From 7c7b9d023cd466c1771068badc020dab36beb553 Mon Sep 17 00:00:00 2001 From: Endi Sukma Dewata Date: Thu, 5 Apr 2012 14:49:11 -0500 Subject: Removed whitespaces from Java code. Whitespaces in Java code have been removed with the following command: find . -not -path .git -name *.java -exec sed -i 's/[[:blank:]]\+$//' {} \; Ticket #134 --- .../netscape/cms/publish/mappers/AVAPattern.java | 32 +++++------ .../cms/publish/mappers/LdapCaSimpleMap.java | 10 ++-- .../cms/publish/mappers/LdapCertCompsMap.java | 8 +-- .../cms/publish/mappers/LdapCertExactMap.java | 8 +-- .../cms/publish/mappers/LdapCertSubjMap.java | 12 ++--- .../cms/publish/mappers/LdapCrlIssuerCompsMap.java | 8 +-- .../cms/publish/mappers/LdapDNCompsMap.java | 18 +++---- .../cms/publish/mappers/LdapEnhancedMap.java | 12 ++--- .../cms/publish/mappers/LdapSimpleMap.java | 12 ++--- .../cms/publish/mappers/MapAVAPattern.java | 62 +++++++++++----------- .../netscape/cms/publish/mappers/MapDNPattern.java | 30 +++++------ .../cms/publish/mappers/MapRDNPattern.java | 32 +++++------ .../com/netscape/cms/publish/mappers/NoMap.java | 4 +- .../cms/publish/publishers/FileBasedPublisher.java | 8 +-- .../publish/publishers/LdapCaCertPublisher.java | 4 +- .../publish/publishers/LdapCertSubjPublisher.java | 6 +-- .../publishers/LdapCertificatePairPublisher.java | 6 +-- .../cms/publish/publishers/LdapCrlPublisher.java | 2 +- .../publishers/LdapEncryptCertPublisher.java | 6 +-- .../publish/publishers/LdapUserCertPublisher.java | 6 +-- .../cms/publish/publishers/PublisherUtils.java | 4 +- 21 files changed, 145 insertions(+), 145 deletions(-) (limited to 'base/common/src/com/netscape/cms/publish') diff --git a/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java b/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java index 7f70722d0..acac975cb 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java +++ b/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java @@ -57,16 +57,16 @@ import com.netscape.certsrv.request.IRequest; * attribute formulated from the certificate * subject name, extension or request attributes. *

- * + * * The syntax is - * + * *

- *     avaPattern := constant-value | 
- *                   "$subj" "." attrName [ "." attrNumber ] | 
- *                   "$req" "." [ prefix .] attrName [ "." attrNumber ] | 
+ *     avaPattern := constant-value |
+ *                   "$subj" "." attrName [ "." attrNumber ] |
+ *                   "$req" "." [ prefix .] attrName [ "." attrNumber ] |
  *                   "$ext" "." extName [ "." nameType ] [ "." attrNumber ]
  * 
- * + * *
  * Example: $ext.SubjectAlternativeName.RFC822Name.1
  * cert subjectAltName is rfc822Name: jjames@mcom.com
@@ -77,9 +77,9 @@ import com.netscape.certsrv.request.IRequest;
  *     The first rfc822name value in the subjAltName extension.  
*

