From 7c7b9d023cd466c1771068badc020dab36beb553 Mon Sep 17 00:00:00 2001 From: Endi Sukma Dewata Date: Thu, 5 Apr 2012 14:49:11 -0500 Subject: Removed whitespaces from Java code. Whitespaces in Java code have been removed with the following command: find . -not -path .git -name *.java -exec sed -i 's/[[:blank:]]\+$//' {} \; Ticket #134 --- .../com/netscape/cms/authorization/AAclAuthz.java | 28 +++++++++++----------- .../netscape/cms/authorization/BasicAclAuthz.java | 12 +++++----- .../netscape/cms/authorization/DirAclAuthz.java | 12 +++++----- 3 files changed, 26 insertions(+), 26 deletions(-) (limited to 'base/common/src/com/netscape/cms/authorization') diff --git a/base/common/src/com/netscape/cms/authorization/AAclAuthz.java b/base/common/src/com/netscape/cms/authorization/AAclAuthz.java index 570fe3a88..2e6636f27 100644 --- a/base/common/src/com/netscape/cms/authorization/AAclAuthz.java +++ b/base/common/src/com/netscape/cms/authorization/AAclAuthz.java @@ -45,19 +45,19 @@ import com.netscape.cmsutil.util.Utils; * actions. *

* Here is a sample resourceACLS for a resource - * + * *

  *   certServer.UsrGrpAdminServlet:
  *       execute:
  *           deny (execute) user="tempAdmin";
  *           allow (execute) group="Administrators";
  * 
- * + * * To perform permission checking, code call authz mgr authorize() method to verify access. See AuthzMgr for calling * example. *

* default "evaluators" are used to evaluate the "group=.." or "user=.." rules. See evaluator for more info - * + * * @version $Revision$, $Date$ * @see ACL Files */ @@ -122,7 +122,7 @@ public abstract class AAclAuthz { type + "." + PROP_CLASS)); } - // instantiate evaluator + // instantiate evaluator try { evaluator = (IAccessEvaluator) Class.forName(evalClassPath).newInstance(); @@ -152,7 +152,7 @@ public abstract class AAclAuthz { * :right-1[,right-n]:[allow,deny](right(s))=: * Example: resTurnKnob:left,right:allow(left) group="lefties":door knobs for lefties - * + * * @param resACLs same format as the resourceACLs attribute * @throws EBaseException parsing error from parseACL */ @@ -200,7 +200,7 @@ public abstract class AAclAuthz { * Returns a list of configuration parameter names. * The list is passed to the configuration console so instances of * this implementation can be configured through the console. - * + * * @return String array of configuration parameter names. */ public String[] getConfigParams() { @@ -244,7 +244,7 @@ public abstract class AAclAuthz { *

* If there are multiple aci's for a resource, ALL aci's will be checked, and only if all passed permission checks, * will the eventual access be granted. - * + * * @param name resource name * @param perm permission requested * @exception EACLsException access permission denied @@ -301,7 +301,7 @@ public abstract class AAclAuthz { * negative ("deny") aclEntries are treated differently than positive ("allow") statements. If a negative aclEntries * fails the acl check, the permission check will return "false" right away; while in the case of a positive * aclEntry, if the the aclEntry fails the acl check, the next aclEntry will be evaluated. - * + * * @param name resource name * @param perm permission requested * @return true if access allowed @@ -463,7 +463,7 @@ public abstract class AAclAuthz { *

* If there are multiple aci's for a resource, ALL aci's will be checked, and only if all passed permission checks, * will the eventual access be granted. - * + * * @param authToken authentication token gotten from authentication * @param name resource name * @param perm permission requested @@ -768,7 +768,7 @@ public abstract class AAclAuthz { /** * gets an enumeration of resources - * + * * @return an enumeration of resources contained in the ACL table */ public Enumeration aclResElements() { @@ -777,7 +777,7 @@ public abstract class AAclAuthz { /** * gets an enumeration of access evaluators - * + * * @return an enumeraton of access evaluators */ public Enumeration aclEvaluatorElements() { @@ -786,7 +786,7 @@ public abstract class AAclAuthz { /** * gets the access evaluators - * + * * @return handle to the access evaluators table */ public Hashtable getAccessEvaluators() { @@ -795,7 +795,7 @@ public abstract class AAclAuthz { /** * is this resource name unique - * + * * @return true if unique; false otherwise */ public boolean isTypeUnique(String type) { @@ -828,7 +828,7 @@ public abstract class AAclAuthz { * an abstract class that enforces implementation of the * authorize() method that will authorize an operation on a * particular resource - * + * * @param authToken the authToken associated with a user * @param resource - the protected resource name * @param operation - the protected resource operation name diff --git a/base/common/src/com/netscape/cms/authorization/BasicAclAuthz.java b/base/common/src/com/netscape/cms/authorization/BasicAclAuthz.java index f6b1b6713..dae24678d 100644 --- a/base/common/src/com/netscape/cms/authorization/BasicAclAuthz.java +++ b/base/common/src/com/netscape/cms/authorization/BasicAclAuthz.java @@ -32,7 +32,7 @@ import com.netscape.certsrv.logging.ILogger; /** * A class for basic acls authorization manager - * + * * @version $Revision$, $Date$ */ public class BasicAclAuthz extends AAclAuthz @@ -112,7 +112,7 @@ public class BasicAclAuthz extends AAclAuthz * Example: *

