+    else if (step == SUFFIXES_OPTIONS)
+    {
       p = new SuffixesToReplicatePanel(this);
-    } else if (step == REMOTE_REPLICATION_PORTS) {
+    }
+    else if (step == REMOTE_REPLICATION_PORTS)
+    {
       p = new RemoteReplicationPortsPanel(this);
-    } else if (step == NEW_SUFFIX_OPTIONS) {
-        p = new DataOptionsPanel(this);
-    } else if (step == RUNTIME_OPTIONS) {
+    }
+    else if (step == NEW_SUFFIX_OPTIONS)
+    {
+      p = new DataOptionsPanel(this);
+    }
+    else if (step == RUNTIME_OPTIONS)
+    {
       p = new RuntimeOptionsPanel(this);
-    } else if (step == REVIEW) {
-        p = new InstallReviewPanel(this);
-    } else if (step == PROGRESS) {
-        p = new ProgressPanel(this);
-    } else if (step == FINISHED) {
-        p = new FinishedPanel(this);
+    }
+    else if (step == REVIEW)
+    {
+      p = new InstallReviewPanel(this);
+    }
+    else if (step == PROGRESS)
+    {
+      p = new ProgressPanel(this);
+    }
+    else if (step == FINISHED)
+    {
+      p = new FinishedPanel(this);
     }
     return p;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void windowClosing(QuickSetupDialog dlg, WindowEvent evt) {
-
-    if (installStatus.isInstalled() && forceToDisplaySetup) {
+  public void windowClosing(QuickSetupDialog dlg, WindowEvent evt)
+  {
+    if (installStatus.isInstalled() && forceToDisplaySetup)
+    {
       // Simulate a close button event
       dlg.notifyButtonEvent(ButtonName.QUIT);
-    } else if (dlg.getDisplayedStep() == Step.PROGRESS) {
+    }
+    else if (dlg.getDisplayedStep() == Step.PROGRESS)
+    {
       // Simulate a close button event
       dlg.notifyButtonEvent(ButtonName.CLOSE);
-    } else {
+    }
+    else
+    {
       // Simulate a quit button event
       dlg.notifyButtonEvent(ButtonName.QUIT);
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public LocalizableMessage getCloseButtonToolTip() {
+  public LocalizableMessage getCloseButtonToolTip()
+  {
     return INFO_CLOSE_BUTTON_INSTALL_TOOLTIP.get();
   }
 
-  /** {@inheritDoc} */
   @Override
-  public LocalizableMessage getQuitButtonToolTip() {
+  public LocalizableMessage getQuitButtonToolTip()
+  {
     return INFO_QUIT_BUTTON_INSTALL_TOOLTIP.get();
   }
 
-  /** {@inheritDoc} */
   @Override
-  public LocalizableMessage getFinishButtonToolTip() {
+  public LocalizableMessage getFinishButtonToolTip()
+  {
     return INFO_FINISH_BUTTON_INSTALL_TOOLTIP.get();
   }
 
-  /** {@inheritDoc} */
   @Override
-  public int getExtraDialogHeight() {
+  public int getExtraDialogHeight()
+  {
     return UIFactory.EXTRA_DIALOG_HEIGHT;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public void previousClicked(WizardStep cStep, QuickSetup qs) {
-    if (cStep == WELCOME) {
-      throw new IllegalStateException(
-          "Cannot click on previous from progress step");
-    } else if (cStep == PROGRESS) {
-      throw new IllegalStateException(
-          "Cannot click on previous from progress step");
-    } else if (cStep == FINISHED) {
-      throw new IllegalStateException(
-          "Cannot click on previous from finished step");
+  public void previousClicked(WizardStep cStep, QuickSetup qs)
+  {
+    if (cStep == WELCOME)
+    {
+      throw new IllegalStateException("Cannot click on previous from progress step");
+    }
+    else if (cStep == PROGRESS)
+    {
+      throw new IllegalStateException("Cannot click on previous from progress step");
+    }
+    else if (cStep == FINISHED)
+    {
+      throw new IllegalStateException("Cannot click on previous from finished step");
     }
   }
 
-  /** {@inheritDoc} */
   @Override
-  public LocalizableMessage getFrameTitle() {
-    return Utils.getCustomizedObject("INFO_FRAME_INSTALL_TITLE",
-        INFO_FRAME_INSTALL_TITLE.get(DynamicConstants.PRODUCT_NAME),
-        LocalizableMessage.class);
+  public LocalizableMessage getFrameTitle()
+  {
+    return Utils.getCustomizedObject("INFO_FRAME_INSTALL_TITLE", INFO_FRAME_INSTALL_TITLE
+        .get(DynamicConstants.PRODUCT_NAME), LocalizableMessage.class);
   }
 
   /** Indicates the current progress step. */
-  private InstallProgressStep currentProgressStep =
-          InstallProgressStep.NOT_STARTED;
+  private InstallProgressStep currentProgressStep = InstallProgressStep.NOT_STARTED;
 
-  /** {@inheritDoc} */
   @Override
-  public void setWizardDialogState(QuickSetupDialog dlg,
-                                      UserData userData,
-                                      WizardStep step) {
-    if (!installStatus.isInstalled() || forceToDisplaySetup) {
+  public void setWizardDialogState(QuickSetupDialog dlg, UserData userData, WizardStep step)
+  {
+    if (!installStatus.isInstalled() || forceToDisplaySetup)
+    {
       // Set the default button for the frame
-      if (step == REVIEW) {
+      if (step == REVIEW)
+      {
         dlg.setFocusOnButton(ButtonName.FINISH);
         dlg.setDefaultButton(ButtonName.FINISH);
-      } else if (step == WELCOME) {
+      }
+      else if (step == WELCOME)
+      {
         dlg.setDefaultButton(ButtonName.NEXT);
         dlg.setFocusOnButton(ButtonName.NEXT);
-      } else if (step == PROGRESS || step == FINISHED) {
+      }
+      else if (step == PROGRESS || step == FINISHED)
+      {
         dlg.setDefaultButton(ButtonName.CLOSE);
         dlg.setFocusOnButton(ButtonName.CLOSE);
-      } else {
+      }
+      else
+      {
         dlg.setDefaultButton(ButtonName.NEXT);
       }
     }
   }
 
-  /** {@inheritDoc} */
   @Override
   public ProgressStep getCurrentProgressStep()
   {
     return currentProgressStep;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public WizardStep getFirstWizardStep() {
+  public WizardStep getFirstWizardStep()
+  {
     return WELCOME;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public WizardStep getNextWizardStep(WizardStep step) {
+  public WizardStep getNextWizardStep(WizardStep step)
+  {
     WizardStep next = null;
     if (step == Step.REPLICATION_OPTIONS)
     {
@@ -688,8 +719,7 @@
     }
     else if (step == Step.SUFFIXES_OPTIONS)
     {
-      switch (getUserData().getSuffixesToReplicateOptions().
-          getType())
+      switch (getUserData().getSuffixesToReplicateOptions().getType())
       {
       case REPLICATE_WITH_EXISTING_SUFFIXES:
 
@@ -713,7 +743,8 @@
     else
     {
       int i = lstSteps.indexOf(step);
-      if (i != -1 && i + 1 < lstSteps.size()) {
+      if (i != -1 && i + 1 < lstSteps.size())
+      {
         next = lstSteps.get(i + 1);
       }
     }
@@ -724,14 +755,14 @@
     return next;
   }
 
-  /** {@inheritDoc} */
   @Override
   public LinkedHashSet<WizardStep> getOrderedSteps()
   {
-    LinkedHashSet<WizardStep> orderedSteps = new LinkedHashSet<WizardStep>();
+    LinkedHashSet<WizardStep> orderedSteps = new LinkedHashSet<>();
     orderedSteps.add(WELCOME);
-    if (lstSteps.contains(LICENSE)) {
-       orderedSteps.add(LICENSE);
+    if (lstSteps.contains(LICENSE))
+    {
+      orderedSteps.add(LICENSE);
     }
     orderedSteps.add(SERVER_SETTINGS);
     orderedSteps.add(REPLICATION_OPTIONS);
@@ -746,38 +777,43 @@
     return orderedSteps;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public WizardStep getPreviousWizardStep(WizardStep step) {
+  public WizardStep getPreviousWizardStep(WizardStep step)
+  {
     //  Try with the steps calculated in method getNextWizardStep.
     WizardStep prev = hmPreviousSteps.get(step);
 
     if (prev == null)
     {
       int i = lstSteps.indexOf(step);
-      if (i != -1 && i > 0) {
+      if (i != -1 && i > 0)
+      {
         prev = lstSteps.get(i - 1);
       }
     }
     return prev;
   }
 
-  /** {@inheritDoc} */
   @Override
-  public WizardStep getFinishedStep() {
+  public WizardStep getFinishedStep()
+  {
     return Step.FINISHED;
   }
 
   /**
-   * Uninstalls installed services.  This is to be used when the user
-   * has elected to cancel an installation.
+   * Uninstalls installed services. This is to be used when the user has elected
+   * to cancel an installation.
    */
-  protected void uninstallServices() {
-    if (completedProgress.contains(
-            InstallProgressStep.ENABLING_WINDOWS_SERVICE)) {
-      try {
+  protected void uninstallServices()
+  {
+    if (completedProgress.contains(InstallProgressStep.ENABLING_WINDOWS_SERVICE))
+    {
+      try
+      {
         new InstallerHelper().disableWindowsService();
-      } catch (ApplicationException ae) {
+      }
+      catch (ApplicationException ae)
+      {
         logger.info(LocalizableMessage.raw("Error disabling Windows service", ae));
       }
     }
@@ -787,29 +823,27 @@
 
   /**
    * Creates the template files based in the contents of the UserData object.
-   * These templates files are used to generate automatically data.  To generate
+   * These templates files are used to generate automatically data. To generate
    * the template file the code will basically take into account the value of
    * the base dn and the number of entries to be generated.
    *
    * @return a list of file objects pointing to the create template files.
-   * @throws ApplicationException if an error occurs.
+   * @throws ApplicationException
+   *           if an error occurs.
    */
-  private File createTemplateFile() throws ApplicationException {
+  private File createTemplateFile() throws ApplicationException
+  {
     File file;
     try
     {
-      Set<String> baseDNs = new LinkedHashSet<String>(
-          getUserData().getNewSuffixOptions().getBaseDns());
+      Set<String> baseDNs = new LinkedHashSet<>(getUserData().getNewSuffixOptions().getBaseDns());
       int nEntries = getUserData().getNewSuffixOptions().getNumberEntries();
       file = SetupUtils.createTemplateFile(baseDNs, nEntries);
     }
     catch (IOException ioe)
     {
-      LocalizableMessage failedMsg = getThrowableMsg(
-          INFO_ERROR_CREATING_TEMP_FILE.get(), ioe);
-      throw new ApplicationException(
-          ReturnCode.FILE_SYSTEM_ACCESS_ERROR,
-          failedMsg, ioe);
+      LocalizableMessage failedMsg = getThrowableMsg(INFO_ERROR_CREATING_TEMP_FILE.get(), ioe);
+      throw new ApplicationException(ReturnCode.FILE_SYSTEM_ACCESS_ERROR, failedMsg, ioe);
     }
     return file;
   }
@@ -821,7 +855,8 @@
    * @throws ApplicationException
    *           if something goes wrong.
    */
-  protected void configureServer() throws ApplicationException {
+  protected void configureServer() throws ApplicationException
+  {
     notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CONFIGURING.get()));
 
     if (Utils.isWebStart())
@@ -835,14 +870,14 @@
     writeHostName();
     checkAbort();
 
-    List<String> argList = new ArrayList<String>();
+    List<String> argList = new ArrayList<>();
     argList.add("-C");
     argList.add(getConfigurationClassName());
 
     argList.add("-c");
     argList.add(getConfigurationFile());
     argList.add("-h");
-    argList.add(String.valueOf(getUserData().getHostName()));
+    argList.add(getUserData().getHostName());
     argList.add("-p");
     argList.add(String.valueOf(getUserData().getServerPort()));
     argList.add("--adminConnectorPort");
@@ -886,8 +921,7 @@
 
     if (createNotReplicatedSuffix())
     {
-      LinkedList<String> baseDns =
-        getUserData().getNewSuffixOptions().getBaseDns();
+      LinkedList<String> baseDns = getUserData().getNewSuffixOptions().getBaseDns();
       for (String baseDn : baseDns)
       {
         argList.add("-b");
@@ -918,7 +952,7 @@
       }
       nextPassword = "-w".equals(s);
     }
-    logger.info(LocalizableMessage.raw("configure DS cmd: "+cmd));
+    logger.info(LocalizableMessage.raw("configure DS cmd: " + cmd));
     final InstallerHelper helper = new InstallerHelper();
     setNotifyListeners(false);
     InvokeThread thread = new InvokeThread()
@@ -930,22 +964,21 @@
         {
           if (helper.invokeConfigureServer(args) != 0)
           {
-            ae = new ApplicationException(
-                ReturnCode.CONFIGURATION_ERROR,
-                INFO_ERROR_CONFIGURING.get(), null);
+            ae = new ApplicationException(ReturnCode.CONFIGURATION_ERROR, INFO_ERROR_CONFIGURING.get(), null);
           }
           else if (getUserData().getNewSuffixOptions().getBaseDns().isEmpty())
           {
             helper.deleteBackend(ROOT_BACKEND_NAME);
           }
-        } catch (ApplicationException aex)
+        }
+        catch (ApplicationException aex)
         {
           ae = aex;
-        } catch (Throwable t)
+        }
+        catch (Throwable t)
         {
           ae = new ApplicationException(
-              ReturnCode.CONFIGURATION_ERROR,
-              getThrowableMsg(INFO_ERROR_CONFIGURING.get(), t), t);
+              ReturnCode.CONFIGURATION_ERROR, getThrowableMsg(INFO_ERROR_CONFIGURING.get(), t), t);
         }
         finally
         {
@@ -985,8 +1018,8 @@
         String pwd = getSelfSignedCertificatePwd();
         final CertificateManager certManager =
             new CertificateManager(getSelfSignedKeystorePath(), CertificateManager.KEY_STORE_TYPE_JKS, pwd);
-        certManager.generateSelfSignedCertificate(SELF_SIGNED_CERT_ALIAS,
-            getSelfSignedCertificateSubjectDN(), getSelfSignedCertificateValidity());
+        certManager.generateSelfSignedCertificate(SELF_SIGNED_CERT_ALIAS, getSelfSignedCertificateSubjectDN(),
+            getSelfSignedCertificateValidity());
         SetupUtils.exportCertificate(certManager, SELF_SIGNED_CERT_ALIAS, getTemporaryCertificatePath());
         configureTrustStore(CertificateManager.KEY_STORE_TYPE_JKS, SELF_SIGNED_CERT_ALIAS, pwd);
         break;
@@ -1109,25 +1142,25 @@
   /**
    * This methods creates the base entry for the suffix based on the contents of
    * the UserData object provided in the constructor.
-   * @throws ApplicationException if something goes wrong.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
-  private void createBaseEntry() throws ApplicationException {
-    LinkedList<String> baseDns =
-      getUserData().getNewSuffixOptions().getBaseDns();
+  private void createBaseEntry() throws ApplicationException
+  {
+    LinkedList<String> baseDns = getUserData().getNewSuffixOptions().getBaseDns();
     if (baseDns.size() == 1)
     {
-      notifyListeners(getFormattedWithPoints(
-        INFO_PROGRESS_CREATING_BASE_ENTRY.get(baseDns.getFirst())));
+      notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_BASE_ENTRY.get(baseDns.getFirst())));
     }
     else
     {
-      notifyListeners(getFormattedWithPoints(
-          INFO_PROGRESS_CREATING_BASE_ENTRIES.get()));
+      notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_BASE_ENTRIES.get()));
     }
 
     final InstallerHelper helper = new InstallerHelper();
 
-    LinkedList<File> ldifFiles = new LinkedList<File>();
+    LinkedList<File> ldifFiles = new LinkedList<>();
 
     for (String baseDn : baseDns)
     {
@@ -1135,7 +1168,7 @@
     }
     checkAbort();
 
-    List<String> argList = new ArrayList<String>();
+    List<String> argList = new ArrayList<>();
     argList.add("-n");
     argList.add(ROOT_BACKEND_NAME);
     for (File f : ldifFiles)
@@ -1163,15 +1196,14 @@
 
           if (result != 0)
           {
-            ae = new ApplicationException(
-                ReturnCode.IMPORT_ERROR,
-                INFO_ERROR_CREATING_BASE_ENTRY.get(), null);
+            ae = new ApplicationException(ReturnCode.IMPORT_ERROR, INFO_ERROR_CREATING_BASE_ENTRY.get(), null);
           }
-        } catch (Throwable t)
+        }
+        catch (Throwable t)
         {
-          ae = new ApplicationException(
-              ReturnCode.IMPORT_ERROR,
-              getThrowableMsg(INFO_ERROR_CREATING_BASE_ENTRY.get(), t), t);
+          ae =
+              new ApplicationException(ReturnCode.IMPORT_ERROR,
+                  getThrowableMsg(INFO_ERROR_CREATING_BASE_ENTRY.get(), t), t);
         }
         finally
         {
@@ -1179,6 +1211,7 @@
         }
         isOver = true;
       }
+
       @Override
       public void abort()
       {
@@ -1196,7 +1229,8 @@
    * @throws ApplicationException
    *           if something goes wrong.
    */
-  private void importLDIF() throws ApplicationException {
+  private void importLDIF() throws ApplicationException
+  {
     LinkedList<String> ldifPaths = getUserData().getNewSuffixOptions().getLDIFPaths();
     LocalizableMessageBuilder mb = new LocalizableMessageBuilder();
     if (ldifPaths.size() > 1)
@@ -1230,7 +1264,7 @@
       pointAdder.start();
     }
 
-    List<String> argList = new ArrayList<String>();
+    List<String> argList = new ArrayList<>();
     argList.add("-n");
     argList.add(ROOT_BACKEND_NAME);
     for (String ldifPath : ldifPaths)
@@ -1269,15 +1303,13 @@
 
           if (result != 0)
           {
-            ae = new ApplicationException(
-                ReturnCode.IMPORT_ERROR,
-                INFO_ERROR_IMPORTING_LDIF.get(), null);
+            ae = new ApplicationException(ReturnCode.IMPORT_ERROR, INFO_ERROR_IMPORTING_LDIF.get(), null);
           }
-        } catch (Throwable t)
+        }
+        catch (Throwable t)
         {
           ae = new ApplicationException(
-              ReturnCode.IMPORT_ERROR,
-              getThrowableMsg(INFO_ERROR_IMPORTING_LDIF.get(), t), t);
+              ReturnCode.IMPORT_ERROR, getThrowableMsg(INFO_ERROR_IMPORTING_LDIF.get(), t), t);
         }
         finally
         {
@@ -1289,6 +1321,7 @@
         }
         isOver = true;
       }
+
       @Override
       public void abort()
       {
@@ -1298,12 +1331,12 @@
     try
     {
       invokeLongOperation(thread);
-    } catch (ApplicationException ae)
+    }
+    catch (ApplicationException ae)
     {
       if (!isVerbose() && lastImportProgress != null)
       {
-        notifyListeners(
-            getFormattedProgress(LocalizableMessage.raw(lastImportProgress)));
+        notifyListeners(getFormattedProgress(LocalizableMessage.raw(lastImportProgress)));
         notifyListeners(getLineBreak());
       }
       throw ae;
@@ -1316,19 +1349,21 @@
       }
       else
       {
-        notifyListeners(
-            getFormattedProgress(LocalizableMessage.raw(lastImportProgress)));
+        notifyListeners(getFormattedProgress(LocalizableMessage.raw(lastImportProgress)));
         notifyListeners(getLineBreak());
       }
     }
   }
 