*

- * + * * If a request attribute or subject DN component does not exist, the attribute is skipped. - * + * * @version $Revision$, $Date$ */ class AVAPattern { @@ -117,12 +117,12 @@ class AVAPattern { /* value type */ protected String mType = null; - /* value - could be name of a request attribute or + /* value - could be name of a request attribute or * cert subject attribute or extension name. */ protected String mValue = null; - /* value type - general name type of an + /* value type - general name type of an * extension attribute if any. */ protected String mGNType = null; @@ -174,7 +174,7 @@ class AVAPattern { } if (c == '$') { - // check for $subj $ext or $req + // check for $subj $ext or $req try { c = in.read(); } catch (IOException e) { @@ -252,7 +252,7 @@ class AVAPattern { } if (c == '+' || c == ',') { // either ',' or '+' - in.unread(c); // pushback last , or + + in.unread(c); // pushback last , or + } } catch (IOException e) { throw new ELdapException( @@ -350,7 +350,7 @@ class AVAPattern { // value is constant. treat as regular ava. mType = TYPE_CONSTANT; - // parse ava value. + // parse ava value. StringBuffer valueBuf = new StringBuffer(); valueBuf.append((char) c); @@ -362,7 +362,7 @@ class AVAPattern { } if (c == '+' || c == ',') { // either ',' or '+' - in.unread(c); // pushback last , or + + in.unread(c); // pushback last , or + } } catch (IOException e) { throw new ELdapException( @@ -371,9 +371,9 @@ class AVAPattern { mValue = valueBuf.toString().trim(); - /* try { + /* try { * AVA ava = mLdapDNStrConverter.parseAVA( - * valueBuf.toString()); + * valueBuf.toString()); * mValue = ava.toLdapDNString(); * //System.out.println("----- mValue "+mValue); * } catch (IOException e) { diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java index bbf641540..a1a65a342 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java @@ -54,7 +54,7 @@ import com.netscape.certsrv.request.IRequest; * in the directory to publish the cert or crl. * The restriction of this mapper is that the ldap dn components must * be part of certificate subject name or request attributes or constant. - * + * * @version $Revision$, $Date$ */ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo { @@ -82,7 +82,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Constructor. - * + * * @param dnPattern The base DN. */ public LdapCaSimpleMap(String dnPattern) { @@ -157,7 +157,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Maps a X500 subject name to LDAP entry. * Uses DN pattern to form a DN for a LDAP base search. - * + * * @param conn the LDAP connection. * @param obj the object to map. * @exception ELdapException if any LDAP exceptions occured. @@ -170,7 +170,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Maps a X500 subject name to LDAP entry. * Uses DN pattern to form a DN for a LDAP base search. - * + * * @param conn the LDAP connection. * @param req the request to map. * @param obj the object to map. @@ -277,7 +277,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * form a dn from component in the request and cert subject name - * + * * @param req The request * @param obj The certificate or crl */ diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java index 2373e3c66..d1a734b82 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java @@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest; * If the baseDN is null and none of the DN comps matched, it is an error. * If none of the DN comps and filter comps matched, it is an error. * If just the filter comps is null, a base search is performed. - * + * * @version $Revision$, $Date$ */ public class LdapCertCompsMap @@ -57,14 +57,14 @@ public class LdapCertCompsMap /** * Constructor. - * + * * The DN comps are used to form a LDAP entry to begin a subtree search. * The filter comps are used to form a search filter for the subtree. * If none of the DN comps matched, baseDN is used for the subtree. * If the baseDN is null and none of the DN comps matched, it is an error. * If none of the DN comps and filter comps matched, it is an error. * If just the filter comps is null, a base search is performed. - * + * * @param baseDN The base DN. * @param dnComps Components to form the LDAP base dn for search. * @param filterComps Components to form the LDAP search filter. @@ -116,7 +116,7 @@ public class LdapCertCompsMap * If the formed DN is null and baseDN is null an error is thrown. * If the filter is null a base search is performed. * If both are null an error is thrown. - * + * * @param conn - the LDAP connection. * @param obj - the X509Certificate. */ diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java index 11b53a797..5c085481d 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java @@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest; /** * Maps a X509 certificate to a LDAP entry by using the subject name * of the certificate as the LDAP entry DN. - * + * * @version $Revision$, $Date$ */ public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo { @@ -103,7 +103,7 @@ public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo { /** * Finds the entry for the certificate by looking for the cert * subject name in the subject name attribute. - * + * * @param conn - the LDAP