* For example, if UsrGrpAdminServlet needs to authorize the caller it would do be done in the following fashion: - * + * *

      * try {
      *     authzTok = mAuthz.authorize("DirACLBasedAuthz", authToken, RES_GROUP, "read");
@@ -120,7 +120,7 @@ public class BasicAclAuthz extends AAclAuthz
      *     log(ILogger.LL_FAILURE, "authorize call: " + e.toString());
      * }
      * 
- * + * * @param authToken the authToken associated with a user * @param resource - the protected resource name * @param operation - the protected resource operation name @@ -143,7 +143,7 @@ public class BasicAclAuthz extends AAclAuthz authzToken.set(AuthzToken.TOKEN_AUTHZ_STATUS, AuthzToken.AUTHZ_STATUS_SUCCESS); } catch (EACLsException e) { - // audit here later + // audit here later log(ILogger.LL_FAILURE, CMS.getLogMessage("AUTHZ_EVALUATOR_AUTHORIZATION_FAILED")); String params[] = { resource, operation }; @@ -165,7 +165,7 @@ public class BasicAclAuthz extends AAclAuthz /** * This currently does not flush to permanent storage - * + * * @param id is the resource id * @param strACLs */ @@ -203,7 +203,7 @@ public class BasicAclAuthz extends AAclAuthz /** * Logs a message for this class in the system log file. - * + * * @param level The log level. * @param msg The message to log. * @see com.netscape.certsrv.logging.ILogger diff --git a/base/common/src/com/netscape/cms/authorization/DirAclAuthz.java b/base/common/src/com/netscape/cms/authorization/DirAclAuthz.java index acc3ffbb7..040ff5297 100644 --- a/base/common/src/com/netscape/cms/authorization/DirAclAuthz.java +++ b/base/common/src/com/netscape/cms/authorization/DirAclAuthz.java @@ -46,7 +46,7 @@ import com.netscape.certsrv.logging.ILogger; /** * A class for ldap acls based authorization manager * The ldap server used for acls is the cms internal ldap db. - * + * * @version $Revision$, $Date$ */ public class DirAclAuthz extends AAclAuthz @@ -203,7 +203,7 @@ public class DirAclAuthz extends AAclAuthz * Example: *

* For example, if UsrGrpAdminServlet needs to authorize the caller it would do be done in the following fashion: - * + * *

      * try {
      *     authzTok = mAuthz.authorize("DirAclAuthz", authToken, RES_GROUP, "read");
@@ -211,7 +211,7 @@ public class DirAclAuthz extends AAclAuthz
      *     log(ILogger.LL_FAILURE, "authorize call: " + e.toString());
      * }
      * 
- * + * * @param authToken the authToken associated with a user * @param resource - the protected resource name * @param operation - the protected resource operation name @@ -230,7 +230,7 @@ public class DirAclAuthz extends AAclAuthz authzToken.set(AuthzToken.TOKEN_AUTHZ_STATUS, AuthzToken.AUTHZ_STATUS_SUCCESS); CMS.debug("DirAclAuthz: authorization passed"); } catch (EACLsException e) { - // audit here later + // audit here later log(ILogger.LL_FAILURE, CMS.getLogMessage("AUTHZ_EVALUATOR_AUTHORIZATION_FAILED")); String params[] = { resource, operation }; @@ -256,7 +256,7 @@ public class DirAclAuthz extends AAclAuthz * Currently, it is possible that when the memory is updated successfully, and the ldap isn't, the memory upates * lingers. The result is that the changes will only be done on ldap at the next update, or when the system shuts * down, another flush will be attempted. - * + * * @param id is the resource id * @param rights The allowable rights for this resource * @param strACLs has the same format as a resourceACLs entry acis @@ -352,7 +352,7 @@ public class DirAclAuthz extends AAclAuthz /** * Logs a message for this class in the system log file. - * + * * @param level The log level. * @param msg The message to log. * @see com.netscape.certsrv.logging.ILogger -- cgit