   /**
-   * This methods imports automatically generated data based on the contents
-   * of the UserData object provided in the constructor.
-   * @throws ApplicationException if something goes wrong.
+   * This methods imports automatically generated data based on the contents of
+   * the UserData object provided in the constructor.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
-  private void importAutomaticallyGenerated() throws ApplicationException {
+  private void importAutomaticallyGenerated() throws ApplicationException
+  {
     File templatePath = createTemplateFile();
     int nEntries = getUserData().getNewSuffixOptions().getNumberEntries();
     LocalizableMessageBuilder mb = new LocalizableMessageBuilder();
@@ -1353,7 +1388,7 @@
     {
       setNotifyListeners(false);
     }
-    final List<String> argList = new ArrayList<String>();
+    final List<String> argList = new ArrayList<>();
     argList.add("-n");
     argList.add(ROOT_BACKEND_NAME);
     argList.add("-A");
@@ -1379,17 +1414,14 @@
           if (result != 0)
           {
             ae = new ApplicationException(
-                ReturnCode.IMPORT_ERROR,
-                INFO_ERROR_IMPORT_LDIF_TOOL_RETURN_CODE.get(result), null);
+                ReturnCode.IMPORT_ERROR, INFO_ERROR_IMPORT_LDIF_TOOL_RETURN_CODE.get(result), null);
           }
         }
         catch (Throwable t)
         {
-          ae = new ApplicationException(
-              ReturnCode.IMPORT_ERROR,
-              getThrowableMsg(INFO_ERROR_IMPORT_AUTOMATICALLY_GENERATED.get(
-                  joinAsString(" ", argList), t.getLocalizedMessage()), t),
-                  t);
+          ae = new ApplicationException(ReturnCode.IMPORT_ERROR, getThrowableMsg(
+                      INFO_ERROR_IMPORT_AUTOMATICALLY_GENERATED.get(joinAsString(" ", argList),
+                      t.getLocalizedMessage()), t), t);
         }
         finally
         {
@@ -1404,6 +1436,7 @@
         }
         isOver = true;
       }
+
       @Override
       public void abort()
       {
@@ -1420,22 +1453,20 @@
 
   /**
    * This method undoes the modifications made in other servers in terms of
-   * replication.  This method assumes that we are aborting the Installer and
+   * replication. This method assumes that we are aborting the Installer and
    * that is why it does not call checkAbort.
    */
   private void unconfigureRemote()
   {
     InitialLdapContext ctx = null;
-    if (registeredNewServerOnRemote || createdAdministrator ||
-            createdRemoteAds)
+    if (registeredNewServerOnRemote || createdAdministrator || createdRemoteAds)
     {
       // Try to connect
       DataReplicationOptions repl = getUserData().getReplicationOptions();
       AuthenticationData auth = repl.getAuthenticationData();
       if (isVerbose())
       {
-        notifyListeners(getFormattedWithPoints(
-          INFO_PROGRESS_UNCONFIGURING_ADS_ON_REMOTE.get(getHostDisplay(auth))));
+        notifyListeners(getFormattedWithPoints(INFO_PROGRESS_UNCONFIGURING_ADS_ON_REMOTE.get(getHostDisplay(auth))));
       }
       try
       {
@@ -1452,13 +1483,11 @@
           {
             try
             {
-              adsContext.unregisterServer(getNewServerAdsProperties(
-                                                                getUserData()));
+              adsContext.unregisterServer(getNewServerAdsProperties(getUserData()));
             }
             catch (ADSContextException ace)
             {
-              if (ace.getError() !=
-                ADSContextException.ErrorType.NOT_YET_REGISTERED)
+              if (ace.getError() != ADSContextException.ErrorType.NOT_YET_REGISTERED)
               {
                 throw ace;
               }
@@ -1469,8 +1498,7 @@
           }
           if (createdAdministrator)
           {
-            adsContext.deleteAdministrator(getAdministratorProperties(
-                                                                getUserData()));
+            adsContext.deleteAdministrator(getAdministratorProperties(getUserData()));
           }
         }
         if (isVerbose())
@@ -1490,16 +1518,11 @@
     InstallerHelper helper = new InstallerHelper();
     for (ServerDescriptor server : hmConfiguredRemoteReplication.keySet())
     {
-      notifyListeners(getFormattedWithPoints(
-          INFO_PROGRESS_UNCONFIGURING_REPLICATION_REMOTE.get(
-                  getHostPort(server))));
+      notifyListeners(getFormattedWithPoints(INFO_PROGRESS_UNCONFIGURING_REPLICATION_REMOTE.get(getHostPort(server))));
       try
       {
-        ctx = getRemoteConnection(server, getTrustManager(),
-            getPreferredConnections());
-        helper.unconfigureReplication(ctx,
-            hmConfiguredRemoteReplication.get(server),
-            ConnectionUtils.getHostPort(ctx));
+        ctx = getRemoteConnection(server, getTrustManager(), getPreferredConnections());
+        helper.unconfigureReplication(ctx, hmConfiguredRemoteReplication.get(server), ConnectionUtils.getHostPort(ctx));
       }
       catch (ApplicationException ae)
       {
@@ -1512,101 +1535,115 @@
 
   /**
    * This method configures the backends and suffixes that must be replicated.
-   * The setup uses the same backend names as in the remote servers.  If
-   * userRoot is not one of the backends defined in the remote servers, it
-   * deletes it from the configuration.
-   * NOTE: this method assumes that the server is running.
-   * @throws ApplicationException if something goes wrong.
+   * The setup uses the same backend names as in the remote servers. If userRoot
+   * is not one of the backends defined in the remote servers, it deletes it
+   * from the configuration. NOTE: this method assumes that the server is
+   * running.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
-  protected void createReplicatedBackendsIfRequired()
-  throws ApplicationException
+  protected void createReplicatedBackendsIfRequired() throws ApplicationException
   {
-    if (getUserData().getReplicationOptions().getType()
-        == DataReplicationOptions.Type.FIRST_IN_TOPOLOGY &&
-        getUserData().getNewSuffixOptions().getBaseDns().isEmpty())
+    final boolean isFirstInTopology = getUserData().getReplicationOptions().getType() ==
+                                      DataReplicationOptions.Type.FIRST_IN_TOPOLOGY;
+    final List<String> baseDns = getUserData().getNewSuffixOptions().getBaseDns();
+
+    if (isFirstInTopology && baseDns.isEmpty())
     {
       // There is nothing to do.
       return;
     }
-    notifyListeners(getFormattedWithPoints(
-        INFO_PROGRESS_CREATING_REPLICATED_BACKENDS.get()));
+    notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_REPLICATED_BACKENDS.get()));
+
     // The keys are the backend IDs and the values the list of base DNs.
-    Map<String, Set<String>> hmBackendSuffix =
-      new HashMap<String, Set<String>>();
+    final Map<String, Set<String>> hmBackendSuffix = new HashMap<>();
     boolean deleteUserRoot = false;
-    if (getUserData().getReplicationOptions().getType()
-        == DataReplicationOptions.Type.FIRST_IN_TOPOLOGY)
+    if (isFirstInTopology)
     {
-      Set<String> baseDns = new HashSet<String>(
-        getUserData().getNewSuffixOptions().getBaseDns());
-      hmBackendSuffix.put(ROOT_BACKEND_NAME, baseDns);
+      hmBackendSuffix.put(ROOT_BACKEND_NAME, new HashSet<>(baseDns));
     }
     else
     {
-      Set<SuffixDescriptor> suffixes =
-        getUserData().getSuffixesToReplicateOptions().getSuffixes();
-
+      Set<SuffixDescriptor> suffixes = getUserData().getSuffixesToReplicateOptions().getSuffixes();
       // The criteria to choose the name of the backend is to try to have the
       // configuration of the other server.  The algorithm consists on putting
-      // the remote servers in a list and pick the backend as they appear on the
-      // list.
-      Set<ServerDescriptor> serverList = new LinkedHashSet<ServerDescriptor>();
-      for (SuffixDescriptor suffix : suffixes)
-      {
-        for (ReplicaDescriptor replica : suffix.getReplicas())
-        {
-          serverList.add(replica.getServer());
-        }
-      }
-
-      for (SuffixDescriptor suffix : suffixes)
-      {
-        String backendName = null;
-        for (ServerDescriptor server : serverList)
-        {
-          for (ReplicaDescriptor replica : suffix.getReplicas())
-          {
-            if (replica.getServer() == server)
-            {
-              backendName = replica.getBackendName();
-              break;
-            }
-          }
-          if (backendName != null)
-          {
-            break;
-          }
-        }
-        boolean found = false;
-        for (String storedBackend : hmBackendSuffix.keySet())
-        {
-          if (storedBackend.equalsIgnoreCase(backendName))
-          {
-            found = true;
-            hmBackendSuffix.get(storedBackend).add(suffix.getDN());
-            break;
-          }
-        }
-        if (!found)
-        {
-          Set<String> baseDns = new HashSet<String>();
-          baseDns.add(suffix.getDN());
-          hmBackendSuffix.put(backendName, baseDns);
-        }
-      }
+      // the remote servers in a list and pick the backend as they appear on the list.
+      populateBackendsToCreate(hmBackendSuffix, suffixes);
       deleteUserRoot = true;
       for (String backendName : hmBackendSuffix.keySet())
       {
-        if (backendName.equalsIgnoreCase(ROOT_BACKEND_NAME))
+        if (ROOT_BACKEND_NAME.equalsIgnoreCase(backendName))
         {
           deleteUserRoot = false;
           break;
         }
       }
     }
+    createReplicatedBackends(hmBackendSuffix, deleteUserRoot);
+    notifyListeners(getFormattedDoneWithLineBreak());
+    checkAbort();
+  }
 
+  private void populateBackendsToCreate(Map<String, Set<String>> hmBackendSuffix, Set<SuffixDescriptor> suffixes)
+  {
+    Set<ServerDescriptor> serverList = getServerListFromSuffixes(suffixes);
+    for (SuffixDescriptor suffix : suffixes)
+    {
+      final String backendName = retrieveBackendNameForSuffix(serverList, suffix);
+      if (backendName != null)
+      {
+        final String backendNameKey = getOrAddBackend(hmBackendSuffix, backendName);
+        hmBackendSuffix.get(backendNameKey).add(suffix.getDN());
+      }
+    }
+  }
+
+  private Set<ServerDescriptor> getServerListFromSuffixes(Set<SuffixDescriptor> suffixes)
+  {
+    Set<ServerDescriptor> serverList = new LinkedHashSet<>();
+    for (SuffixDescriptor suffix : suffixes)
+    {
+      for (ReplicaDescriptor replica : suffix.getReplicas())
+      {
+        serverList.add(replica.getServer());
+      }
+    }
+    return serverList;
+  }
+
+  private String retrieveBackendNameForSuffix(Set<ServerDescriptor> serverList, SuffixDescriptor suffix)
+  {
+    for (ServerDescriptor server : serverList)
+    {
+      for (ReplicaDescriptor replica : suffix.getReplicas())
+      {
+        if (replica.getServer() == server)
+        {
+          return replica.getBackendName();
+        }
+      }
+    }
+    return null;
+  }
+
+  private String getOrAddBackend(Map<String, Set<String>> hmBackendSuffix, String backendName)
+  {
+    for (String storedBackend : hmBackendSuffix.keySet())
+    {
+      if (storedBackend.equalsIgnoreCase(backendName))
+      {
+        return storedBackend;
+      }
+    }
+    hmBackendSuffix.put(backendName, new HashSet<String>());
+    return backendName;
+  }
+
+  private void createReplicatedBackends(final Map<String, Set<String>> hmBackendSuffix, boolean deleteUserRoot)
+      throws ApplicationException
+  {
     InstallerHelper helper = new InstallerHelper();
-
     InitialLdapContext ctx = null;
     try
     {
@@ -1614,56 +1651,47 @@
       if (deleteUserRoot)
       {
         // Delete the userRoot backend.
-        helper.deleteBackend(ctx, ROOT_BACKEND_NAME,
-            ConnectionUtils.getHostPort(ctx));
+        helper.deleteBackend(ctx, ROOT_BACKEND_NAME, ConnectionUtils.getHostPort(ctx));
       }
       for (String backendName : hmBackendSuffix.keySet())
       {
-        if (backendName.equalsIgnoreCase(ROOT_BACKEND_NAME))
+        if (ROOT_BACKEND_NAME.equalsIgnoreCase(backendName))
         {
-          helper.setBaseDns(
-              ctx, backendName, hmBackendSuffix.get(backendName),
-              ConnectionUtils.getHostPort(ctx));
+          helper.setBaseDns(ctx, backendName, hmBackendSuffix.get(backendName), ConnectionUtils.getHostPort(ctx));
         }
         else
         {
           helper.createLocalDBBackend(
-              ctx, backendName, hmBackendSuffix.get(backendName),
-              ConnectionUtils.getHostPort(ctx));
+              ctx, backendName, hmBackendSuffix.get(backendName), ConnectionUtils.getHostPort(ctx));
         }
       }
     }
     catch (NamingException ne)
     {
-      LocalizableMessage failedMsg = getThrowableMsg(
-              INFO_ERROR_CONNECTING_TO_LOCAL.get(), ne);
-      throw new ApplicationException(
-          ReturnCode.CONFIGURATION_ERROR, failedMsg, ne);
+      LocalizableMessage failedMsg = getThrowableMsg(INFO_ERROR_CONNECTING_TO_LOCAL.get(), ne);
+      throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, failedMsg, ne);
     }
     finally
     {
       StaticUtils.close(ctx);
     }
-
-    notifyListeners(getFormattedDoneWithLineBreak());
-    checkAbort();
   }
 
   /**
    * This method creates the replication configuration for the suffixes on the
    * the local server (and eventually in the remote servers) to synchronize
-   * things.
-   * NOTE: this method assumes that the server is running.
-   * @throws ApplicationException if something goes wrong.
+   * things. NOTE: this method assumes that the server is running.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
   protected void configureReplication() throws ApplicationException
   {
-    notifyListeners(getFormattedWithPoints(
-        INFO_PROGRESS_CONFIGURING_REPLICATION.get()));
+    notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CONFIGURING_REPLICATION.get()));
 
     InstallerHelper helper = new InstallerHelper();
-    Set<Integer> knownServerIds = new HashSet<Integer>();
-    Set<Integer> knownReplicationServerIds = new HashSet<Integer>();
+    Set<Integer> knownServerIds = new HashSet<>();
+    Set<Integer> knownReplicationServerIds = new HashSet<>();
     if (lastLoadedCache != null)
     {
       for (SuffixDescriptor suffix : lastLoadedCache.getSuffixes())
@@ -1678,15 +1706,14 @@
         Object v = server.getServerProperties().get(REPLICATION_SERVER_ID);
         if (v != null)
         {
-          knownReplicationServerIds.add((Integer)v);
+          knownReplicationServerIds.add((Integer) v);
         }
       }
     }
     else
     {
-      /* There is no ADS anywhere.  Just use the SuffixDescriptors we found */
-      for (SuffixDescriptor suffix :
-        getUserData().getSuffixesToReplicateOptions().getAvailableSuffixes())
+      /* There is no ADS anywhere. Just use the SuffixDescriptors we found */
+      for (SuffixDescriptor suffix : getUserData().getSuffixesToReplicateOptions().getAvailableSuffixes())
       {
         for (ReplicaDescriptor replica : suffix.getReplicas())
         {
@@ -1694,27 +1721,26 @@
           Object v = replica.getServer().getServerProperties().get(REPLICATION_SERVER_ID);
           if (v != null)
           {
-            knownReplicationServerIds.add((Integer)v);
+            knownReplicationServerIds.add((Integer) v);
           }
         }
       }
     }
 
-    /* For each suffix specified by the user, create a map from the suffix
-       DN to the set of replication servers. The initial instance in a topology
-       is a degenerate case. Also, collect a set of all observed replication
-       servers as the set of ADS suffix replicas (all instances hosting the
-       replication server also replicate ADS). */
-    Map<String, Set<String>> replicationServers
-            = new HashMap<String, Set<String>>();
-    Set<String> adsServers = new HashSet<String>();
+    /*
+     * For each suffix specified by the user, create a map from the suffix DN to
+     * the set of replication servers. The initial instance in a topology is a
+     * degenerate case. Also, collect a set of all observed replication servers
+     * as the set of ADS suffix replicas (all instances hosting the replication
+     * server also replicate ADS).
+     */
+    Map<String, Set<String>> replicationServers = new HashMap<>();
+    Set<String> adsServers = new HashSet<>();
 
-    if (getUserData().getReplicationOptions().getType()
-            == DataReplicationOptions.Type.FIRST_IN_TOPOLOGY)
+    if (getUserData().getReplicationOptions().getType() == DataReplicationOptions.Type.FIRST_IN_TOPOLOGY)
     {
-      List<String> baseDns =
-        getUserData().getNewSuffixOptions().getBaseDns();
-      Set<String> h = new HashSet<String>();
+      List<String> baseDns = getUserData().getNewSuffixOptions().getBaseDns();
+      Set<String> h = new HashSet<>();
       h.add(getLocalReplicationServer());
       adsServers.add(getLocalReplicationServer());
       for (String dn : baseDns)
@@ -1724,31 +1750,28 @@
     }
     else
     {
-      Set<SuffixDescriptor> suffixes =
-        getUserData().getSuffixesToReplicateOptions().getSuffixes();
+      Set<SuffixDescriptor> suffixes = getUserData().getSuffixesToReplicateOptions().getSuffixes();
       for (SuffixDescriptor suffix : suffixes)
       {
-        Set<String> h = new HashSet<String>(suffix.getReplicationServers());
+        Set<String> h = new HashSet<>(suffix.getReplicationServers());
         adsServers.addAll(suffix.getReplicationServers());
         h.add(getLocalReplicationServer());
         adsServers.add(getLocalReplicationServer());
         for (ReplicaDescriptor replica : suffix.getReplicas())
         {
           ServerDescriptor server = replica.getServer();
-          AuthenticationData repPort
-                  = getUserData().getRemoteWithNoReplicationPort().get(server);
+          AuthenticationData repPort = getUserData().getRemoteWithNoReplicationPort().get(server);
           if (repPort != null)
           {
-            h.add(server.getHostName()+":"+repPort.getPort());
-            adsServers.add(server.getHostName()+":"+repPort.getPort());
+            h.add(server.getHostName() + ":" + repPort.getPort());
+            adsServers.add(server.getHostName() + ":" + repPort.getPort());
           }
         }
         replicationServers.put(suffix.getDN(), h);
       }
     }
     replicationServers.put(ADSContext.getAdministrationSuffixDN(), adsServers);
-    replicationServers.put(Constants.SCHEMA_DN,
-        new HashSet<String>(adsServers));
+    replicationServers.put(Constants.SCHEMA_DN, new HashSet<String>(adsServers));
 
     InitialLdapContext ctx = null;
     long localTime = -1;
@@ -1768,10 +1791,8 @@
     }
     catch (NamingException ne)
     {
-      LocalizableMessage failedMsg = getThrowableMsg(
-              INFO_ERROR_CONNECTING_TO_LOCAL.get(), ne);
-      throw new ApplicationException(
-          ReturnCode.CONFIGURATION_ERROR, failedMsg, ne);
+      LocalizableMessage failedMsg = getThrowableMsg(INFO_ERROR_CONNECTING_TO_LOCAL.get(), ne);
+      throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, failedMsg, ne);
     }
     finally
     {
@@ -1780,20 +1801,17 @@
     notifyListeners(getFormattedDoneWithLineBreak());
     checkAbort();
 