connection. * @param obj - the X509Certificate. */ @@ -172,13 +172,13 @@ public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo { /* catch (IOException e) { - log(ILogger.LL_FAILURE, + log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_CANT_GET_SUBJECT", e.toString())); throw new ELdapException( LdapResources.GET_CERT_SUBJECT_DN_FAILED, e); } catch (CertificateEncodingException e) { - log(ILogger.LL_FAILURE, + log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_CANT_DECODE_CERT", e.toString())); throw new ELdapException( LdapResources.GET_DER_ENCODED_CERT_FAILED, e); diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java index 4d5ff38c8..61ffef947 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java @@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest; /** * Maps a X509 certificate to a LDAP entry by finding an LDAP entry * which has an attribute whose contents are equal to the cert subject name. - * + * * @version $Revision$, $Date$ */ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo { @@ -62,7 +62,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo { /** * constructs a certificate subject name mapper with search base. - * + * * @param searchBase the dn to start searching for the certificate * subject name. */ @@ -76,7 +76,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo { /** * Constructor using non-ES cert map attribute name. - * + * * @param searchBase entry to start search. * @param certSubjNameAttr attribute for certificate subject names. * @param certAttr attribute to find certificate. @@ -172,7 +172,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo { /** * Finds the entry for the certificate by looking for the cert * subject name in the subject name attribute. - * + * * @param conn - the LDAP connection. * @param obj - the X509Certificate. */ @@ -242,13 +242,13 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo { /* catch (IOException e) { - log(ILogger.LL_FAILURE, + log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_CANT_GET_SUBJECT", e.toString())); throw new ELdapException( LdapResources.GET_CERT_SUBJECT_DN_FAILED, e); } catch (CertificateEncodingException e) { - log(ILogger.LL_FAILURE, + log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_CANT_DECODE_CERT", e.toString())); throw new ELdapException( LdapResources.GET_DER_ENCODED_CERT_FAILED, e); diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java index 654de5d30..7c4c3c4b0 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java @@ -35,7 +35,7 @@ import com.netscape.certsrv.request.IRequest; * Default crl mapper. * maps the crl to a ldap entry by using components in the issuer name * to find the CA's entry. - * + * * @version $Revision$, $Date$ */ public class LdapCrlIssuerCompsMap @@ -49,14 +49,14 @@ public class LdapCrlIssuerCompsMap /** * Constructor. - * + * * The DN comps are used to form a LDAP entry to begin a subtree search. * The filter comps are used to form a search filter for the subtree. * If none of the DN comps matched, baseDN is used for the subtree. * If the baseDN is null and none of the DN comps matched, it is an error. * If none of the DN comps and filter comps matched, it is an error. * If just the filter comps is null, a base search is performed. - * + * * @param baseDN The base DN. * @param dnComps Components to form the LDAP base dn for search. * @param filterComps Components to form the LDAP search filter. @@ -110,7 +110,7 @@ public class LdapCrlIssuerCompsMap * If the formed DN is null and baseDN is null an error is thrown. * If the filter is null a base search is performed. * If both are null an error is thrown. - * + * * @param conn - the LDAP connection. * @param obj - the X509Certificate. * @return the result. LdapCertMapResult is also used for CRL. diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java index 73549f1b5..1f7f06f69 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java @@ -55,7 +55,7 @@ import com.netscape.certsrv.publish.ILdapPlugin; * If the baseDN is null and none of the DN comps matched, it is an error. * If none of the DN comps and filter comps matched, it is an error. * If just the filter comps is null, a base search is performed. - * + * * @version $Revision$, $Date$ */ public class LdapDNCompsMap @@ -71,14 +71,14 @@ public class LdapDNCompsMap /** * Constructor. - * + * * The DN comps are used to form a LDAP entry to begin a subtree search. * The filter comps are used to form a search filter for the subtree. * If none of the DN comps matched, baseDN is used for the subtree. * If the baseDN is null and none of the DN comps matched, it is an error. * If none of the DN comps and filter comps matched, it is an error. * If just the filter comps is null, a base search is performed. - * + * * @param baseDN The base DN. * @param dnComps Components to form the LDAP base dn for search. * @param filterComps Components to form the LDAP search filter. @@ -209,7 +209,7 @@ public class LdapDNCompsMap * If the formed DN is null and baseDN is null an error is thrown. * If the filter is null a base search is performed. * If both are null an error is thrown. - * + * * @param conn the LDAP connection. * @param x500name the dn to map. * @param obj the object @@ -234,8 +234,8 @@ public