-    if (getUserData().getReplicationOptions().getType()
-            == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY)
+    if (getUserData().getReplicationOptions().getType() == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY)
     {
-      Map<ServerDescriptor, Set<ReplicaDescriptor>> hm =
-        new HashMap<ServerDescriptor, Set<ReplicaDescriptor>>();
-      for (SuffixDescriptor suffix :
-        getUserData().getSuffixesToReplicateOptions().getSuffixes())
+      Map<ServerDescriptor, Set<ReplicaDescriptor>> hm = new HashMap<>();
+      for (SuffixDescriptor suffix : getUserData().getSuffixesToReplicateOptions().getSuffixes())
       {
         for (ReplicaDescriptor replica : suffix.getReplicas())
         {
           Set<ReplicaDescriptor> replicas = hm.get(replica.getServer());
           if (replicas == null)
           {
-            replicas = new HashSet<ReplicaDescriptor>();
+            replicas = new HashSet<>();
             hm.put(replica.getServer(), replicas);
           }
           replicas.add(replica);
@@ -1801,9 +1819,8 @@
       }
       for (ServerDescriptor server : hm.keySet())
       {
-        notifyListeners(getFormattedWithPoints(
-            INFO_PROGRESS_CONFIGURING_REPLICATION_REMOTE.get(getHostPort(server))));
-        Integer v = (Integer)server.getServerProperties().get(REPLICATION_SERVER_PORT);
+        notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CONFIGURING_REPLICATION_REMOTE.get(getHostPort(server))));
+        Integer v = (Integer) server.getServerProperties().get(REPLICATION_SERVER_PORT);
         int replicationPort;
         boolean enableSecureReplication;
         if (v != null)
@@ -1813,8 +1830,7 @@
         }
         else
         {
-          AuthenticationData authData =
-            getUserData().getRemoteWithNoReplicationPort().get(server);
+          AuthenticationData authData = getUserData().getRemoteWithNoReplicationPort().get(server);
           if (authData != null)
           {
             replicationPort = authData.getPort();
@@ -1824,19 +1840,17 @@
           {
             replicationPort = Constants.DEFAULT_REPLICATION_PORT;
             enableSecureReplication = false;
-            logger.warn(LocalizableMessage.raw("Could not find replication port for: "+
-                getHostPort(server)));
+            logger.warn(LocalizableMessage.raw("Could not find replication port for: " + getHostPort(server)));
           }
         }
-        Set<String> dns = new HashSet<String>();
+        Set<String> dns = new HashSet<>();
         for (ReplicaDescriptor replica : hm.get(server))
         {
           dns.add(replica.getSuffix().getDN());
         }
         dns.add(ADSContext.getAdministrationSuffixDN());
         dns.add(Constants.SCHEMA_DN);
-        Map<String, Set<String>> remoteReplicationServers
-        = new HashMap<String, Set<String>>();
+        Map<String, Set<String>> remoteReplicationServers = new HashMap<>();
         for (String dn : dns)
         {
           Set<String> repServer = replicationServers.get(dn);
@@ -1859,29 +1873,23 @@
           }
           else
           {
-            logger.warn(LocalizableMessage.raw("Could not find replication server for: "+
-                dn));
+            logger.warn(LocalizableMessage.raw("Could not find replication server for: " + dn));
           }
         }
 
-
-        ctx = getRemoteConnection(server, getTrustManager(),
-            getPreferredConnections());
+        ctx = getRemoteConnection(server, getTrustManager(), getPreferredConnections());
         ConfiguredReplication repl =
-          helper.configureReplication(ctx, remoteReplicationServers,
-              replicationPort, enableSecureReplication,
-              ConnectionUtils.getHostPort(ctx), knownReplicationServerIds,
-              knownServerIds);
+            helper.configureReplication(ctx, remoteReplicationServers, replicationPort, enableSecureReplication,
+                ConnectionUtils.getHostPort(ctx), knownReplicationServerIds, knownServerIds);
         long remoteTimeMeasureTime = System.currentTimeMillis();
         long remoteTime = Utils.getServerClock(ctx);
-        if (localTime != -1 && remoteTime != -1
+        if (localTime != -1
+            && remoteTime != -1
             && Math.abs(localTime - remoteTime - localTimeMeasureTime + remoteTimeMeasureTime) >
-                THRESHOLD_CLOCK_DIFFERENCE_WARNING * 60 * 1000)
+               THRESHOLD_CLOCK_DIFFERENCE_WARNING * 60 * 1000)
         {
-          notifyListeners(getFormattedWarning(
-              INFO_WARNING_SERVERS_CLOCK_DIFFERENCE.get(
-                  localServerDisplay, ConnectionUtils.getHostPort(ctx),
-                  THRESHOLD_CLOCK_DIFFERENCE_WARNING)));
+          notifyListeners(getFormattedWarning(INFO_WARNING_SERVERS_CLOCK_DIFFERENCE.get(localServerDisplay,
+              ConnectionUtils.getHostPort(ctx), THRESHOLD_CLOCK_DIFFERENCE_WARNING)));
         }
 
         hmConfiguredRemoteReplication.put(server, repl);
@@ -1895,153 +1903,126 @@
 
   /**
    * This methods enables this server as a Windows service.
-   * @throws ApplicationException if something goes wrong.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
-  protected void enableWindowsService() throws ApplicationException {
-      notifyListeners(getFormattedWithPoints(
-        INFO_PROGRESS_ENABLING_WINDOWS_SERVICE.get()));
-      InstallerHelper helper = new InstallerHelper();
-      helper.enableWindowsService();
-      notifyListeners(getLineBreak());
+  protected void enableWindowsService() throws ApplicationException
+  {
+    notifyListeners(getFormattedWithPoints(INFO_PROGRESS_ENABLING_WINDOWS_SERVICE.get()));
+    InstallerHelper helper = new InstallerHelper();
+    helper.enableWindowsService();
+    notifyListeners(getLineBreak());
   }
 
   /**
    * Updates the contents of the provided map with the localized summary
    * strings.
-   * @param hmSummary the Map to be updated.
-   * @param isCli a boolean to indicate if the install is using CLI or GUI
+   *
+   * @param hmSummary
+   *          the Map to be updated.
+   * @param isCli
+   *          a boolean to indicate if the install is using CLI or GUI
    */
-  protected void initSummaryMap(
-      Map<ProgressStep, LocalizableMessage> hmSummary,
-      boolean isCli)
+  protected void initSummaryMap(Map<ProgressStep, LocalizableMessage> hmSummary, boolean isCli)
   {
-    hmSummary.put(InstallProgressStep.NOT_STARTED,
-        getFormattedSummary(INFO_SUMMARY_INSTALL_NOT_STARTED.get()));
-    hmSummary.put(InstallProgressStep.DOWNLOADING,
-        getFormattedSummary(INFO_SUMMARY_DOWNLOADING.get()));
-    hmSummary.put(InstallProgressStep.EXTRACTING,
-        getFormattedSummary(INFO_SUMMARY_EXTRACTING.get()));
-    hmSummary.put(InstallProgressStep.CONFIGURING_SERVER,
-        getFormattedSummary(INFO_SUMMARY_CONFIGURING.get()));
-    hmSummary.put(InstallProgressStep.CREATING_BASE_ENTRY,
-        getFormattedSummary(INFO_SUMMARY_CREATING_BASE_ENTRY.get()));
-    hmSummary.put(InstallProgressStep.IMPORTING_LDIF,
-        getFormattedSummary(INFO_SUMMARY_IMPORTING_LDIF.get()));
-    hmSummary.put(
-        InstallProgressStep.IMPORTING_AUTOMATICALLY_GENERATED,
-        getFormattedSummary(
-            INFO_SUMMARY_IMPORTING_AUTOMATICALLY_GENERATED.get()));
+    hmSummary.put(InstallProgressStep.NOT_STARTED, getFormattedSummary(INFO_SUMMARY_INSTALL_NOT_STARTED.get()));
+    hmSummary.put(InstallProgressStep.DOWNLOADING, getFormattedSummary(INFO_SUMMARY_DOWNLOADING.get()));
+    hmSummary.put(InstallProgressStep.EXTRACTING, getFormattedSummary(INFO_SUMMARY_EXTRACTING.get()));
+    hmSummary.put(InstallProgressStep.CONFIGURING_SERVER, getFormattedSummary(INFO_SUMMARY_CONFIGURING.get()));
+    hmSummary.put(InstallProgressStep.CREATING_BASE_ENTRY, getFormattedSummary(INFO_SUMMARY_CREATING_BASE_ENTRY.get()));
+    hmSummary.put(InstallProgressStep.IMPORTING_LDIF, getFormattedSummary(INFO_SUMMARY_IMPORTING_LDIF.get()));
+    hmSummary.put(InstallProgressStep.IMPORTING_AUTOMATICALLY_GENERATED,
+        getFormattedSummary(INFO_SUMMARY_IMPORTING_AUTOMATICALLY_GENERATED.get()));
     hmSummary.put(InstallProgressStep.CONFIGURING_REPLICATION,
-        getFormattedSummary(INFO_SUMMARY_CONFIGURING_REPLICATION.get()));
-    hmSummary.put(InstallProgressStep.STARTING_SERVER,
-        getFormattedSummary(INFO_SUMMARY_STARTING.get()));
-    hmSummary.put(InstallProgressStep.STOPPING_SERVER,
-        getFormattedSummary(INFO_SUMMARY_STOPPING.get()));
-    hmSummary.put(InstallProgressStep.CONFIGURING_ADS,
-        getFormattedSummary(INFO_SUMMARY_CONFIGURING_ADS.get()));
+                  getFormattedSummary(INFO_SUMMARY_CONFIGURING_REPLICATION.get()));
+    hmSummary.put(InstallProgressStep.STARTING_SERVER, getFormattedSummary(INFO_SUMMARY_STARTING.get()));
+    hmSummary.put(InstallProgressStep.STOPPING_SERVER, getFormattedSummary(INFO_SUMMARY_STOPPING.get()));
+    hmSummary.put(InstallProgressStep.CONFIGURING_ADS, getFormattedSummary(INFO_SUMMARY_CONFIGURING_ADS.get()));
     hmSummary.put(InstallProgressStep.INITIALIZE_REPLICATED_SUFFIXES,
-        getFormattedSummary(INFO_SUMMARY_INITIALIZE_REPLICATED_SUFFIXES.get()));
+                  getFormattedSummary(INFO_SUMMARY_INITIALIZE_REPLICATED_SUFFIXES.get()));
     hmSummary.put(InstallProgressStep.ENABLING_WINDOWS_SERVICE,
-        getFormattedSummary(INFO_SUMMARY_ENABLING_WINDOWS_SERVICE.get()));
-    hmSummary.put(InstallProgressStep.WAITING_TO_CANCEL,
-        getFormattedSummary(INFO_SUMMARY_WAITING_TO_CANCEL.get()));
-    hmSummary.put(InstallProgressStep.CANCELING,
-        getFormattedSummary(INFO_SUMMARY_CANCELING.get()));
+                  getFormattedSummary(INFO_SUMMARY_ENABLING_WINDOWS_SERVICE.get()));
+    hmSummary.put(InstallProgressStep.WAITING_TO_CANCEL, getFormattedSummary(INFO_SUMMARY_WAITING_TO_CANCEL.get()));
+    hmSummary.put(InstallProgressStep.CANCELING, getFormattedSummary(INFO_SUMMARY_CANCELING.get()));
 
     Installation installation = getInstallation();
-    String cmd = Utils.addWordBreaks(
-        getPath(installation.getControlPanelCommandFile()), 60, 5);
+    String cmd = Utils.addWordBreaks(getPath(installation.getControlPanelCommandFile()), 60, 5);
     if (!isCli)
     {
-      cmd = UIFactory.applyFontToHtml(cmd,
-                    UIFactory.INSTRUCTIONS_MONOSPACE_FONT);
+      cmd = UIFactory.applyFontToHtml(cmd, UIFactory.INSTRUCTIONS_MONOSPACE_FONT);
     }
-    String formattedPath = Utils.addWordBreaks(
-        formatter.getFormattedText(
-            LocalizableMessage.raw(getPath(new File(getInstancePath())))).toString(),
-            60, 5);
-    LocalizableMessage successMessage = Utils.getCustomizedObject(
-        "INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY",
-        INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY.get(
-            DynamicConstants.PRODUCT_NAME,
-            DynamicConstants.PRODUCT_NAME,
-            formattedPath,
-            INFO_GENERAL_SERVER_STOPPED.get(),
-            DynamicConstants.DOC_QUICK_REFERENCE_GUIDE,
-            DynamicConstants.PRODUCT_NAME,
-            cmd), LocalizableMessage.class);
-    hmSummary.put(InstallProgressStep.FINISHED_SUCCESSFULLY,
-            getFormattedSuccess(successMessage));
-    hmSummary.put(InstallProgressStep.FINISHED_CANCELED,
-            getFormattedSuccess(INFO_SUMMARY_INSTALL_FINISHED_CANCELED.get()));
-    hmSummary.put(InstallProgressStep.FINISHED_WITH_ERROR,
-            getFormattedError(INFO_SUMMARY_INSTALL_FINISHED_WITH_ERROR.get(
-                    INFO_GENERAL_SERVER_STOPPED.get(),
-                    cmd)));
+    String formattedPath =
+        Utils.addWordBreaks(formatter.getFormattedText(LocalizableMessage.raw(getPath(new File(getInstancePath()))))
+            .toString(), 60, 5);
+    LocalizableMessage successMessage =
+        Utils.getCustomizedObject("INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY",
+            INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY.get(DynamicConstants.PRODUCT_NAME,
+                DynamicConstants.PRODUCT_NAME, formattedPath, INFO_GENERAL_SERVER_STOPPED.get(),
+                DynamicConstants.DOC_QUICK_REFERENCE_GUIDE, DynamicConstants.PRODUCT_NAME, cmd),
+            LocalizableMessage.class);
+    hmSummary.put(InstallProgressStep.FINISHED_SUCCESSFULLY, getFormattedSuccess(successMessage));
+    hmSummary.put(InstallProgressStep.FINISHED_CANCELED, getFormattedSuccess(INFO_SUMMARY_INSTALL_FINISHED_CANCELED
+        .get()));
+    hmSummary.put(InstallProgressStep.FINISHED_WITH_ERROR, getFormattedError(INFO_SUMMARY_INSTALL_FINISHED_WITH_ERROR
+        .get(INFO_GENERAL_SERVER_STOPPED.get(), cmd)));
   }
 
   /**
    * Updates the messages in the summary with the state of the server.
-   * @param hmSummary the Map containing the messages.
-   * @param isCli a boolean to indicate if the install is using CLI or GUI
+   *
+   * @param hmSummary
+   *          the Map containing the messages.
+   * @param isCli
+   *          a boolean to indicate if the install is using CLI or GUI
    */
-  protected void updateSummaryWithServerState(
-      Map<ProgressStep, LocalizableMessage> hmSummary, Boolean isCli)
+  protected void updateSummaryWithServerState(Map<ProgressStep, LocalizableMessage> hmSummary, Boolean isCli)
   {
-   Installation installation = getInstallation();
-   String cmd = getPath(installation.getControlPanelCommandFile());
-   if (! isCli)
-   {
-     cmd = Utils.addWordBreaks(
-       UIFactory.applyFontToHtml(cmd, UIFactory.INSTRUCTIONS_MONOSPACE_FONT),
-       60, 5);
-   }
-   LocalizableMessage status;
-   if (installation.getStatus().isServerRunning())
-   {
-     status = INFO_GENERAL_SERVER_STARTED.get();
-   }
-   else
-   {
-     status = INFO_GENERAL_SERVER_STOPPED.get();
-   }
-   String formattedPath = Utils.addWordBreaks(
-   formatter.getFormattedText(
-       LocalizableMessage.raw(getPath(new File(getInstancePath())))).toString(),
-       60, 5);
-   LocalizableMessage successMessage = Utils.getCustomizedObject(
-       "INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY",
-      INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY.get(
-            DynamicConstants.PRODUCT_NAME,
-            DynamicConstants.PRODUCT_NAME,
-            formattedPath,
-            status,
-            DynamicConstants.DOC_QUICK_REFERENCE_GUIDE,
-            DynamicConstants.PRODUCT_NAME,
-            cmd), LocalizableMessage.class);
-    hmSummary.put(InstallProgressStep.FINISHED_SUCCESSFULLY,
-            getFormattedSuccess(successMessage));
-    hmSummary.put(InstallProgressStep.FINISHED_WITH_ERROR,
-            getFormattedError(INFO_SUMMARY_INSTALL_FINISHED_WITH_ERROR.get(
-                    status,
-                    cmd)));
+    Installation installation = getInstallation();
+    String cmd = getPath(installation.getControlPanelCommandFile());
+    if (!isCli)
+    {
+      cmd = Utils.addWordBreaks(UIFactory.applyFontToHtml(cmd, UIFactory.INSTRUCTIONS_MONOSPACE_FONT), 60, 5);
+    }
+    LocalizableMessage status;
+    if (installation.getStatus().isServerRunning())
+    {
+      status = INFO_GENERAL_SERVER_STARTED.get();
+    }
+    else
+    {
+      status = INFO_GENERAL_SERVER_STOPPED.get();
+    }
+    String formattedPath =
+        Utils.addWordBreaks(formatter.getFormattedText(LocalizableMessage.raw(getPath(new File(getInstancePath()))))
+            .toString(), 60, 5);
+    LocalizableMessage successMessage =
+        Utils.getCustomizedObject("INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY",
+            INFO_SUMMARY_INSTALL_FINISHED_SUCCESSFULLY.get(DynamicConstants.PRODUCT_NAME,
+                DynamicConstants.PRODUCT_NAME, formattedPath, status, DynamicConstants.DOC_QUICK_REFERENCE_GUIDE,
+                DynamicConstants.PRODUCT_NAME, cmd), LocalizableMessage.class);
+    hmSummary.put(InstallProgressStep.FINISHED_SUCCESSFULLY, getFormattedSuccess(successMessage));
+    hmSummary.put(InstallProgressStep.FINISHED_WITH_ERROR, getFormattedError(INFO_SUMMARY_INSTALL_FINISHED_WITH_ERROR
+        .get(status, cmd)));
   }
+
   /**
    * Checks the value of <code>canceled</code> field and throws an
-   * ApplicationException if true.  This indicates that the user has
-   * canceled this operation and the process of aborting should begin
-   * as soon as possible.
+   * ApplicationException if true. This indicates that the user has canceled
+   * this operation and the process of aborting should begin as soon as
+   * possible.
    *
-   * @throws ApplicationException thrown if <code>canceled</code>
+   * @throws ApplicationException
+   *           thrown if <code>canceled</code>
    */
   @Override
-  public void checkAbort() throws ApplicationException {
-    if (canceled) {
+  public void checkAbort() throws ApplicationException
+  {
+    if (canceled)
+    {
       setCurrentProgressStep(InstallProgressStep.CANCELING);
       notifyListeners(null);
-      throw new ApplicationException(
-          ReturnCode.CANCELED,
-          INFO_INSTALL_CANCELED.get(), null);
+      throw new ApplicationException(ReturnCode.CANCELED, INFO_INSTALL_CANCELED.get(), null);
     }
   }
 
@@ -2059,7 +2040,7 @@
     }
     catch (IOException ioe)
     {
-      logger.warn(LocalizableMessage.raw("Error writing host name file: "+ioe, ioe));
+      logger.warn(LocalizableMessage.raw("Error writing host name file: " + ioe, ioe));
     }
     finally
     {
@@ -2069,20 +2050,18 @@
 
   /**
    * Returns the file path where the host name is to be written.
+   *
    * @return the file path where the host name is to be written.
    */
   private String getHostNameFile()
   {
-    return Utils.getPath(
-        getInstallation().getRootDirectory().getAbsolutePath(),
-        SetupUtils.HOST_NAME_FILE);
+    return Utils.getPath(getInstallation().getRootDirectory().getAbsolutePath(), SetupUtils.HOST_NAME_FILE);
   }
 