class LdapDNCompsMap // if (filter == null) { // log(ILogger.LL_FAILURE, "No dn and filter formed"); // throw new ELdapException( - // LdapResources.NO_DN_AND_FILTER_COMPS, - // x500name.toString()); + // LdapResources.NO_DN_AND_FILTER_COMPS, + // x500name.toString()); // } if (mBaseDN == null) { log(ILogger.LL_FAILURE, @@ -302,7 +302,7 @@ public class LdapDNCompsMap /** * form a dn and filter from component in the cert subject name - * + * * @param subjName subject name */ public String[] formDNandFilter(X500Name subjName) @@ -359,7 +359,7 @@ public class LdapDNCompsMap } } - // XXX should be an error when string is null? + // XXX should be an error when string is null? // return to caller to decide. if (dnRdns.size() != 0) { dnStr = new X500Name(dnRdns).toLdapDNString(); @@ -417,7 +417,7 @@ public class LdapDNCompsMap * arrays of objectidentifiers. * The string is expected to be comma separated AVA attribute names. * For example, "uid,cn,o,ou". Attribute names are case insensitive. - * + * * @param val the string specifying the comps * @exception ELdapException if any error occurs. */ diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java index c9a7f867c..d94032071 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java @@ -72,7 +72,7 @@ import com.netscape.certsrv.request.IRequest; * entry is not found, it has the option to create * the ldap entry given the dn and attributes * formulated. - * + * * @version $Revision$, $Date$ */ public class LdapEnhancedMap @@ -105,7 +105,7 @@ public class LdapEnhancedMap /* mapper plug-in fields */ protected static final String PROP_DNPATTERN = "dnPattern"; protected static final String PROP_CREATE = "createEntry"; - // the object class of the entry to be created. xxxx not done yet + // the object class of the entry to be created. xxxx not done yet protected static final String PROP_OBJCLASS = "objectClass"; // req/cert/ext attribute --> directory attribute table protected static final String PROP_ATTRNUM = "attrNum"; @@ -206,7 +206,7 @@ public class LdapEnhancedMap /** * form a dn from component in the request and cert subject name - * + * * @param req The request * @param obj The certificate or crl */ @@ -332,7 +332,7 @@ public class LdapEnhancedMap /** * for initializing from config store. - * + * * implementation for extended * ILdapPlugin interface method */ @@ -439,7 +439,7 @@ public class LdapEnhancedMap /** * Maps an X500 subject name to an LDAP entry. * Uses DN pattern to form a DN for an LDAP base search. - * + * * @param conn the LDAP connection. * @param obj the object to map. * @exception ELdapException if any LDAP exceptions occurred. @@ -452,7 +452,7 @@ public class LdapEnhancedMap /** * Maps an X500 subject name to an LDAP entry. * Uses DN pattern to form a DN for an LDAP base search. - * + * * @param conn the LDAP connection. * @param req the request to map. * @param obj the object to map. diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java index 642729673..67d98f4cc 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java @@ -51,7 +51,7 @@ import com.netscape.certsrv.request.IRequest; * in the directory to publish the cert or crl. * The restriction of this mapper is that the ldap dn components must * be part of certificate subject name or request attributes or constant. - * + * * @version $Revision$, $Date$ */ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { @@ -77,7 +77,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Constructor. - * + * * @param dnPattern The base DN. */ public LdapSimpleMap(String dnPattern) { @@ -151,7 +151,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Maps a X500 subject name to LDAP entry. * Uses DN pattern to form a DN for a LDAP base search. - * + * * @param conn the LDAP connection. * @param obj the object to map. * @exception ELdapException if any LDAP exceptions occured. @@ -164,7 +164,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * Maps a X500 subject name to LDAP entry. * Uses DN pattern to form a DN for a LDAP base search. - * + * * @param conn the LDAP connection. * @param req the request to map. * @param obj the object to map. @@ -201,7 +201,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { LDAPEntry entry = results.next(); if (results.hasMoreElements()) { - log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_MORE_THAN_ONE_ENTRY", dn, ((req == null) ? "" : + log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_MORE_THAN_ONE_ENTRY", dn, ((req == null) ? "" : req.getRequestId().toString()))); throw new ELdapException(CMS.getUserMessage("CMS_LDAP_MORE_THAN_ONE_ENTRY", ((req == null) ? "" : req.getRequestId().toString()))); @@ -237,7 +237,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo { /** * form a dn from component in the request and cert subject name - * + * * @param req The request * @param obj The certificate or crl */ diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java index 7aeb672d0..ef7fa9d13 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java +++ b/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java @@ -45,41 +45,41 @@ import com.netscape.certsrv.request.IRequest; * class for parsing a DN pattern used to construct a ldap dn from * request attributes and cert subject name. *

- * + * * dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and * request attributes . If empty or not set, the certificate subject name will be used as the ldap dn. *

- * + * * The syntax is - * + * *

  * 	dnPattern := rdnPattern *[ "," rdnPattern ]
  * 	rdnPattern := avaPattern *[ "+" avaPattern ]
- * 		avaPattern := name "=" value | 
- * 			      name "=" "$subj" "." attrName [ "." attrNumber ] | 
- * 			      name "=" "$ext" "." extName [ "." nameType ] [ "." attrNumber ] 
- * 			      name "=" "$req" "." attrName [ "." attrNumber ] | 
+ * 		avaPattern := name "=" value |
+ * 			      name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * 			      name "=" "$ext" "." extName [ "." nameType ] [ "." attrNumber ]
+ * 			      name "=" "$req" "." attrName [ "." attrNumber ] |
  * 			 	  "$rdn" "." number
  * 
- * + * *
  * Example1: cn=Certificate Manager,ou=people,o=mcom.com
  * cert subject name: dn:  CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager 
+ * request attributes: uid: cmanager
  * 

* The dn formulated will be :
* CN=Certificate Manager, OU=people, O=mcom.com *

* note: Subordinate ca enrollment will use ca mapper. Use predicate * to distinguish the ca itself and the subordinates. - * + * * Example2: UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, OU=people, , O=mcom.com * cert subject name: dn: UID=jjames, OU=IS, OU=people, , O=mcom.com - * request attributes: uid: cmanager + * request attributes: uid: cmanager *

* The dn formulated will be :
* UID=jjames, OU=IS, OU=people, O=mcom.com - *

+ *

* UID = the 'uid' attribute value in the request.
* OU = the 'ou' value in the cert subject name.
* O = the string mcom.com.
@@ -87,20 +87,20 @@ import com.netscape.certsrv.request.IRequest; * Example3: UID=$req.HTTP_PARAMS.uid, E=$ext.SubjectAlternativeName.RFC822Name.1, O=mcom.com * cert subject name: dn: UID=jjames, OU=IS, OU=people, O=mcom.com * cert subjectAltName is rfc822Name: jjames@mcom.com - * request attributes: uid: cmanager + * request attributes: uid: cmanager *

* The dn formulated will be :
* UID=jjames, E=jjames@mcom.com, O=mcom.com - *

+ *

* UID = the 'uid' attribute value in the request.
* E = The first rfc822name value in the subjAltName extension.
* O = the string mcom.com.
*