   /**
-   * Writes the java home that we are using for the setup in a file.
-   * This way we can use this java home even if the user has not set
-   * OPENDJ_JAVA_HOME when running the different scripts.
-   *
+   * Writes the java home that we are using for the setup in a file. This way we
+   * can use this java home even if the user has not set OPENDJ_JAVA_HOME when
+   * running the different scripts.
    */
   private void writeOpenDSJavaHome()
   {
@@ -2092,8 +2071,10 @@
       // it does.
       InstallerHelper helper = new InstallerHelper();
       helper.writeSetOpenDSJavaHome(getUserData(), getInstallationPath());
-    } catch (Exception e) {
-      logger.warn(LocalizableMessage.raw("Error writing OpenDJ Java Home file: "+e, e));
+    }
+    catch (Exception e)
+    {
+      logger.warn(LocalizableMessage.raw("Error writing OpenDJ Java Home file: " + e, e));
     }
   }
 
@@ -2103,14 +2084,13 @@
    *
    * @param cStep
    *          the current step of the wizard
-   * @param qs QuickStart controller
-   * @throws UserDataException if the data provided by the user is not
-   *           valid.
-   *
+   * @param qs
+   *          QuickStart controller
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
   @Override
-  public void updateUserData(WizardStep cStep, QuickSetup qs)
-          throws UserDataException
+  public void updateUserData(WizardStep cStep, QuickSetup qs) throws UserDataException
   {
     if (cStep == SERVER_SETTINGS)
     {
@@ -2140,7 +2120,7 @@
     {
       updateUserDataForRuntimeOptionsPanel(qs);
     }
-    else if (cStep ==  REVIEW)
+    else if (cStep == REVIEW)
     {
       updateUserDataForReviewPanel(qs);
     }
@@ -2148,12 +2128,14 @@
 
   /**
    * Sets the current progress step of the installation process.
-   * @param currentProgressStep the current progress step of the installation
-   * process.
+   *
+   * @param currentProgressStep
+   *          the current progress step of the installation process.
    */
   protected void setCurrentProgressStep(InstallProgressStep currentProgressStep)
   {
-    if (currentProgressStep != null) {
+    if (currentProgressStep != null)
+    {
       this.completedProgress.add(currentProgressStep);
     }
     this.currentProgressStep = currentProgressStep;
@@ -2197,7 +2179,9 @@
   /**
    * This method initialize the contents of the synchronized servers with the
    * contents of the first server we find.
-   * @throws ApplicationException if something goes wrong.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
   protected void initializeSuffixes() throws ApplicationException
   {
@@ -2208,25 +2192,20 @@
     }
     catch (Throwable t)
     {
-      LocalizableMessage failedMsg =
-              getThrowableMsg(INFO_ERROR_CONNECTING_TO_LOCAL.get(), t);
+      LocalizableMessage failedMsg = getThrowableMsg(INFO_ERROR_CONNECTING_TO_LOCAL.get(), t);
       StaticUtils.close(ctx);
-      throw new ApplicationException(
-          ReturnCode.CONFIGURATION_ERROR, failedMsg, t);
+      throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, failedMsg, t);
     }
 
-    Set<SuffixDescriptor> suffixes =
-      getUserData().getSuffixesToReplicateOptions().getSuffixes();
+    Set<SuffixDescriptor> suffixes = getUserData().getSuffixesToReplicateOptions().getSuffixes();
 
     /* Initialize local ADS and schema contents using any replica. */
     {
-      ServerDescriptor server
-       = suffixes.iterator().next().getReplicas().iterator().next().getServer();
+      ServerDescriptor server = suffixes.iterator().next().getReplicas().iterator().next().getServer();
       InitialLdapContext rCtx = null;
       try
       {
-        rCtx = getRemoteConnection(server, getTrustManager(),
-            getPreferredConnections());
+        rCtx = getRemoteConnection(server, getTrustManager(), getPreferredConnections());
         TopologyCacheFilter filter = new TopologyCacheFilter();
         filter.setSearchMonitoringInformation(false);
         filter.addBaseDNToSearch(ADSContext.getAdministrationSuffixDN());
@@ -2250,16 +2229,13 @@
         LocalizableMessage msg;
         if (isCertificateException(ne))
         {
-          msg = INFO_ERROR_READING_CONFIG_LDAP_CERTIFICATE_SERVER.get(
-              getHostPort(server), ne.toString(true));
+          msg = INFO_ERROR_READING_CONFIG_LDAP_CERTIFICATE_SERVER.get(getHostPort(server), ne.toString(true));
         }
         else
         {
-           msg = INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(
-               getHostPort(server), ne.toString(true));
+          msg = INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(getHostPort(server), ne.toString(true));
         }
-        throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, msg,
-            ne);
+        throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, msg, ne);
       }
       finally
       {
@@ -2277,26 +2253,23 @@
 
       boolean isADS = areDnsEqual(dn, ADSContext.getAdministrationSuffixDN());
       boolean isSchema = areDnsEqual(dn, Constants.SCHEMA_DN);
-      if(isADS)
+      if (isADS)
       {
         if (isVerbose())
         {
-          notifyListeners(getFormattedWithPoints(
-            INFO_PROGRESS_INITIALIZING_ADS.get()));
+          notifyListeners(getFormattedWithPoints(INFO_PROGRESS_INITIALIZING_ADS.get()));
         }
       }
       else if (isSchema)
       {
         if (isVerbose())
         {
-          notifyListeners(getFormattedWithPoints(
-            INFO_PROGRESS_INITIALIZING_SCHEMA.get()));
+          notifyListeners(getFormattedWithPoints(INFO_PROGRESS_INITIALIZING_SCHEMA.get()));
         }
       }
       else
       {
-        notifyListeners(getFormattedProgress(
-            INFO_PROGRESS_INITIALIZING_SUFFIX.get(dn, hostPort)));
+        notifyListeners(getFormattedProgress(INFO_PROGRESS_INITIALIZING_SUFFIX.get(dn, hostPort)));
         notifyListeners(getLineBreak());
       }
       try
@@ -2308,8 +2281,7 @@
           InitialLdapContext rCtx = null;
           try
           {
-            rCtx = getRemoteConnection(server, getTrustManager(),
-                getPreferredConnections());
+            rCtx = getRemoteConnection(server, getTrustManager(), getPreferredConnections());
             TopologyCacheFilter filter = new TopologyCacheFilter();
             filter.setSearchMonitoringInformation(false);
             filter.addBaseDNToSearch(dn);
@@ -2327,16 +2299,13 @@
             LocalizableMessage msg;
             if (isCertificateException(ne))
             {
-              msg = INFO_ERROR_READING_CONFIG_LDAP_CERTIFICATE_SERVER.get(
-                  getHostPort(server), ne.toString(true));
+              msg = INFO_ERROR_READING_CONFIG_LDAP_CERTIFICATE_SERVER.get(getHostPort(server), ne.toString(true));
             }
             else
             {
-               msg = INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(
-                   getHostPort(server), ne.toString(true));
+              msg = INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(getHostPort(server), ne.toString(true));
             }
-            throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, msg,
-                ne);
+            throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, msg, ne);
           }
           finally
           {
@@ -2345,9 +2314,7 @@
         }
         if (replicationId == -1)
         {
-          throw new ApplicationException(
-              ReturnCode.APPLICATION_ERROR,
-              ERR_COULD_NOT_FIND_REPLICATIONID.get(dn), null);
+          throw new ApplicationException(ReturnCode.APPLICATION_ERROR, ERR_COULD_NOT_FIND_REPLICATIONID.get(dn), null);
         }
         StaticUtils.sleep(3000);
         int nTries = 5;
@@ -2356,12 +2323,10 @@
         {
           try
           {
-            logger.info(LocalizableMessage.raw("Calling initializeSuffix with base DN: "+dn));
-            logger.info(LocalizableMessage.raw("Try number: "+(6 - nTries)));
-            logger.info(LocalizableMessage.raw("replicationId of source replica: "+
-                replicationId));
-            initializeSuffix(ctx, replicationId, dn, !isADS && !isSchema,
-                hostPort);
+            logger.info(LocalizableMessage.raw("Calling initializeSuffix with base DN: " + dn));
+            logger.info(LocalizableMessage.raw("Try number: " + (6 - nTries)));
+            logger.info(LocalizableMessage.raw("replicationId of source replica: " + replicationId));
+            initializeSuffix(ctx, replicationId, dn, !isADS && !isSchema, hostPort);
             initDone = true;
           }
           catch (PeerNotFoundException pnfe)
@@ -2369,9 +2334,7 @@
             logger.info(LocalizableMessage.raw("Peer could not be found"));
             if (nTries == 1)
             {
-              throw new ApplicationException(
-                  ReturnCode.APPLICATION_ERROR,
-                  pnfe.getMessageObject(), null);
+              throw new ApplicationException(ReturnCode.APPLICATION_ERROR, pnfe.getMessageObject(), null);
             }
             StaticUtils.sleep((5 - nTries) * 3000);
           }
@@ -2394,27 +2357,29 @@
 
   /**
    * This method updates the ADS contents (and creates the according suffixes).
-   * If the user specified an existing topology, the new instance is
-   * registered with that ADS (the ADS might need to be created), and the
-   * local ADS will be populated when the local server is added to the remote
-   * server's ADS replication domain in a subsequent step. Otherwise, an ADS
-   * is created on the new instance and the server is registered with the new
-   * ADS. NOTE: this method assumes that the local server and any remote server
-   * are running.
-   * @throws ApplicationException if something goes wrong.
+   * If the user specified an existing topology, the new instance is registered
+   * with that ADS (the ADS might need to be created), and the local ADS will be
+   * populated when the local server is added to the remote server's ADS
+   * replication domain in a subsequent step. Otherwise, an ADS is created on
+   * the new instance and the server is registered with the new ADS. NOTE: this
+   * method assumes that the local server and any remote server are running.
+   *
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
   protected void updateADS() throws ApplicationException
   {
     DataReplicationOptions repl = getUserData().getReplicationOptions();
-    boolean isRemoteServer =
-            repl.getType() == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY;
+    boolean isRemoteServer = repl.getType() == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY;
     AuthenticationData auth = isRemoteServer ? repl.getAuthenticationData() : null;
     InitialLdapContext remoteCtx = null; // Bound to remote ADS host (if any).
     InitialLdapContext localCtx = null; // Bound to local server.
     ADSContext adsContext = null; // Bound to ADS host (via one of above).
 
-    /* Outer try-catch-finally to convert occurrences of NamingException and
-       ADSContextException to ApplicationException and clean up JNDI contexts.*/
+    /*
+     * Outer try-catch-finally to convert occurrences of NamingException and
+     * ADSContextException to ApplicationException and clean up JNDI contexts.
+     */
     try
     {
       if (isRemoteServer)
@@ -2422,14 +2387,15 @@
         remoteCtx = createInitialLdapContext(auth);
         adsContext = new ADSContext(remoteCtx); // adsContext owns remoteCtx
 
-        /* Check the remote server for ADS. If it does not exist, create the
-           initial ADS there and register the server with itself. */
-        if (! adsContext.hasAdminData())
+        /*
+         * Check the remote server for ADS. If it does not exist, create the
+         * initial ADS there and register the server with itself.
+         */
+        if (!adsContext.hasAdminData())
         {
           if (isVerbose())
           {
-            notifyListeners(getFormattedWithPoints(
-               INFO_PROGRESS_CREATING_ADS_ON_REMOTE.get(getHostDisplay(auth))));
+            notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_ADS_ON_REMOTE.get(getHostDisplay(auth))));
           }
 
           adsContext.createAdminData(null);
@@ -2451,16 +2417,15 @@
       /* Act on local server depending on if using remote or local ADS */
       if (isVerbose())
       {
-        notifyListeners(
-            getFormattedWithPoints(INFO_PROGRESS_CREATING_ADS.get()));
+        notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_ADS.get()));
       }
       localCtx = createLocalContext();
-//      if (isRemoteServer)
-//      {
-//        /* Create an empty ADS suffix on the local server. */
-//        ADSContext localAdsContext = new ADSContext(localCtx);
-//        localAdsContext.createAdministrationSuffix(null);
-//      }
+      //      if (isRemoteServer)
+      //      {
+      //        /* Create an empty ADS suffix on the local server. */
+      //        ADSContext localAdsContext = new ADSContext(localCtx);
+      //        localAdsContext.createAdministrationSuffix(null);
+      //      }
       if (!isRemoteServer)
       {
         /* Configure local server to have an ADS */
@@ -2473,14 +2438,16 @@
       filter.setSearchBaseDNInformation(false);
       ServerDescriptor server = createStandalone(localCtx, filter);
       server.updateAdsPropertiesWithServerProperties();
-      if (0 == adsContext.registerOrUpdateServer(server.getAdsProperties())) {
+      if (0 == adsContext.registerOrUpdateServer(server.getAdsProperties()))
+      {
         if (isRemoteServer)
         {
           registeredNewServerOnRemote = true;
         }
-      } else {
-        logger.warn(LocalizableMessage.raw("Server was already registered. Updating " +
-                "server registration."));
+      }
+      else
+      {
+        logger.warn(LocalizableMessage.raw("Server was already registered. Updating " + "server registration."));
       }
       if (isRemoteServer)
       {
@@ -2499,11 +2466,9 @@
         {
           if (isVerbose())
           {
-            notifyListeners(getFormattedWithPoints(
-                  INFO_PROGRESS_CREATING_ADMINISTRATOR.get()));
+            notifyListeners(getFormattedWithPoints(INFO_PROGRESS_CREATING_ADMINISTRATOR.get()));
           }
-          adsContext.createAdministrator(getAdministratorProperties(
-                  getUserData()));
+          adsContext.createAdministrator(getAdministratorProperties(getUserData()));
           if (isRemoteServer && !createdRemoteAds)
           {
             createdAdministrator = true;
@@ -2516,11 +2481,9 @@
         }
         catch (ADSContextException ade)
         {
-          if (ade.getError() ==
-                  ADSContextException.ErrorType.ALREADY_REGISTERED)
+          if (ade.getError() == ADSContextException.ErrorType.ALREADY_REGISTERED)
           {
-            notifyListeners(getFormattedWarning(
-                INFO_ADMINISTRATOR_ALREADY_REGISTERED.get()));
+            notifyListeners(getFormattedWarning(INFO_ADMINISTRATOR_ALREADY_REGISTERED.get()));
             adsContext.unregisterServer(server.getAdsProperties());
             adsContext.registerServer(server.getAdsProperties());
           }
@@ -2546,11 +2509,8 @@
     }
     catch (ADSContextException ace)
     {
-      throw new ApplicationException(
-              ReturnCode.CONFIGURATION_ERROR,
-              (isRemoteServer
-                      ? INFO_REMOTE_ADS_EXCEPTION.get(getHostDisplay(auth), ace.getMessageObject())
-                      : INFO_ADS_EXCEPTION.get(ace)), ace);
+      throw new ApplicationException(ReturnCode.CONFIGURATION_ERROR, (isRemoteServer ? INFO_REMOTE_ADS_EXCEPTION.get(
+          getHostDisplay(auth), ace.getMessageObject()) : INFO_ADS_EXCEPTION.get(ace)), ace);
     }
     finally
     {
@@ -2568,8 +2528,7 @@
     {
       ApplicationTrustManager trustManager = getTrustManager();
       trustManager.setHost(auth.getHostName());
-      return createLdapsContext(ldapUrl, dn, pwd,
-          getConnectTimeout(), null, trustManager, null);
+      return createLdapsContext(ldapUrl, dn, pwd, getConnectTimeout(), null, trustManager, null);
     }
     return createLdapContext(ldapUrl, dn, pwd, getConnectTimeout(), null);
   }
@@ -2577,16 +2536,15 @@
   /**
    * Tells whether we must create a suffix that we are not going to replicate
    * with other servers or not.
+   *
    * @return <CODE>true</CODE> if we must create a new suffix and
-   * <CODE>false</CODE> otherwise.
+   *         <CODE>false</CODE> otherwise.
    */
   protected boolean createNotReplicatedSuffix()
   {
-    DataReplicationOptions repl =
-      getUserData().getReplicationOptions();
+    DataReplicationOptions repl = getUserData().getReplicationOptions();
 
-    SuffixesToReplicateOptions suf =
-      getUserData().getSuffixesToReplicateOptions();
+    SuffixesToReplicateOptions suf = getUserData().getSuffixesToReplicateOptions();
 
     return repl.getType() == DataReplicationOptions.Type.FIRST_IN_TOPOLOGY
         || repl.getType() == DataReplicationOptions.Type.STANDALONE
@@ -2596,32 +2554,33 @@
   /**
    * Returns <CODE>true</CODE> if we must configure replication and
    * <CODE>false</CODE> otherwise.
+   *
    * @return <CODE>true</CODE> if we must configure replication and
-   * <CODE>false</CODE> otherwise.
+   *         <CODE>false</CODE> otherwise.
    */
   protected boolean mustConfigureReplication()
   {
-    return getUserData().getReplicationOptions().getType() !=
-      DataReplicationOptions.Type.STANDALONE;
+    return getUserData().getReplicationOptions().getType() != DataReplicationOptions.Type.STANDALONE;
   }
 
   /**
-   * Returns <CODE>true</CODE> if we must create the ADS and
-   * <CODE>false</CODE> otherwise.
-   * @return <CODE>true</CODE> if we must create the ADS and
-   * <CODE>false</CODE> otherwise.
+   * Returns <CODE>true</CODE> if we must create the ADS and <CODE>false</CODE>
+   * otherwise.
+   *
+   * @return <CODE>true</CODE> if we must create the ADS and <CODE>false</CODE>
+   *         otherwise.
    */
   protected boolean mustCreateAds()
   {
-    return getUserData().getReplicationOptions().getType() !=
-      DataReplicationOptions.Type.STANDALONE;
+    return getUserData().getReplicationOptions().getType() != DataReplicationOptions.Type.STANDALONE;
   }
 
   /**
    * Returns <CODE>true</CODE> if we must start the server and
    * <CODE>false</CODE> otherwise.
+   *
    * @return <CODE>true</CODE> if we must start the server and
-   * <CODE>false</CODE> otherwise.
+   *         <CODE>false</CODE> otherwise.
    */
   protected boolean mustStart()
   {
@@ -2630,11 +2589,12 @@
 
   /**
    * Returns <CODE>true</CODE> if the start server must be launched in verbose
-   * mode and <CODE>false</CODE> otherwise.  The verbose flag is  not enough
+   * mode and <CODE>false</CODE> otherwise. The verbose flag is not enough
    * because in the case where many entries have been imported, the startup
    * phase can take long.
+   *
    * @return <CODE>true</CODE> if the start server must be launched in verbose
-   * mode and <CODE>false</CODE> otherwise.
+   *         mode and <CODE>false</CODE> otherwise.
    */
   protected boolean isStartVerbose()
   {
@@ -2647,8 +2607,7 @@
     if (type == NewSuffixOptions.Type.IMPORT_FROM_LDIF_FILE)
     {
       long mbTotalSize = 0;
-      LinkedList<String> ldifPaths =
-        getUserData().getNewSuffixOptions().getLDIFPaths();
+      LinkedList<String> ldifPaths = getUserData().getNewSuffixOptions().getLDIFPaths();
       for (String ldifPath : ldifPaths)
       {
         File f = new File(ldifPath);
@@ -2672,13 +2631,13 @@
   }
 
   /**
-   * Returns <CODE>true</CODE> if we must stop the server and
-   * <CODE>false</CODE> otherwise.
-   * The server might be stopped if the user asked not to start it at the
-   * end of the installation and it was started temporarily to update its
+   * Returns <CODE>true</CODE> if we must stop the server and <CODE>false</CODE>
+   * otherwise. The server might be stopped if the user asked not to start it at
+   * the end of the installation and it was started temporarily to update its
    * configuration.
-   * @return <CODE>true</CODE> if we must stop the server and
-   * <CODE>false</CODE> otherwise.
+   *
+   * @return <CODE>true</CODE> if we must stop the server and <CODE>false</CODE>
+   *         otherwise.
    */
   protected boolean mustStop()
   {
@@ -2688,28 +2647,29 @@
   /**
    * Returns <CODE>true</CODE> if we must initialize suffixes and
    * <CODE>false</CODE> otherwise.
+   *
    * @return <CODE>true</CODE> if we must initialize suffixes and
-   * <CODE>false</CODE> otherwise.
+   *         <CODE>false</CODE> otherwise.
    */
   protected boolean mustInitializeSuffixes()
   {
-    return getUserData().getReplicationOptions().getType() ==
-      DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY;
+    return getUserData().getReplicationOptions().getType() == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY;
   }
 
   /**
-   * Returns the list of preferred URLs to connect to remote servers.  In fact
-   * it returns only the URL to the remote server specified by the user in
-   * the replication options panel.  The method returns a list for convenience
-   * with other interfaces.
-   * NOTE: this method assumes that the UserData object has already been updated
-   * with the host and port of the remote server.
+   * Returns the list of preferred URLs to connect to remote servers. In fact it
+   * returns only the URL to the remote server specified by the user in the
+   * replication options panel. The method returns a list for convenience with
+   * other interfaces.
+   * <p>
+   * NOTE: this method assumes that the UserData object has
+   * already been updated with the host and port of the remote server.
+   *
    * @return the list of preferred URLs to connect to remote servers.
    */
-  private LinkedHashSet<PreferredConnection> getPreferredConnections()
+  private Set<PreferredConnection> getPreferredConnections()
   {
-    LinkedHashSet<PreferredConnection> cnx =
-      new LinkedHashSet<PreferredConnection>();
+    Set<PreferredConnection> cnx = new LinkedHashSet<>();
     DataReplicationOptions repl = getUserData().getReplicationOptions();
     if (repl.getType() == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY)
     {
@@ -2742,18 +2702,14 @@
 
   private String getHostDisplay(AuthenticationData auth)
   {
-    return auth.getHostName()+":"+auth.getPort();
+    return auth.getHostName() + ":" + auth.getPort();
   }
 
-  private Map<ADSContext.ServerProperty, Object>
-  getNewServerAdsProperties(UserData userData)
+  private Map<ADSContext.ServerProperty, Object> getNewServerAdsProperties(UserData userData)
   {
-    Map<ADSContext.ServerProperty, Object> serverProperties =
-      new HashMap<ADSContext.ServerProperty, Object>();
-    serverProperties.put(ADSContext.ServerProperty.HOST_NAME,
-          userData.getHostName());
-    serverProperties.put(ADSContext.ServerProperty.LDAP_PORT,
-        String.valueOf(userData.getServerPort()));
+    Map<ADSContext.ServerProperty, Object> serverProperties = new HashMap<>();
+    serverProperties.put(ADSContext.ServerProperty.HOST_NAME, userData.getHostName());
+    serverProperties.put(ADSContext.ServerProperty.LDAP_PORT, String.valueOf(userData.getServerPort()));
     serverProperties.put(ADSContext.ServerProperty.LDAP_ENABLED, "true");
 
     // TODO: even if the user does not configure SSL maybe we should choose
@@ -2761,8 +2717,7 @@
     SecurityOptions sec = userData.getSecurityOptions();
     if (sec.getEnableSSL())
     {
-      serverProperties.put(ADSContext.ServerProperty.LDAPS_PORT,
-          String.valueOf(sec.getSslPort()));
+      serverProperties.put(ADSContext.ServerProperty.LDAPS_PORT, String.valueOf(sec.getSslPort()));
       serverProperties.put(ADSContext.ServerProperty.LDAPS_ENABLED, "true");
     }
     else
@@ -2794,28 +2749,22 @@
     }
     serverProperties.put(ADSContext.ServerProperty.INSTANCE_PATH, path);
 
-    String serverID = serverProperties.get(ADSContext.ServerProperty.HOST_NAME)+
-    ":"+userData.getServerPort();
+    String serverID = serverProperties.get(ADSContext.ServerProperty.HOST_NAME) + ":" + userData.getServerPort();
 
     /* TODO: do we want to ask this specifically to the user? */
     serverProperties.put(ADSContext.ServerProperty.ID, serverID);
+    serverProperties.put(ADSContext.ServerProperty.HOST_OS, OperatingSystem.getOperatingSystem().toString());
 
-    serverProperties.put(ADSContext.ServerProperty.HOST_OS,
-        OperatingSystem.getOperatingSystem().toString());
     return serverProperties;
   }
 
-  private Map<ADSContext.AdministratorProperty, Object>
-  getAdministratorProperties(UserData userData)
+  private Map<ADSContext.AdministratorProperty, Object> getAdministratorProperties(UserData userData)
   {
-    Map<ADSContext.AdministratorProperty, Object> adminProperties =
-      new HashMap<ADSContext.AdministratorProperty, Object>();
-    adminProperties.put(ADSContext.AdministratorProperty.UID,
-        userData.getGlobalAdministratorUID());
-    adminProperties.put(ADSContext.AdministratorProperty.PASSWORD,
-        userData.getGlobalAdministratorPassword());
+    Map<ADSContext.AdministratorProperty, Object> adminProperties = new HashMap<>();
+    adminProperties.put(ADSContext.AdministratorProperty.UID, userData.getGlobalAdministratorUID());
+    adminProperties.put(ADSContext.AdministratorProperty.PASSWORD, userData.getGlobalAdministratorPassword());
     adminProperties.put(ADSContext.AdministratorProperty.DESCRIPTION,
-        INFO_GLOBAL_ADMINISTRATOR_DESCRIPTION.get());
+                        INFO_GLOBAL_ADMINISTRATOR_DESCRIPTION.get());
     return adminProperties;
   }
 
@@ -2823,14 +2772,12 @@
    * Validate the data provided by the user in the server settings panel and
    * update the userData object according to that content.
    *
-   * @throws UserDataException if the data provided by the user is not
-   *           valid.
-   *
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
-  private void updateUserDataForServerSettingsPanel(QuickSetup qs)
-      throws UserDataException
+  private void updateUserDataForServerSettingsPanel(QuickSetup qs) throws UserDataException
   {
-    List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
+    List<LocalizableMessage> errorMsgs = new ArrayList<>();
     LocalizableMessage confirmationMsg = null;
 
     if (isWebStart())
@@ -2865,53 +2812,53 @@
         }
         if (existingParentDirectory == null)
         {
-          errorMsgs.add(INFO_PARENT_DIRECTORY_COULD_NOT_BE_FOUND.get(
-                  serverLocation));
+          errorMsgs.add(INFO_PARENT_DIRECTORY_COULD_NOT_BE_FOUND.get(serverLocation));
           qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
         }
         else if (!canWrite(existingParentDirectory))
         {
-          errorMsgs.add(INFO_DIRECTORY_NOT_WRITABLE.get(
-                  existingParentDirectory));
+          errorMsgs.add(INFO_DIRECTORY_NOT_WRITABLE.get(existingParentDirectory));
           qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
         }
-        else if (!hasEnoughSpace(existingParentDirectory,
-            getRequiredInstallSpace()))
+        else if (!hasEnoughSpace(existingParentDirectory, getRequiredInstallSpace()))
         {
           long requiredInMb = getRequiredInstallSpace() / (1024 * 1024);
-          errorMsgs.add(INFO_NOT_ENOUGH_DISK_SPACE.get(
-                  existingParentDirectory, requiredInMb));
+          errorMsgs.add(INFO_NOT_ENOUGH_DISK_SPACE.get(existingParentDirectory, requiredInMb));
           qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
         }
         else
         {
-          confirmationMsg =
-            INFO_PARENT_DIRECTORY_DOES_NOT_EXIST_CONFIRMATION.get(
-                    serverLocation);
+          confirmationMsg = INFO_PARENT_DIRECTORY_DOES_NOT_EXIST_CONFIRMATION.get(serverLocation);
           getUserData().setServerLocation(serverLocation);
         }
-      } else if (fileExists(serverLocation))
+      }
+      else if (fileExists(serverLocation))
       {
         errorMsgs.add(INFO_FILE_EXISTS.get(serverLocation));
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
-      } else if (directoryExistsAndIsNotEmpty(serverLocation))
+      }
+      else if (directoryExistsAndIsNotEmpty(serverLocation))
       {
         errorMsgs.add(INFO_DIRECTORY_EXISTS_NOT_EMPTY.get(serverLocation));
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
-      } else if (!canWrite(serverLocation))
+      }
+      else if (!canWrite(serverLocation))
       {
         errorMsgs.add(INFO_DIRECTORY_NOT_WRITABLE.get(serverLocation));
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
-      } else if (!hasEnoughSpace(serverLocation, getRequiredInstallSpace()))
+      }
+      else if (!hasEnoughSpace(serverLocation, getRequiredInstallSpace()))
       {
         long requiredInMb = getRequiredInstallSpace() / (1024 * 1024);
         errorMsgs.add(INFO_NOT_ENOUGH_DISK_SPACE.get(serverLocation, requiredInMb));
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
-      } else if (OperatingSystem.isWindows() && serverLocation.contains("%"))
+      }
+      else if (OperatingSystem.isWindows() && serverLocation.contains("%"))
       {
         errorMsgs.add(INFO_INVALID_CHAR_IN_PATH.get("%"));
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, true);
-      } else
+      }
+      else
       {
         getUserData().setServerLocation(serverLocation);
         qs.displayFieldInvalid(FieldName.SERVER_LOCATION, false);
@@ -2942,16 +2889,19 @@
       {
         errorMsgs.add(INFO_INVALID_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
         qs.displayFieldInvalid(FieldName.SERVER_PORT, true);
-      } else if (!canUseAsPort(port))
+      }
+      else if (!canUseAsPort(port))
       {
         errorMsgs.add(getCannotBindErrorMessage(port));
         qs.displayFieldInvalid(FieldName.SERVER_PORT, true);
-      } else
+      }
+      else
       {
         getUserData().setServerPort(port);
         qs.displayFieldInvalid(FieldName.SERVER_PORT, false);
       }
-    } catch (NumberFormatException nfe)
+    }
+    catch (NumberFormatException nfe)
     {
       errorMsgs.add(INFO_INVALID_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
       qs.displayFieldInvalid(FieldName.SERVER_PORT, true);
@@ -2963,12 +2913,12 @@
     try
     {
       adminConnectorPort = Integer.parseInt(sPort);
-      if (adminConnectorPort < MIN_PORT_VALUE
-          || adminConnectorPort > MAX_PORT_VALUE)
+      if (adminConnectorPort < MIN_PORT_VALUE || adminConnectorPort > MAX_PORT_VALUE)
       {
         errorMsgs.add(INFO_INVALID_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
         qs.displayFieldInvalid(FieldName.ADMIN_CONNECTOR_PORT, true);
-      } else if (!canUseAsPort(adminConnectorPort))
+      }
+      else if (!canUseAsPort(adminConnectorPort))
       {
         errorMsgs.add(getCannotBindErrorMessage(adminConnectorPort));
         qs.displayFieldInvalid(FieldName.ADMIN_CONNECTOR_PORT, true);
@@ -2984,15 +2934,15 @@
         getUserData().setAdminConnectorPort(adminConnectorPort);
         qs.displayFieldInvalid(FieldName.ADMIN_CONNECTOR_PORT, false);
       }
-    } catch (NumberFormatException nfe)
+    }
+    catch (NumberFormatException nfe)
     {
       errorMsgs.add(INFO_INVALID_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
       qs.displayFieldInvalid(FieldName.ADMIN_CONNECTOR_PORT, true);
     }
 
     // Check the secure port
-    SecurityOptions sec =
-      (SecurityOptions)qs.getFieldValue(FieldName.SECURITY_OPTIONS);
+    SecurityOptions sec = (SecurityOptions) qs.getFieldValue(FieldName.SECURITY_OPTIONS);
     int securePort = sec.getSslPort();
     if (sec.getEnableSSL())
     {
@@ -3000,7 +2950,8 @@
       {
         errorMsgs.add(INFO_INVALID_SECURE_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
         qs.displayFieldInvalid(FieldName.SECURITY_OPTIONS, true);
-      } else if (!canUseAsPort(securePort))
+      }
+      else if (!canUseAsPort(securePort))
       {
         errorMsgs.add(getCannotBindErrorMessage(securePort));
         qs.displayFieldInvalid(FieldName.SECURITY_OPTIONS, true);
@@ -3029,7 +2980,6 @@
       qs.displayFieldInvalid(FieldName.SECURITY_OPTIONS, false);
     }
 
-
     // Check the Directory Manager DN
     String dmDn = qs.getFieldStringValue(FieldName.DIRECTORY_MANAGER_DN);
 
@@ -3037,15 +2987,18 @@
     {
       errorMsgs.add(INFO_EMPTY_DIRECTORY_MANAGER_DN.get());
       qs.displayFieldInvalid(FieldName.DIRECTORY_MANAGER_DN, true);
-    } else if (!isDN(dmDn))
+    }
+    else if (!isDN(dmDn))
     {
       errorMsgs.add(INFO_NOT_A_DIRECTORY_MANAGER_DN.get());
       qs.displayFieldInvalid(FieldName.DIRECTORY_MANAGER_DN, true);
-    } else if (isConfigurationDn(dmDn))
+    }
+    else if (isConfigurationDn(dmDn))
     {
       errorMsgs.add(INFO_DIRECTORY_MANAGER_DN_IS_CONFIG_DN.get());
       qs.displayFieldInvalid(FieldName.DIRECTORY_MANAGER_DN, true);
-    } else
+    }
+    else
     {
       getUserData().setDirectoryManagerDn(dmDn);
       qs.displayFieldInvalid(FieldName.DIRECTORY_MANAGER_DN, false);
@@ -3053,8 +3006,7 @@
 
     // Check the provided passwords
     String pwd1 = qs.getFieldStringValue(FieldName.DIRECTORY_MANAGER_PWD);
-    String pwd2 =
-            qs.getFieldStringValue(FieldName.DIRECTORY_MANAGER_PWD_CONFIRM);
+    String pwd2 = qs.getFieldStringValue(FieldName.DIRECTORY_MANAGER_PWD_CONFIRM);
     if (pwd1 == null)
     {
       pwd1 = "";
@@ -3066,7 +3018,6 @@
       errorMsgs.add(INFO_NOT_EQUAL_PWD.get());
       qs.displayFieldInvalid(FieldName.DIRECTORY_MANAGER_PWD_CONFIRM, true);
       pwdValid = false;
-
     }
     if (pwd1.length() < MIN_DIRECTORY_MANAGER_PWD)
     {
@@ -3087,23 +3038,20 @@
     }
 
     // For the moment do not enable JMX
-    int defaultJMXPort =
-      UserData.getDefaultJMXPort(new int[] {port, securePort});
+    int defaultJMXPort = UserData.getDefaultJMXPort(new int[] { port, securePort });
     if (defaultJMXPort != -1)
     {
       //getUserData().setServerJMXPort(defaultJMXPort);
       getUserData().setServerJMXPort(-1);
     }
 
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
-      throw new UserDataException(Step.SERVER_SETTINGS,
-          getMessageFromCollection(errorMsgs, "\n"));
+      throw new UserDataException(Step.SERVER_SETTINGS, getMessageFromCollection(errorMsgs, "\n"));
     }
     if (confirmationMsg != null)
     {
-      throw new UserDataConfirmationException(Step.SERVER_SETTINGS,
-          confirmationMsg);
+      throw new UserDataConfirmationException(Step.SERVER_SETTINGS, confirmationMsg);
     }
   }
 
@@ -3120,20 +3068,18 @@
    * Validate the data provided by the user in the data options panel and update
    * the userData object according to that content.
    *
-   * @throws UserDataException if the data provided by the user is not
-   *           valid.
-   *
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
-  private void updateUserDataForReplicationOptionsPanel(QuickSetup qs)
-      throws UserDataException {
+  private void updateUserDataForReplicationOptionsPanel(QuickSetup qs) throws UserDataException
+  {
     boolean hasGlobalAdministrators = false;
     Integer replicationPort = -1;
     boolean secureReplication = false;
     Integer port = null;
-    List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
+    List<LocalizableMessage> errorMsgs = new ArrayList<>();
 
-    DataReplicationOptions.Type type = (DataReplicationOptions.Type)
-      qs.getFieldValue(FieldName.REPLICATION_OPTIONS);
+    DataReplicationOptions.Type type = (DataReplicationOptions.Type) qs.getFieldValue(FieldName.REPLICATION_OPTIONS);
     String host = qs.getFieldStringValue(FieldName.REMOTE_SERVER_HOST);
     String dn = qs.getFieldStringValue(FieldName.REMOTE_SERVER_DN);
     String pwd = qs.getFieldStringValue(FieldName.REMOTE_SERVER_PWD);
@@ -3142,8 +3088,7 @@
     {
       // Check replication port
       replicationPort = checkReplicationPort(qs, errorMsgs);
-      secureReplication =
-        (Boolean)qs.getFieldValue(FieldName.REPLICATION_SECURE);
+      secureReplication = (Boolean) qs.getFieldValue(FieldName.REPLICATION_SECURE);
     }
 
     UserDataConfirmationException confirmEx = null;
@@ -3158,12 +3103,11 @@
       {
         port = Integer.parseInt(sPort);
         // Try to connect
-        boolean[] globalAdmin = {hasGlobalAdministrators};
-        String[] effectiveDn = {dn};
+        boolean[] globalAdmin = { hasGlobalAdministrators };
+        String[] effectiveDn = { dn };
         try
         {
-          updateUserDataWithADS(host, port, dn, pwd, qs, errorMsgs,
-              globalAdmin, effectiveDn);
+          updateUserDataWithADS(host, port, dn, pwd, qs, errorMsgs, globalAdmin, effectiveDn);
         }
         catch (UserDataConfirmationException e)
         {
@@ -3177,24 +3121,19 @@
     case STANDALONE:
     {
       getUserData().setSuffixesToReplicateOptions(
-          new SuffixesToReplicateOptions(
-              SuffixesToReplicateOptions.Type.NO_SUFFIX_TO_REPLICATE,
-              new HashSet<SuffixDescriptor>(),
-              new HashSet<SuffixDescriptor>()));
+          new SuffixesToReplicateOptions(SuffixesToReplicateOptions.Type.NO_SUFFIX_TO_REPLICATE,
+              new HashSet<SuffixDescriptor>(), new HashSet<SuffixDescriptor>()));
       break;
     }
     case FIRST_IN_TOPOLOGY:
     {
       getUserData().setSuffixesToReplicateOptions(
-          new SuffixesToReplicateOptions(
-              SuffixesToReplicateOptions.Type.NEW_SUFFIX_IN_TOPOLOGY,
-              new HashSet<SuffixDescriptor>(),
-              new HashSet<SuffixDescriptor>()));
+          new SuffixesToReplicateOptions(SuffixesToReplicateOptions.Type.NEW_SUFFIX_IN_TOPOLOGY,
+              new HashSet<SuffixDescriptor>(), new HashSet<SuffixDescriptor>()));
       break;
     }
     default:
-      throw new IllegalStateException("Do not know what to do with type: "+
-          type);
+      throw new IllegalStateException("Do not know what to do with type: " + type);
     }
 
     if (errorMsgs.isEmpty())
@@ -3214,8 +3153,7 @@
       {
       case IN_EXISTING_TOPOLOGY:
       {
-        repl = DataReplicationOptions.createInExistingTopology(auth,
-            replicationPort, secureReplication);
+        repl = DataReplicationOptions.createInExistingTopology(auth, replicationPort, secureReplication);
         break;
       }
       case STANDALONE:
@@ -3225,23 +3163,20 @@
       }
       case FIRST_IN_TOPOLOGY:
       {
-        repl = DataReplicationOptions.createFirstInTopology(replicationPort,
-            secureReplication);
+        repl = DataReplicationOptions.createFirstInTopology(replicationPort, secureReplication);
         break;
       }
       default:
-        throw new IllegalStateException("Do not know what to do with type: "+
-            type);
+        throw new IllegalStateException("Do not know what to do with type: " + type);
       }
       getUserData().setReplicationOptions(repl);
 
-      getUserData().createAdministrator(!hasGlobalAdministrators &&
-      type == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY);
+      getUserData().createAdministrator(
+          !hasGlobalAdministrators && type == DataReplicationOptions.Type.IN_EXISTING_TOPOLOGY);
     }
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
-      throw new UserDataException(Step.REPLICATION_OPTIONS,
-          getMessageFromCollection(errorMsgs, "\n"));
+      throw new UserDataException(Step.REPLICATION_OPTIONS, getMessageFromCollection(errorMsgs, "\n"));
     }
     if (confirmEx != null)
     {
@@ -3256,25 +3191,24 @@
     try
     {
       replicationPort = Integer.parseInt(sPort);
-      if (replicationPort < MIN_PORT_VALUE
-          || replicationPort > MAX_PORT_VALUE)
+      if (replicationPort < MIN_PORT_VALUE || replicationPort > MAX_PORT_VALUE)
       {
         errorMsgs.add(INFO_INVALID_REPLICATION_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
         qs.displayFieldInvalid(FieldName.SERVER_PORT, true);
-      } else if (!canUseAsPort(replicationPort))
+      }
+      else if (!canUseAsPort(replicationPort))
       {
         errorMsgs.add(getCannotBindErrorMessage(replicationPort));
         qs.displayFieldInvalid(FieldName.REPLICATION_PORT, true);
-      } else
+      }
+      else
       {
         /* Check that we did not chose this port for another protocol */
         SecurityOptions sec = getUserData().getSecurityOptions();
-        if (replicationPort == getUserData().getServerPort()
-            || replicationPort == getUserData().getServerJMXPort()
+        if (replicationPort == getUserData().getServerPort() || replicationPort == getUserData().getServerJMXPort()
             || (replicationPort == sec.getSslPort() && sec.getEnableSSL()))
         {
-          errorMsgs.add(
-              INFO_REPLICATION_PORT_ALREADY_CHOSEN_FOR_OTHER_PROTOCOL.get());
+          errorMsgs.add(INFO_REPLICATION_PORT_ALREADY_CHOSEN_FOR_OTHER_PROTOCOL.get());
           qs.displayFieldInvalid(FieldName.REPLICATION_PORT, true);
         }
         else
@@ -3282,8 +3216,8 @@
           qs.displayFieldInvalid(FieldName.REPLICATION_PORT, false);
         }
       }
-
-    } catch (NumberFormatException nfe)
+    }
+    catch (NumberFormatException nfe)
     {
       errorMsgs.add(INFO_INVALID_REPLICATION_PORT_VALUE_RANGE.get(MIN_PORT_VALUE, MAX_PORT_VALUE));
       qs.displayFieldInvalid(FieldName.REPLICATION_PORT, true);
@@ -3291,8 +3225,8 @@
     return replicationPort;
   }
 
-  private void checkRemoteHostPortDnAndPwd(String host, String sPort, String dn,
-      String pwd, QuickSetup qs, List<LocalizableMessage> errorMsgs)
+  private void checkRemoteHostPortDnAndPwd(String host, String sPort, String dn, String pwd, QuickSetup qs,
+      List<LocalizableMessage> errorMsgs)
   {
     // Check host
     if (host == null || host.length() == 0)
@@ -3340,13 +3274,12 @@
     }
   }
 
-  private void updateUserDataWithADS(String host, int port, String dn,
-      String pwd, QuickSetup qs, List<LocalizableMessage> errorMsgs,
-      boolean[] hasGlobalAdministrators,
-      String[] effectiveDn) throws UserDataException
+  private void updateUserDataWithADS(String host, int port, String dn, String pwd, QuickSetup qs,
+      List<LocalizableMessage> errorMsgs, boolean[] hasGlobalAdministrators, String[] effectiveDn)
+      throws UserDataException
   {
     host = getHostNameForLdapUrl(host);
-    String ldapUrl = "ldaps://"+host+":"+port;
+    String ldapUrl = "ldaps://" + host + ":" + port;
     InitialLdapContext ctx = null;
 
     ApplicationTrustManager trustManager = getTrustManager();
@@ -3357,8 +3290,7 @@
       effectiveDn[0] = dn;
       try
       {
-        ctx = createLdapsContext(ldapUrl, dn, pwd,
-            getConnectTimeout(), null, trustManager, null);
+        ctx = createLdapsContext(ldapUrl, dn, pwd, getConnectTimeout(), null, trustManager, null);
       }
       catch (Throwable t)
       {
@@ -3367,8 +3299,7 @@
           // Try using a global administrator
           dn = ADSContext.getAdministratorDN(dn);
           effectiveDn[0] = dn;
-          ctx = createLdapsContext(ldapUrl, dn, pwd,
-              getConnectTimeout(), null, trustManager, null);
+          ctx = createLdapsContext(ldapUrl, dn, pwd, getConnectTimeout(), null, trustManager, null);
         }
         else
         {
@@ -3381,10 +3312,9 @@
       {
         /* Check if there are already global administrators */
         Set<?> administrators = adsContext.readAdministratorRegistry();
-        hasGlobalAdministrators[0] = administrators.size() > 0;
-        Set<TopologyCacheException> exceptions =
-        updateUserDataWithSuffixesInADS(adsContext, trustManager);
-        Set<LocalizableMessage> exceptionMsgs = new LinkedHashSet<LocalizableMessage>();
+        hasGlobalAdministrators[0] = !administrators.isEmpty();
+        Set<TopologyCacheException> exceptions = updateUserDataWithSuffixesInADS(adsContext, trustManager);
+        Set<LocalizableMessage> exceptionMsgs = new LinkedHashSet<>();
         /* Check the exceptions and see if we throw them or not. */
         for (TopologyCacheException e : exceptions)
         {
@@ -3402,13 +3332,12 @@
               {
                 cause = e.getTrustManager().getLastRefusedCause();
               }
-              logger.info(LocalizableMessage.raw("Certificate exception cause: "+cause));
+              logger.info(LocalizableMessage.raw("Certificate exception cause: " + cause));
               if (cause == ApplicationTrustManager.Cause.NOT_TRUSTED)
               {
                 excType = UserDataCertificateException.Type.NOT_TRUSTED;
               }
-              else if (cause ==
-                ApplicationTrustManager.Cause.HOST_NAME_MISMATCH)
+              else if (cause == ApplicationTrustManager.Cause.HOST_NAME_MISMATCH)
               {
                 excType = UserDataCertificateException.Type.HOST_NAME_MISMATCH;
               }
@@ -3428,29 +3357,26 @@
                 }
                 catch (Throwable t)
                 {
-                  logger.warn(LocalizableMessage.raw(
-                      "Error parsing ldap url of TopologyCacheException.", t));
+                  logger.warn(LocalizableMessage.raw("Error parsing ldap url of TopologyCacheException.", t));
                   h = INFO_NOT_AVAILABLE_LABEL.get().toString();
                   p = -1;
                 }
-                throw new UserDataCertificateException(
-                        Step.REPLICATION_OPTIONS,
-                        INFO_CERTIFICATE_EXCEPTION.get(h, p),
-                        e.getCause(), h, p,
-                        e.getTrustManager().getLastRefusedChain(),
-                        e.getTrustManager().getLastRefusedAuthType(), excType);
+                throw new UserDataCertificateException(Step.REPLICATION_OPTIONS, INFO_CERTIFICATE_EXCEPTION.get(h, p),
+                    e.getCause(), h, p, e.getTrustManager().getLastRefusedChain(), e.getTrustManager()
+                        .getLastRefusedAuthType(), excType);
               }
             }
+            break;
+          default:
+            break;
           }
           exceptionMsgs.add(getMessage(e));
         }
-        if (exceptionMsgs.size() > 0)
+        if (!exceptionMsgs.isEmpty())
         {
           LocalizableMessage confirmationMsg =
-            INFO_ERROR_READING_REGISTERED_SERVERS_CONFIRM.get(
-                    getMessageFromCollection(exceptionMsgs, "\n"));
-          throw new UserDataConfirmationException(Step.REPLICATION_OPTIONS,
-              confirmationMsg);
+              INFO_ERROR_READING_REGISTERED_SERVERS_CONFIRM.get(getMessageFromCollection(exceptionMsgs, "\n"));
+          throw new UserDataConfirmationException(Step.REPLICATION_OPTIONS, confirmationMsg);
         }
       }
       else
@@ -3468,9 +3394,8 @@
       if (isCertificateException(t))
       {
         UserDataCertificateException.Type excType;
-        ApplicationTrustManager.Cause cause =
-          trustManager.getLastRefusedCause();
-        logger.info(LocalizableMessage.raw("Certificate exception cause: "+cause));
+        ApplicationTrustManager.Cause cause = trustManager.getLastRefusedCause();
+        logger.info(LocalizableMessage.raw("Certificate exception cause: " + cause));
         if (cause == ApplicationTrustManager.Cause.NOT_TRUSTED)
         {
           excType = UserDataCertificateException.Type.NOT_TRUSTED;
@@ -3486,10 +3411,8 @@
 
         if (excType != null)
         {
-          throw new UserDataCertificateException(Step.REPLICATION_OPTIONS,
-              INFO_CERTIFICATE_EXCEPTION.get(host, port), t,
-              host, port, trustManager.getLastRefusedChain(),
-              trustManager.getLastRefusedAuthType(), excType);
+          throw new UserDataCertificateException(Step.REPLICATION_OPTIONS, INFO_CERTIFICATE_EXCEPTION.get(host, port),
+              t, host, port, trustManager.getLastRefusedChain(), trustManager.getLastRefusedAuthType(), excType);
         }
         else
         {
@@ -3497,7 +3420,7 @@
           qs.displayFieldInvalid(FieldName.REMOTE_SERVER_PORT, true);
           qs.displayFieldInvalid(FieldName.REMOTE_SERVER_DN, true);
           qs.displayFieldInvalid(FieldName.REMOTE_SERVER_PWD, true);
-          errorMsgs.add(INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(host+":"+port, t));
+          errorMsgs.add(INFO_CANNOT_CONNECT_TO_REMOTE_GENERIC.get(host + ":" + port, t));
         }
       }
       else if (t instanceof NamingException)
@@ -3513,12 +3436,11 @@
       }
       else if (t instanceof ADSContextException)
       {
-        errorMsgs.add(INFO_REMOTE_ADS_EXCEPTION.get(host+":"+port, t));
+        errorMsgs.add(INFO_REMOTE_ADS_EXCEPTION.get(host + ":" + port, t));
       }
       else
       {
-        throw new UserDataException(Step.REPLICATION_OPTIONS,
-            getThrowableMsg(INFO_BUG_MSG.get(), t));
+        throw new UserDataException(Step.REPLICATION_OPTIONS, getThrowableMsg(INFO_BUG_MSG.get(), t));
       }
     }
     finally
@@ -3531,15 +3453,12 @@
    * Validate the data provided by the user in the create global administrator
    * panel and update the UserInstallData object according to that content.
    *
-   * @throws
-   *           UserDataException if the data provided by the user is not
-   *           valid.
-   *
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
-  private void updateUserDataForCreateAdministratorPanel(QuickSetup qs)
-  throws UserDataException
+  private void updateUserDataForCreateAdministratorPanel(QuickSetup qs) throws UserDataException
   {
-    List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
+    List<LocalizableMessage> errorMsgs = new ArrayList<>();
 
     // Check the Global Administrator UID
     String uid = qs.getFieldStringValue(FieldName.GLOBAL_ADMINISTRATOR_UID);
@@ -3557,8 +3476,7 @@
 
     // Check the provided passwords
     String pwd1 = qs.getFieldStringValue(FieldName.GLOBAL_ADMINISTRATOR_PWD);
-    String pwd2 = qs.getFieldStringValue(
-        FieldName.GLOBAL_ADMINISTRATOR_PWD_CONFIRM);
+    String pwd2 = qs.getFieldStringValue(FieldName.GLOBAL_ADMINISTRATOR_PWD_CONFIRM);
     if (pwd1 == null)
     {
       pwd1 = "";
@@ -3589,10 +3507,9 @@
       qs.displayFieldInvalid(FieldName.GLOBAL_ADMINISTRATOR_PWD_CONFIRM, false);
     }
 
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
-      throw new UserDataException(Step.CREATE_GLOBAL_ADMINISTRATOR,
-          getMessageFromCollection(errorMsgs, "\n"));
+      throw new UserDataException(Step.CREATE_GLOBAL_ADMINISTRATOR, getMessageFromCollection(errorMsgs, "\n"));
     }
   }
 
@@ -3600,19 +3517,16 @@
    * Validate the data provided by the user in the replicate suffixes options
    * panel and update the UserInstallData object according to that content.
    *
-   * @throws
-   *           UserDataException if the data provided by the user is not
-   *           valid.
-   *
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
-  private void updateUserDataForSuffixesOptionsPanel(QuickSetup qs)
-  throws UserDataException
+  private void updateUserDataForSuffixesOptionsPanel(QuickSetup qs) throws UserDataException
   {
-    List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
+    List<LocalizableMessage> errorMsgs = new ArrayList<>();
     if (qs.getFieldValue(FieldName.SUFFIXES_TO_REPLICATE_OPTIONS) ==
-      SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES)
+        SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES)
     {
-      Set<?> s = (Set<?>)qs.getFieldValue(FieldName.SUFFIXES_TO_REPLICATE);
+      Set<?> s = (Set<?>) qs.getFieldValue(FieldName.SUFFIXES_TO_REPLICATE);
       if (s.isEmpty())
       {
         errorMsgs.add(INFO_NO_SUFFIXES_CHOSEN_TO_REPLICATE.get());
@@ -3620,43 +3534,33 @@
       }
       else
       {
-        Set<SuffixDescriptor> chosen = new HashSet<SuffixDescriptor>();
-        for (Object o: s)
+        Set<SuffixDescriptor> chosen = new HashSet<>();
+        for (Object o : s)
         {
-          chosen.add((SuffixDescriptor)o);
+          chosen.add((SuffixDescriptor) o);
         }
         qs.displayFieldInvalid(FieldName.SUFFIXES_TO_REPLICATE, false);
-        Set<SuffixDescriptor> available = getUserData().
-        getSuffixesToReplicateOptions().getAvailableSuffixes();
+        Set<SuffixDescriptor> available = getUserData().getSuffixesToReplicateOptions().getAvailableSuffixes();
 
         SuffixesToReplicateOptions options =
-          new SuffixesToReplicateOptions(
-          SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES,
-              available,
-              chosen);
+            new SuffixesToReplicateOptions(SuffixesToReplicateOptions.Type.REPLICATE_WITH_EXISTING_SUFFIXES, available,
+                chosen);
         getUserData().setSuffixesToReplicateOptions(options);
       }
-      getUserData().setRemoteWithNoReplicationPort(
-          getRemoteWithNoReplicationPort(getUserData()));
+      getUserData().setRemoteWithNoReplicationPort(getRemoteWithNoReplicationPort(getUserData()));
     }
     else
     {
-      Set<SuffixDescriptor> available = getUserData().
-      getSuffixesToReplicateOptions().getAvailableSuffixes();
-      Set<SuffixDescriptor> chosen = getUserData().
-      getSuffixesToReplicateOptions().getSuffixes();
+      Set<SuffixDescriptor> available = getUserData().getSuffixesToReplicateOptions().getAvailableSuffixes();
+      Set<SuffixDescriptor> chosen = getUserData().getSuffixesToReplicateOptions().getSuffixes();
       SuffixesToReplicateOptions options =
-        new SuffixesToReplicateOptions(
-            SuffixesToReplicateOptions.Type.NEW_SUFFIX_IN_TOPOLOGY,
-            available,
-            chosen);
+          new SuffixesToReplicateOptions(SuffixesToReplicateOptions.Type.NEW_SUFFIX_IN_TOPOLOGY, available, chosen);
       getUserData().setSuffixesToReplicateOptions(options);
     }
 
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
-      throw new UserDataException(Step.SUFFIXES_OPTIONS,
-          getMessageFromCollection(errorMsgs, "\n"));
+      throw new UserDataException(Step.SUFFIXES_OPTIONS, getMessageFromCollection(errorMsgs, "\n"));
     }
   }
 
@@ -3664,32 +3568,27 @@
    * Validate the data provided by the user in the remote server replication
    * port panel and update the userData object according to that content.
    *
-   * @throws UserDataException if the data provided by the user is not
-   *           valid.
+   * @throws UserDataException
+   *           if the data provided by the user is not valid.
    */
-  private void updateUserDataForRemoteReplicationPorts(QuickSetup qs)
-      throws UserDataException
+  private void updateUserDataForRemoteReplicationPorts(QuickSetup qs) throws UserDataException
   {
-    List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
-    Map<ServerDescriptor, AuthenticationData> servers =
-      getUserData().getRemoteWithNoReplicationPort();
-    Map<?, ?> hm =
-      (Map<?, ?>) qs.getFieldValue(FieldName.REMOTE_REPLICATION_PORT);
-    Map<?, ?> hmSecure =
-      (Map<?, ?>) qs.getFieldValue(FieldName.REMOTE_REPLICATION_SECURE);
+    List<LocalizableMessage> errorMsgs = new ArrayList<>();
+    Map<ServerDescriptor, AuthenticationData> servers = getUserData().getRemoteWithNoReplicationPort();
+    Map<?, ?> hm = (Map<?, ?>) qs.getFieldValue(FieldName.REMOTE_REPLICATION_PORT);
+    Map<?, ?> hmSecure = (Map<?, ?>) qs.getFieldValue(FieldName.REMOTE_REPLICATION_SECURE);
     for (ServerDescriptor server : servers.keySet())
     {
       String hostName = server.getHostName();
-      boolean secureReplication = (Boolean)hmSecure.get(server.getId());
-      String sPort = (String)hm.get(server.getId());
+      boolean secureReplication = (Boolean) hmSecure.get(server.getId());
+      String sPort = (String) hm.get(server.getId());
       try
       {
         int replicationPort = Integer.parseInt(sPort);
-        if (replicationPort < MIN_PORT_VALUE
-            || replicationPort > MAX_PORT_VALUE)
+        if (replicationPort < MIN_PORT_VALUE || replicationPort > MAX_PORT_VALUE)
         {
-          errorMsgs.add(INFO_INVALID_REMOTE_REPLICATION_PORT_VALUE_RANGE.get(
-              getHostPort(server), MIN_PORT_VALUE, MAX_PORT_VALUE));
+          errorMsgs.add(INFO_INVALID_REMOTE_REPLICATION_PORT_VALUE_RANGE.get(getHostPort(server), MIN_PORT_VALUE,
+              MAX_PORT_VALUE));
         }
         if (hostName.equalsIgnoreCase(getUserData().getHostName()))
         {
@@ -3698,32 +3597,28 @@
           {
             securePort = getUserData().getSecurityOptions().getSslPort();
           }
-          if (replicationPort == getUserData().getServerPort()
-              || replicationPort == getUserData().getServerJMXPort()
+          if (replicationPort == getUserData().getServerPort() || replicationPort == getUserData().getServerJMXPort()
               || replicationPort == getUserData().getReplicationOptions().getReplicationPort()
               || replicationPort == securePort)
           {
-            errorMsgs.add(
-                  INFO_REMOTE_REPLICATION_PORT_ALREADY_CHOSEN_FOR_OTHER_PROTOCOL
-                          .get(getHostPort(server)));
+            errorMsgs.add(INFO_REMOTE_REPLICATION_PORT_ALREADY_CHOSEN_FOR_OTHER_PROTOCOL.get(getHostPort(server)));
           }
         }
         AuthenticationData authData = new AuthenticationData();
         authData.setPort(replicationPort);
         authData.setUseSecureConnection(secureReplication);
         servers.put(server, authData);
-      } catch (NumberFormatException nfe)
+      }
+      catch (NumberFormatException nfe)
       {
-        errorMsgs.add(INFO_INVALID_REMOTE_REPLICATION_PORT_VALUE_RANGE.get(
-            hostName, MIN_PORT_VALUE, MAX_PORT_VALUE));
+        errorMsgs.add(INFO_INVALID_REMOTE_REPLICATION_PORT_VALUE_RANGE.get(hostName, MIN_PORT_VALUE, MAX_PORT_VALUE));
       }
     }
 
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
       qs.displayFieldInvalid(FieldName.REMOTE_REPLICATION_PORT, true);
-      throw new UserDataException(Step.REMOTE_REPLICATION_PORTS,
-          getMessageFromCollection(errorMsgs, "\n"));
+      throw new UserDataException(Step.REMOTE_REPLICATION_PORTS, getMessageFromCollection(errorMsgs, "\n"));
     }
     else
     {
@@ -3742,9 +3637,9 @@
   @SuppressWarnings("unchecked")
   private void updateUserDataForNewSuffixOptionsPanel(final QuickSetup ui) throws UserDataException
   {
-    final List<LocalizableMessage> errorMsgs = new ArrayList<LocalizableMessage>();
+    final List<LocalizableMessage> errorMsgs = new ArrayList<>();
     // Singleton list with the provided baseDN (if exists and valid)
-    List<String> baseDn = new LinkedList<String>();
+    List<String> baseDn = new LinkedList<>();
     boolean validBaseDn = checkProvidedBaseDn(ui, baseDn, errorMsgs);
     final NewSuffixOptions dataOptions = checkImportData(ui, baseDn, validBaseDn, errorMsgs);
 
@@ -3755,15 +3650,15 @@
       getUserData().setNewSuffixOptions(dataOptions);
     }
 
-    if (errorMsgs.size() > 0)
+    if (!errorMsgs.isEmpty())
     {
-      throw new UserDataException(
-          Step.NEW_SUFFIX_OPTIONS, getMessageFromCollection(errorMsgs, Constants.LINE_SEPARATOR));
+      throw new UserDataException(Step.NEW_SUFFIX_OPTIONS,
+          getMessageFromCollection(errorMsgs, Constants.LINE_SEPARATOR));
     }
   }
 
-  private NewSuffixOptions checkImportData(final QuickSetup ui, final List<String> baseDn,
-      final boolean validBaseDn, final List<LocalizableMessage> errorMsgs)
+  private NewSuffixOptions checkImportData(final QuickSetup ui, final List<String> baseDn, final boolean validBaseDn,
+      final List<LocalizableMessage> errorMsgs)
   {
     if (baseDn.isEmpty())
     {
@@ -3783,7 +3678,7 @@
       if (validBaseDn)
       {
         return type == NewSuffixOptions.Type.CREATE_BASE_ENTRY ? NewSuffixOptions.createBaseEntry(baseDn)
-                                                               : NewSuffixOptions.createEmpty(baseDn);
+            : NewSuffixOptions.createEmpty(baseDn);
       }
     }
 
@@ -3794,7 +3689,7 @@
       final boolean validBaseDn, final List<LocalizableMessage> errorMsgs)
   {
     boolean fieldIsValid = true;
-    final List<LocalizableMessage> localErrorMsgs = new LinkedList<LocalizableMessage>();
+    final List<LocalizableMessage> localErrorMsgs = new LinkedList<>();
     final String nEntries = ui.getFieldStringValue(FieldName.NUMBER_ENTRIES);
     if (nEntries == null || "".equals(nEntries.trim()))
     {
@@ -3836,7 +3731,7 @@
   {
     final boolean fieldIsValid = false;
     final String ldifPath = ui.getFieldStringValue(FieldName.LDIF_PATH);
-    if (ldifPath == null || "".equals(ldifPath.trim()))
+    if (ldifPath == null || ldifPath.trim().isEmpty())
     {
       errorMsgs.add(INFO_NO_LDIF_PATH.get());
     }
@@ -3853,9 +3748,8 @@
     return null;
   }
 
-
-  private boolean checkProvidedBaseDn(
-      final QuickSetup ui, final List<String> baseDn, final List<LocalizableMessage> errorMsgs)
+  private boolean checkProvidedBaseDn(final QuickSetup ui, final List<String> baseDn,
+      final List<LocalizableMessage> errorMsgs)
   {
     boolean validBaseDn = true;
     String dn = ui.getFieldStringValue(FieldName.DIRECTORY_BASE_DN);
@@ -3883,7 +3777,10 @@
     return validBaseDn;
   }
 
-  /** Update the userData object according to the content of the runtime options panel. */
+  /**
+   * Update the userData object according to the content of the runtime options
+   * panel.
+   */
   private void updateUserDataForRuntimeOptionsPanel(QuickSetup qs)
   {
     getUserData().setJavaArguments(UserData.SERVER_SCRIPT_NAME,
@@ -3903,7 +3800,6 @@
 
   /**
    * Returns the number of free disk space in bytes required to install Open DS
-   *
    * For the moment we just return 20 Megabytes. TODO we might want to have
    * something dynamic to calculate the required free disk space for the
    * installation.
@@ -3915,22 +3811,15 @@
     return 20 * 1024 * 1024;
   }
 
-
-  /**
-   * Update the UserInstallData with the contents we discover in the ADS.
-   */
-  private Set<TopologyCacheException> updateUserDataWithSuffixesInADS(
-      ADSContext adsContext, ApplicationTrustManager trustManager)
-  throws TopologyCacheException
+  /** Update the UserInstallData with the contents we discover in the ADS. */
+  private Set<TopologyCacheException> updateUserDataWithSuffixesInADS(ADSContext adsContext,
+      ApplicationTrustManager trustManager) throws TopologyCacheException
   {
-    Set<TopologyCacheException> exceptions =
-      new HashSet<TopologyCacheException>();
-    SuffixesToReplicateOptions suf =
-      getUserData().getSuffixesToReplicateOptions();
+    Set<TopologyCacheException> exceptions = new HashSet<>();
+    SuffixesToReplicateOptions suf = getUserData().getSuffixesToReplicateOptions();
     SuffixesToReplicateOptions.Type type;
 
-    if (suf == null
-        || suf.getType() == SuffixesToReplicateOptions.Type.NO_SUFFIX_TO_REPLICATE)
+    if (suf == null || suf.getType() == SuffixesToReplicateOptions.Type.NO_SUFFIX_TO_REPLICATE)
     {
       type = SuffixesToReplicateOptions.Type.NO_SUFFIX_TO_REPLICATE;
     }
@@ -3938,12 +3827,9 @@
     {
       type = SuffixesToReplicateOptions.Type.NEW_SUFFIX_IN_TOPOLOGY;
     }
-    lastLoadedCache = new TopologyCache(adsContext, trustManager,
-        getConnectTimeout());
-    LinkedHashSet<PreferredConnection> cnx =
-      new LinkedHashSet<PreferredConnection>();
-    cnx.add(PreferredConnection.getPreferredConnection(
-        adsContext.getDirContext()));
+    lastLoadedCache = new TopologyCache(adsContext, trustManager, getConnectTimeout());
+    LinkedHashSet<PreferredConnection> cnx = new LinkedHashSet<>();
+    cnx.add(PreferredConnection.getPreferredConnection(adsContext.getDirContext()));
     // We cannot use getPreferredConnections since the user data has not been
     // updated yet.
     lastLoadedCache.setPreferredConnections(cnx);
@@ -3954,10 +3840,10 @@
     {
       moreSuffixes = suf.getSuffixes();
     }
-    getUserData().setSuffixesToReplicateOptions(
-        new SuffixesToReplicateOptions(type, suffixes, moreSuffixes));
+    getUserData().setSuffixesToReplicateOptions(new SuffixesToReplicateOptions(type, suffixes, moreSuffixes));
 
-    /* Analyze if we had any exception while loading servers.  For the moment
+    /*
+     * Analyze if we had any exception while loading servers. For the moment
      * only throw the exception found if the user did not provide the
      * Administrator DN and this caused a problem authenticating in one server
      * or if there is a certificate problem.
@@ -3978,13 +3864,11 @@
    * Update the UserInstallData object with the contents of the server to which
    * we are connected with the provided InitialLdapContext.
    */
-  private void updateUserDataWithSuffixesInServer(InitialLdapContext ctx)
-  throws NamingException
+  private void updateUserDataWithSuffixesInServer(InitialLdapContext ctx) throws NamingException
   {
-    SuffixesToReplicateOptions suf =
-      getUserData().getSuffixesToReplicateOptions();
+    SuffixesToReplicateOptions suf = getUserData().getSuffixesToReplicateOptions();
     SuffixesToReplicateOptions.Type type;
-    Set<SuffixDescriptor> suffixes = new HashSet<SuffixDescriptor>();
+    Set<SuffixDescriptor> suffixes = new HashSet<>();
     if (suf != null)
     {
       type = suf.getType();
@@ -4001,18 +3885,19 @@
       suffixes.add(replica.getSuffix());
     }
     Set<SuffixDescriptor> moreSuffixes = null;
-    if (suf != null){
+    if (suf != null)
+    {
       moreSuffixes = suf.getSuffixes();
     }
-    getUserData().setSuffixesToReplicateOptions(
-        new SuffixesToReplicateOptions(type, suffixes, moreSuffixes));
+    getUserData().setSuffixesToReplicateOptions(new SuffixesToReplicateOptions(type, suffixes, moreSuffixes));
   }
 
   /**
    * Returns the keystore path to be used for generating a self-signed
    * certificate.
+   *
    * @return the keystore path to be used for generating a self-signed
-   * certificate.
+   *         certificate.
    */
   protected String getSelfSignedKeystorePath()
   {
@@ -4022,8 +3907,9 @@
   /**
    * Returns the trustmanager path to be used for generating a self-signed
    * certificate.
+   *
    * @return the trustmanager path to be used for generating a self-signed
-   * certificate.
+   *         certificate.
    */
   private String getTrustManagerPath()
   {
@@ -4031,8 +3917,9 @@
   }
 
   /**
-   * Returns the path of the self-signed that we export to be able to create
-   * a truststore.
+   * Returns the path of the self-signed that we export to be able to create a
+   * truststore.
+   *
    * @return the path of the self-signed that is exported.
    */
   private String getTemporaryCertificatePath()
@@ -4042,6 +3929,7 @@
 
   /**
    * Returns the path to be used to store the password of the keystore.
+   *
    * @return the path to be used to store the password of the keystore.
    */
   private String getKeystorePinPath()
@@ -4058,8 +3946,9 @@
   /**
    * Returns the validity period to be used to generate the self-signed
    * certificate.
+   *
    * @return the validity period to be used to generate the self-signed
-   * certificate.
+   *         certificate.
    */
   private int getSelfSignedCertificateValidity()
   {
@@ -4068,35 +3957,34 @@
 
   /**
    * Returns the Subject DN to be used to generate the self-signed certificate.
+   *
    * @return the Subject DN to be used to generate the self-signed certificate.
    */
   private String getSelfSignedCertificateSubjectDN()
   {
-    return "cn="+Rdn.escapeValue(getUserData().getHostName())+
-    ",O=OpenDJ Self-Signed Certificate";
+    return "cn=" + Rdn.escapeValue(getUserData().getHostName()) + ",O=OpenDJ Self-Signed Certificate";
   }
 
   /**
-   * Returns the self-signed certificate password used for this session.  This
+   * Returns the self-signed certificate password used for this session. This
    * method calls <code>createSelfSignedCertificatePwd()</code> the first time
    * this method is called.
+   *
    * @return the self-signed certificate password used for this session.
    */
   protected String getSelfSignedCertificatePwd()
   {
-    if (selfSignedCertPw == null) {
+    if (selfSignedCertPw == null)
+    {
       selfSignedCertPw = SetupUtils.createSelfSignedCertificatePwd();
     }
     return new String(selfSignedCertPw);
   }
 
-  private Map<ServerDescriptor, AuthenticationData>
-  getRemoteWithNoReplicationPort(UserData userData)
+  private Map<ServerDescriptor, AuthenticationData> getRemoteWithNoReplicationPort(UserData userData)
   {
-    Map<ServerDescriptor, AuthenticationData> servers =
-      new HashMap<ServerDescriptor, AuthenticationData>();
-    Set<SuffixDescriptor> suffixes =
-      userData.getSuffixesToReplicateOptions().getSuffixes();
+    Map<ServerDescriptor, AuthenticationData> servers = new HashMap<>();
+    Set<SuffixDescriptor> suffixes = userData.getSuffixesToReplicateOptions().getSuffixes();
     for (SuffixDescriptor suffix : suffixes)
     {
       for (ReplicaDescriptor replica : suffix.getReplicas())
@@ -4117,82 +4005,83 @@
 
   private InitialLdapContext createLocalContext() throws NamingException
   {
-    String ldapUrl = "ldaps://"+
-    getHostNameForLdapUrl(getUserData().getHostName())+":"+
-    getUserData().getAdminConnectorPort();
+    String ldapUrl =
+        "ldaps://" + getHostNameForLdapUrl(getUserData().getHostName()) + ":" + getUserData().getAdminConnectorPort();
     String dn = getUserData().getDirectoryManagerDn();
     String pwd = getUserData().getDirectoryManagerPwd();
-    return createLdapsContext(ldapUrl, dn, pwd,
-        getConnectTimeout(), null, null, null);
+    return createLdapsContext(ldapUrl, dn, pwd, getConnectTimeout(), null, null, null);
   }
 
   /**
    * Gets an InitialLdapContext based on the information that appears on the
    * provided ServerDescriptor.
-   * @param server the object describing the server.
-   * @param trustManager the trust manager to be used to establish the
-   * connection.
-   * @param cnx the list of preferred LDAP URLs to be used to connect
-   * to the server.
+   *
+   * @param server
+   *          the object describing the server.
+   * @param trustManager
+   *          the trust manager to be used to establish the connection.
+   * @param cnx
+   *          the list of preferred LDAP URLs to be used to connect to the
+   *          server.
    * @return the InitialLdapContext to the remote server.
-   * @throws ApplicationException if something goes wrong.
+   * @throws ApplicationException
+   *           if something goes wrong.
    */
-  private InitialLdapContext getRemoteConnection(ServerDescriptor server,
-      ApplicationTrustManager trustManager,
-      LinkedHashSet<PreferredConnection> cnx)
-  throws ApplicationException
+  private InitialLdapContext getRemoteConnection(ServerDescriptor server, ApplicationTrustManager trustManager,
+      Set<PreferredConnection> cnx) throws ApplicationException
   {
     Map<ADSContext.ServerProperty, Object> adsProperties;
-    AuthenticationData auth =
-      getUserData().getReplicationOptions().getAuthenticationData();
+    AuthenticationData auth = getUserData().getReplicationOptions().getAuthenticationData();
     if (!server.isRegistered())
     {
-      /* Create adsProperties to be able to use the class ServerLoader to
-       * get the connection.  Just update the connection parameters with what
-       * the user chose in the Topology Options panel (i.e. even if SSL
-       * is enabled on the remote server, use standard LDAP to connect to the
-       * server if the user specified the LDAP port: this avoids having an
-       * issue with the certificate if it has not been accepted previously
-       * by the user).
+      /*
+       * Create adsProperties to be able to use the class ServerLoader to get
+       * the connection. Just update the connection parameters with what the
+       * user chose in the Topology Options panel (i.e. even if SSL is enabled
+       * on the remote server, use standard LDAP to connect to the server if the
+       * user specified the LDAP port: this avoids having an issue with the
+       * certificate if it has not been accepted previously by the user).
        */
-      adsProperties = new HashMap<ADSContext.ServerProperty, Object>();
-      adsProperties.put(ADSContext.ServerProperty.HOST_NAME,
-          server.getHostName());
+      adsProperties = new HashMap<>();
+      adsProperties.put(ADSContext.ServerProperty.HOST_NAME, server.getHostName());
       if (auth.useSecureConnection())
       {
-        adsProperties.put(ADSContext.ServerProperty.LDAPS_PORT,
-            String.valueOf(auth.getPort()));
+        adsProperties.put(ADSContext.ServerProperty.LDAPS_PORT, String.valueOf(auth.getPort()));
         adsProperties.put(ADSContext.ServerProperty.LDAPS_ENABLED, "true");
       }
       else
       {
-        adsProperties.put(ADSContext.ServerProperty.LDAP_PORT,
-            String.valueOf(auth.getPort()));
+        adsProperties.put(ADSContext.ServerProperty.LDAP_PORT, String.valueOf(auth.getPort()));
         adsProperties.put(ADSContext.ServerProperty.LDAP_ENABLED, "true");
       }
       server.setAdsProperties(adsProperties);
     }
-    return getRemoteConnection(server, auth.getDn(), auth.getPwd(),
-        trustManager, getConnectTimeout(), cnx);
+    return getRemoteConnection(server, auth.getDn(), auth.getPwd(), trustManager, getConnectTimeout(), cnx);
   }
 
   /**
    * Initializes a suffix with the contents of a replica that has a given
    * replication id.
-   * @param ctx the connection to the server whose suffix we want to initialize.
-   * @param replicaId the replication ID of the replica we want to use to
-   * initialize the contents of the suffix.
-   * @param suffixDn the dn of the suffix.
-   * @param displayProgress whether we want to display progress or not.
-   * @param sourceServerDisplay the string to be used to represent the server
-   * that contains the data that will be used to initialize the suffix.
-   * @throws ApplicationException if an unexpected error occurs.
-   * @throws PeerNotFoundException if the replication mechanism cannot find
-   * a peer.
+   *
+   * @param ctx
+   *          the connection to the server whose suffix we want to initialize.
+   * @param replicaId
+   *          the replication ID of the replica we want to use to initialize the
+   *          contents of the suffix.
+   * @param suffixDn
+   *          the dn of the suffix.
+   * @param displayProgress
+   *          whether we want to display progress or not.
+   * @param sourceServerDisplay
+   *          the string to be used to represent the server that contains the
+   *          data that will be used to initialize the suffix.
+   * @throws ApplicationException
+   *           if an unexpected error occurs.
+   * @throws PeerNotFoundException
+   *           if the replication mechanism cannot find a peer.
    */
-  public void initializeSuffix(InitialLdapContext ctx, int replicaId,
-      String suffixDn, boolean displayProgress, String sourceServerDisplay)
-  throws ApplicationException, PeerNotFoundException
+  public void initializeSuffix(InitialLdapContext ctx, int replicaId, String suffixDn, boolean displayProgress,
+      String sourceServerDisplay) throws ApplicationException, PeerNotFoundException
   {
     boolean taskCreated = false;
     int i = 1;
@@ -4204,52 +4093,40 @@
     oc.add("ds-task");
     oc.add("ds-task-initialize-from-remote-replica");
     attrs.put(oc);
-    attrs.put(
-        "ds-task-class-name",
-        "org.opends.server.tasks.InitializeTask");
+    attrs.put("ds-task-class-name", "org.opends.server.tasks.InitializeTask");
     attrs.put("ds-task-initialize-domain-dn", suffixDn);
-    attrs.put("ds-task-initialize-replica-server-id",
-        String.valueOf(replicaId));
+    attrs.put("ds-task-initialize-replica-server-id", String.valueOf(replicaId));
     while (!taskCreated)
     {
       checkAbort();
-      String id = "quicksetup-initialize"+i;
-      dn = "ds-task-id="+id+",cn=Scheduled Tasks,cn=Tasks";
+      String id = "quicksetup-initialize" + i;
+      dn = "ds-task-id=" + id + ",cn=Scheduled Tasks,cn=Tasks";
       attrs.put("ds-task-id", id);
       try
       {
         DirContext dirCtx = ctx.createSubcontext(dn, attrs);
         taskCreated = true;
-        logger.info(LocalizableMessage.raw("created task entry: "+attrs));
+        logger.info(LocalizableMessage.raw("created task entry: " + attrs));
         dirCtx.close();
       }
       catch (NameAlreadyBoundException x)
       {
-        logger.warn(LocalizableMessage.raw("A task with dn: "+dn+" already existed."));
+        logger.warn(LocalizableMessage.raw("A task with dn: " + dn + " already existed."));
       }
       catch (NamingException ne)
       {
-        logger.error(LocalizableMessage.raw("Error creating task "+attrs, ne));
-        throw new ApplicationException(
-            ReturnCode.APPLICATION_ERROR,
-                getThrowableMsg(INFO_ERROR_LAUNCHING_INITIALIZATION.get(
-                        sourceServerDisplay
-                ), ne), ne);
+        logger.error(LocalizableMessage.raw("Error creating task " + attrs, ne));
+        throw new ApplicationException(ReturnCode.APPLICATION_ERROR, getThrowableMsg(
+            INFO_ERROR_LAUNCHING_INITIALIZATION.get(sourceServerDisplay), ne), ne);
       }
       i++;
     }
     // Wait until it is over
     SearchControls searchControls = new SearchControls();
-    searchControls.setSearchScope(
-        SearchControls. OBJECT_SCOPE);
+    searchControls.setSearchScope(SearchControls.OBJECT_SCOPE);
     String filter = "objectclass=*";
-    searchControls.setReturningAttributes(
-        new String[] {
-            "ds-task-unprocessed-entry-count",
-            "ds-task-processed-entry-count",
-            "ds-task-log-message",
-            "ds-task-state"
-        });
+    searchControls.setReturningAttributes(new String[] { "ds-task-unprocessed-entry-count",
+      "ds-task-processed-entry-count", "ds-task-log-message", "ds-task-state" });
     LocalizableMessage lastDisplayedMsg = null;
     String lastLogMsg = null;
     long lastTimeMsgDisplayed = -1;
@@ -4274,8 +4151,7 @@
       }
       try
       {
-        NamingEnumeration<SearchResult> res =
-          ctx.search(dn, filter, searchControls);
+        NamingEnumeration<SearchResult> res = ctx.search(dn, filter, searchControls);
         SearchResult sr = null;
         try
         {
@@ -4291,10 +4167,8 @@
         // Get the number of entries that have been handled and
         // a percentage...
         LocalizableMessage msg;
-        String sProcessed = getFirstValue(sr,
-        "ds-task-processed-entry-count");
-        String sUnprocessed = getFirstValue(sr,
-        "ds-task-unprocessed-entry-count");
+        String sProcessed = getFirstValue(sr, "ds-task-processed-entry-count");
+        String sUnprocessed = getFirstValue(sr, "ds-task-unprocessed-entry-count");
         long processed = -1;
         long unprocessed = -1;
         if (sProcessed != null)
@@ -4305,7 +4179,7 @@
         {
           unprocessed = Integer.parseInt(sUnprocessed);
         }
-        totalEntries = Math.max(totalEntries, processed+unprocessed);
+        totalEntries = Math.max(totalEntries, processed + unprocessed);
 
         if (processed != -1 && unprocessed != -1)
         {
@@ -4357,11 +4231,9 @@
           if (currentTime - minRefreshPeriod > lastTimeMsgLogged)
           {
             lastTimeMsgLogged = currentTime;
-            logger.info(LocalizableMessage.raw("Progress msg: "+msg));
+            logger.info(LocalizableMessage.raw("Progress msg: " + msg));
           }
-          if (displayProgress
-              && currentTime - minRefreshPeriod > lastTimeMsgDisplayed
-              && !msg.equals(lastDisplayedMsg))
+          if (displayProgress && currentTime - minRefreshPeriod > lastTimeMsgDisplayed && !msg.equals(lastDisplayedMsg))
           {
             notifyListeners(getFormattedProgress(msg));
             lastDisplayedMsg = msg;
@@ -4383,7 +4255,7 @@
         {
           isOver = true;
           LocalizableMessage errorMsg;
-          logger.info(LocalizableMessage.raw("Last task entry: "+sr));
+          logger.info(LocalizableMessage.raw("Last task entry: " + sr));
           if (displayProgress && msg != null && !msg.equals(lastDisplayedMsg))
           {
             notifyListeners(getFormattedProgress(msg));
@@ -4393,16 +4265,15 @@
 
           if (lastLogMsg != null)
           {
-            errorMsg = INFO_ERROR_DURING_INITIALIZATION_LOG.get(
-                    sourceServerDisplay, lastLogMsg, state, sourceServerDisplay);
+            errorMsg =
+                INFO_ERROR_DURING_INITIALIZATION_LOG.get(sourceServerDisplay, lastLogMsg, state, sourceServerDisplay);
           }
           else
           {
-            errorMsg = INFO_ERROR_DURING_INITIALIZATION_NO_LOG.get(
-                    sourceServerDisplay, state, sourceServerDisplay);
+            errorMsg = INFO_ERROR_DURING_INITIALIZATION_NO_LOG.get(sourceServerDisplay, state, sourceServerDisplay);
           }
 
-          logger.warn(LocalizableMessage.raw("Processed errorMsg: "+errorMsg));
+          logger.warn(LocalizableMessage.raw("Processed errorMsg: " + errorMsg));
           if (helper.isCompletedWithErrors(state))
           {
             if (displayProgress)
@@ -4410,16 +4281,12 @@
               notifyListeners(getFormattedWarning(errorMsg));
             }
           }
-          else if (!helper.isSuccessful(state) ||
-              helper.isStoppedByError(state))
+          else if (!helper.isSuccessful(state) || helper.isStoppedByError(state))
           {
-            ApplicationException ae = new ApplicationException(
-                ReturnCode.APPLICATION_ERROR, errorMsg,
-                null);
+            ApplicationException ae = new ApplicationException(ReturnCode.APPLICATION_ERROR, errorMsg, null);
             if (lastLogMsg == null || helper.isPeersNotFoundError(lastLogMsg))
             {
-              logger.warn(LocalizableMessage.raw("Throwing peer not found error.  "+
-                  "Last Log Msg: "+lastLogMsg));
+              logger.warn(LocalizableMessage.raw("Throwing peer not found error.  " + "Last Log Msg: " + lastLogMsg));
               // Assume that this is a peer not found error.
               throw new PeerNotFoundException(errorMsg);
             }
@@ -4432,8 +4299,7 @@
           else if (displayProgress)
           {
             logger.info(LocalizableMessage.raw("Initialization completed successfully."));
-            notifyListeners(getFormattedProgress(
-                INFO_SUFFIX_INITIALIZED_SUCCESSFULLY.get()));
+            notifyListeners(getFormattedProgress(INFO_SUFFIX_INITIALIZED_SUCCESSFULLY.get()));
             notifyListeners(getLineBreak());
           }
         }
@@ -4444,18 +4310,14 @@
         logger.info(LocalizableMessage.raw("Initialization entry not found."));
         if (displayProgress)
         {
-          notifyListeners(getFormattedProgress(
-            INFO_SUFFIX_INITIALIZED_SUCCESSFULLY.get()));
+          notifyListeners(getFormattedProgress(INFO_SUFFIX_INITIALIZED_SUCCESSFULLY.get()));
           notifyListeners(getLineBreak());
         }
       }
       catch (NamingException ne)
       {
-        throw new ApplicationException(
-            ReturnCode.APPLICATION_ERROR,
-                getThrowableMsg(INFO_ERROR_POOLING_INITIALIZATION.get(
-                        sourceServerDisplay),
-                        ne), ne);
+        throw new ApplicationException(ReturnCode.APPLICATION_ERROR, getThrowableMsg(INFO_ERROR_POOLING_INITIALIZATION
+            .get(sourceServerDisplay), ne), ne);
       }
     }
     resetGenerationId(ctx, suffixDn, sourceServerDisplay);
@@ -4464,8 +4326,9 @@
   /**
    * Returns the configuration file path to be used when invoking the
    * command-lines.
+   *
    * @return the configuration file path to be used when invoking the
-   * command-lines.
+   *         command-lines.
    */
   private String getConfigurationFile()
   {
@@ -4475,8 +4338,9 @@
   /**
    * Returns the configuration class name to be used when invoking the
    * command-lines.
+   *
    * @return the configuration class name to be used when invoking the
-   * command-lines.
+   *         command-lines.
    */
   private String getConfigurationClassName()
   {
@@ -4485,18 +4349,16 @@
 
   private String getLocalReplicationServer()
   {
-    return getUserData().getHostName()+":"+
-    getUserData().getReplicationOptions().getReplicationPort();
+    return getUserData().getHostName() + ":" + getUserData().getReplicationOptions().getReplicationPort();
   }
 
   private String getLocalHostPort()
   {
-    return getUserData().getHostName()+":"+getUserData().getServerPort();
+    return getUserData().getHostName() + ":" + getUserData().getServerPort();
   }
 
-  private void resetGenerationId(InitialLdapContext ctx,
-      String suffixDn, String sourceServerDisplay)
-  throws ApplicationException
+  private void resetGenerationId(InitialLdapContext ctx, String suffixDn, String sourceServerDisplay)
+      throws ApplicationException
   {
     boolean taskCreated = false;
     int i = 1;
@@ -4508,54 +4370,44 @@
     oc.add("ds-task");
     oc.add("ds-task-reset-generation-id");
     attrs.put(oc);
-    attrs.put("ds-task-class-name",
-        "org.opends.server.tasks.SetGenerationIdTask");
+    attrs.put("ds-task-class-name", "org.opends.server.tasks.SetGenerationIdTask");
     attrs.put("ds-task-reset-generation-id-domain-base-dn", suffixDn);
     while (!taskCreated)
     {
       checkAbort();
-      String id = "quicksetup-reset-generation-id-"+i;
-      dn = "ds-task-id="+id+",cn=Scheduled Tasks,cn=Tasks";
+      String id = "quicksetup-reset-generation-id-" + i;
+      dn = "ds-task-id=" + id + ",cn=Scheduled Tasks,cn=Tasks";
       attrs.put("ds-task-id", id);
       try
       {
         DirContext dirCtx = ctx.createSubcontext(dn, attrs);
         taskCreated = true;
-        logger.info(LocalizableMessage.raw("created task entry: "+attrs));
+        logger.info(LocalizableMessage.raw("created task entry: " + attrs));
         dirCtx.close();
       }
       catch (NameAlreadyBoundException x)
-      { /* do nothing */
+      {
       }
       catch (NamingException ne)
       {
-        logger.error(LocalizableMessage.raw("Error creating task "+attrs, ne));
-        throw new ApplicationException(
-            ReturnCode.APPLICATION_ERROR,
-                getThrowableMsg(INFO_ERROR_LAUNCHING_INITIALIZATION.get(
-                        sourceServerDisplay
-                ), ne), ne);
+        logger.error(LocalizableMessage.raw("Error creating task " + attrs, ne));
+        throw new ApplicationException(ReturnCode.APPLICATION_ERROR, getThrowableMsg(
+            INFO_ERROR_LAUNCHING_INITIALIZATION.get(sourceServerDisplay), ne), ne);
       }
       i++;
     }
     // Wait until it is over
     SearchControls searchControls = new SearchControls();
-    searchControls.setSearchScope(
-        SearchControls. OBJECT_SCOPE);
+    searchControls.setSearchScope(SearchControls.OBJECT_SCOPE);
     String filter = "objectclass=*";
-    searchControls.setReturningAttributes(
-        new String[] {
-            "ds-task-log-message",
-            "ds-task-state"
-        });
+    searchControls.setReturningAttributes(new String[] { "ds-task-log-message", "ds-task-state" });
     String lastLogMsg = null;
     while (!isOver)
     {
       StaticUtils.sleep(500);
       try
       {
-        NamingEnumeration<SearchResult> res =
-          ctx.search(dn, filter, searchControls);
+        NamingEnumeration<SearchResult> res = ctx.search(dn, filter, searchControls);
         SearchResult sr = null;
         try
         {
@@ -4580,30 +4432,19 @@
         if (helper.isDone(state) || helper.isStoppedByError(state))
         {
           isOver = true;
-          LocalizableMessage errorMsg;
-          if (lastLogMsg != null)
-          {
-            errorMsg = INFO_ERROR_DURING_INITIALIZATION_LOG.get(
-                    sourceServerDisplay, lastLogMsg, state, sourceServerDisplay);
-          }
-          else
-          {
-            errorMsg = INFO_ERROR_DURING_INITIALIZATION_NO_LOG.get(
-                    sourceServerDisplay, state, sourceServerDisplay);
-          }
+          LocalizableMessage errorMsg = lastLogMsg != null ?
+              INFO_ERROR_DURING_INITIALIZATION_LOG.get(sourceServerDisplay, lastLogMsg, state, sourceServerDisplay)
+            : INFO_ERROR_DURING_INITIALIZATION_NO_LOG.get(sourceServerDisplay, state, sourceServerDisplay);
 
           if (helper.isCompletedWithErrors(state))
           {
-            logger.warn(LocalizableMessage.raw("Completed with error: "+errorMsg));
+            logger.warn(LocalizableMessage.raw("Completed with error: " + errorMsg));
             notifyListeners(getFormattedWarning(errorMsg));
           }
-          else if (!helper.isSuccessful(state) ||
-              helper.isStoppedByError(state))
+          else if (!helper.isSuccessful(state) || helper.isStoppedByError(state))
           {
-            logger.warn(LocalizableMessage.raw("Error: "+errorMsg));
-            throw new ApplicationException(
-                ReturnCode.APPLICATION_ERROR, errorMsg,
-                null);
+            logger.warn(LocalizableMessage.raw("Error: " + errorMsg));
+            throw new ApplicationException(ReturnCode.APPLICATION_ERROR, errorMsg, null);
           }
         }
       }
@@ -4613,11 +4454,8 @@
       }
       catch (NamingException ne)
       {
-        throw new ApplicationException(
-            ReturnCode.APPLICATION_ERROR,
-                getThrowableMsg(INFO_ERROR_POOLING_INITIALIZATION.get(
-                        sourceServerDisplay),
-                        ne), ne);
+        throw new ApplicationException(ReturnCode.APPLICATION_ERROR,
+            getThrowableMsg(INFO_ERROR_POOLING_INITIALIZATION.get(sourceServerDisplay), ne), ne);
       }
     }
   }
@@ -4625,12 +4463,14 @@
   /**
    * Invokes a long operation in a separate thread and checks whether the user
    * canceled the operation or not.
-   * @param thread the Thread that must be launched.
-   * @throws ApplicationException if there was an error executing the task or
-   * if the user canceled the installer.
+   *
+   * @param thread
+   *          the Thread that must be launched.
+   * @throws ApplicationException
+   *           if there was an error executing the task or if the user canceled
+   *           the installer.
    */
-  private void invokeLongOperation(InvokeThread thread)
-  throws ApplicationException
+  private void invokeLongOperation(InvokeThread thread) throws ApplicationException
   {
     try
     {
@@ -4646,7 +4486,7 @@
           }
           catch (Throwable t)
           {
-            logger.warn(LocalizableMessage.raw("Error cancelling thread: "+t, t));
+            logger.warn(LocalizableMessage.raw("Error cancelling thread: " + t, t));
           }
         }
         else if (thread.getException() != null)
@@ -4669,25 +4509,25 @@
     }
     catch (ApplicationException e)
     {
-      logger.error(LocalizableMessage.raw("Error: "+e, e));
+      logger.error(LocalizableMessage.raw("Error: " + e, e));
       throw e;
     }
     catch (Throwable t)
     {
-      logger.error(LocalizableMessage.raw("Error: "+t, t));
-      throw new ApplicationException(ReturnCode.BUG,
-          getThrowableMsg(INFO_BUG_MSG.get(), t), t);
+      logger.error(LocalizableMessage.raw("Error: " + t, t));
+      throw new ApplicationException(ReturnCode.BUG, getThrowableMsg(INFO_BUG_MSG.get(), t), t);
     }
   }
 
-
   /**
    * Returns the host port representation of the server to be used in progress
-   * and error messages.  It takes into account the fact the host and port
-   * provided by the user in the replication options panel.
-   * NOTE: the code assumes that the user data with the contents of the
-   * replication options has already been updated.
-   * @param server the ServerDescriptor.
+   * and error messages. It takes into account the fact the host and port
+   * provided by the user in the replication options panel. NOTE: the code
+   * assumes that the user data with the contents of the replication options has
+   * already been updated.
+   *
+   * @param server
+   *          the ServerDescriptor.
    * @return the host port string representation of the provided server.
    */
   protected String getHostPort(ServerDescriptor server)
@@ -4713,7 +4553,6 @@
     return hostPort;
   }
 
-  /** {@inheritDoc} */
   @Override
   protected void applicationPrintStreamReceived(String message)
   {
@@ -4727,15 +4566,15 @@
 
   /**
    * Returns the timeout to be used to connect in milliseconds.
-   * @return the timeout to be used to connect in milliseconds.  Returns
-   * {@code 0} if there is no timeout.
+   *
+   * @return the timeout to be used to connect in milliseconds. Returns
+   *         {@code 0} if there is no timeout.
    */
   protected int getConnectTimeout()
   {
     return getUserData().getConnectTimeout();
   }
 
-
   /**
    * Copies the template instance files into the instance directory.
    *
@@ -4745,14 +4584,11 @@
   private void copyTemplateInstance() throws ApplicationException
   {
     FileManager fileManager = new FileManager();
-    fileManager.synchronize(getInstallation().getTemplateDirectory(),
-        getInstallation().getInstanceDirectory());
+    fileManager.synchronize(getInstallation().getTemplateDirectory(), getInstallation().getInstanceDirectory());
   }
 }
 
-/**
- * Class used to be able to cancel long operations.
- */
+/** Class used to be able to cancel long operations. */
 abstract class InvokeThread extends Thread implements Runnable
 {
   protected boolean isOver;
@@ -4761,8 +4597,9 @@
   /**
    * Returns <CODE>true</CODE> if the thread is over and <CODE>false</CODE>
    * otherwise.
-   * @return  <CODE>true</CODE> if the thread is over and <CODE>false</CODE>
-   * otherwise.
+   *
+   * @return <CODE>true</CODE> if the thread is over and <CODE>false</CODE>
+   *         otherwise.
    */
   public boolean isOver()
   {
@@ -4771,6 +4608,7 @@
 
   /**
    * Returns the exception that was encountered running the thread.
+   *
    * @return the exception that was encountered running the thread.
    */
   public ApplicationException getException()
@@ -4778,14 +4616,10 @@
     return ae;
   }
 
-  /**
-   * Runnable implementation.
-   */
+  /** Runnable implementation. */
   @Override
   public abstract void run();
 
-  /**
-   * Abort this thread.
-   */
+  /** Abort this thread. */
   public abstract void abort();
 }

--
Gitblit v1.10.0