*

- * + * * If an request attribute or subject DN component does not exist, the attribute is skipped. There is potential risk * that a wrong dn will be mapped into. - * + * * @version $Revision$, $Date$ */ class MapAVAPattern { @@ -138,7 +138,7 @@ class MapAVAPattern { /* the attribute in the AVA pair */ protected String mAttr = null; - /* value - could be name of a request attribute or + /* value - could be name of a request attribute or * cert subject dn attribute. */ protected String mValue = null; @@ -185,7 +185,7 @@ class MapAVAPattern { if (c == -1) throw new ECompSyntaxErr(CMS.getUserMessage("CMS_AUTHENTICATION_COMPONENT_SYNTAX", "All blank")); - // $rdn "." number syntax. + // $rdn "." number syntax. if (c == '$') { //System.out.println("$rdn syntax"); @@ -230,9 +230,9 @@ class MapAVAPattern { return; } - // name "=" ... syntax. + // name "=" ... syntax. - // read name + // read name //System.out.println("reading name"); StringBuffer attrBuf = new StringBuffer(); @@ -253,10 +253,10 @@ class MapAVAPattern { throw new ECompSyntaxErr(CMS.getUserMessage("CMS_AUTHENTICATION_COMPONENT_SYNTAX", "Missing \"=\" in ava pattern")); - // read value + // read value //System.out.println("reading value"); - // skip spaces + // skip spaces //System.out.println("skip spaces for value"); try { while ((c = in.read()) == ' ' || c == '\t') {//System.out.println("spaces2 read "+(char)c); @@ -271,7 +271,7 @@ class MapAVAPattern { "no value after = in ava pattern")); if (c == '$') { - // check for $subj $ext or $req + // check for $subj $ext or $req try { c = in.read(); //System.out.println("check $dn or $attr read "+(char)c); @@ -327,7 +327,7 @@ class MapAVAPattern { "unknown keyword. expecting $subj $ext or $req.")); } - // get request attr name of subject dn pattern from above. + // get request attr name of subject dn pattern from above. String attrName = attrBuf.toString().trim(); //System.out.println("----- attrName "+attrName); @@ -337,10 +337,10 @@ class MapAVAPattern { mAttr = attrName; /* - try { - ObjectIdentifier attrOid = - mLdapDNStrConverter.parseAVAKeyword(attrName); - mAttr = mLdapDNStrConverter.encodeOID(attrOid); + try { + ObjectIdentifier attrOid = + mLdapDNStrConverter.parseAVAKeyword(attrName); + mAttr = mLdapDNStrConverter.encodeOID(attrOid); //System.out.println("----- mAttr "+mAttr); } catch (IOException e) { @@ -359,7 +359,7 @@ class MapAVAPattern { valueBuf.append((char) c); } if (c == '+' || c == ',') // either ',' or '+' - in.unread(c); // pushback last , or + + in.unread(c); // pushback last , or + } catch (IOException e) { throw new ELdapException( CMS.getUserMessage("CMS_LDAP_INTERNAL_ERROR", e.toString())); @@ -439,7 +439,7 @@ class MapAVAPattern { // value is constant. treat as regular ava. mType = TYPE_CONSTANT; //System.out.println("----- mType constant"); - // parse ava value. + // parse ava value. StringBuffer valueBuf = new StringBuffer(); valueBuf.append((char) c); @@ -450,7 +450,7 @@ class MapAVAPattern { valueBuf.append((char) c); } if (c == '+' || c == ',') { // either ',' or '+' - in.unread(c); // pushback last , or + + in.unread(c); // pushback last , or + } } catch (IOException e) { throw new ELdapException( diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java index 7a9025b1d..dc446a7b7 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java +++ b/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java @@ -34,49 +34,49 @@ import com.netscape.certsrv.request.IRequest; * class for parsing a DN pattern used to construct a ldap dn from * request attributes and cert subject name. *

- * + * * dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and * request attributes . If empty or not set, the certificate subject name will be used as the ldap dn. *

- * + * * The syntax is - * + * *

  * 	dnPattern := rdnPattern *[ "," rdnPattern ]
  * 	rdnPattern := avaPattern *[ "+" avaPattern ]
- * 		avaPattern := name "=" value | 
- * 			      name "=" "$subj" "." attrName [ "." attrNumber ] | 
- * 			      name "=" "$req" "." attrName [ "." attrNumber ] | 
+ * 		avaPattern := name "=" value |
+ * 			      name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * 			      name "=" "$req" "." attrName [ "." attrNumber ] |
  *     		 	  "$rdn" "." number
  * 
- * + * *
  * Example1: cn=Certificate Manager,ou=people,o=mcom.com
  * cert subject name: dn:  CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager 
+ * request attributes: uid: cmanager
  * 

* The dn formulated will be :
* CN=Certificate Manager, OU=people, O=mcom.com *

* note: Subordinate ca enrollment will use ca mapper. Use predicate * to distinguish the ca itself and the subordinates. - * + * * Example2: UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, O=people, , O=mcom.com * cert subject name: dn: UID=jjames, OU=IS, O=people, , O=mcom.com - * request attributes: uid: cmanager + * request attributes: uid: cmanager *

* The dn formulated will be :
* UID=jjames, OU=IS, OU=people, O=mcom.com - *

+ *

* UID = the 'uid' attribute value in the request.
* OU = the 'ou' value in the cert subject name.
* O = the string people, mcom.com.
*

*

- * + * * If an request attribute or subject DN component does not exist, the attribute is skipped. There is potential risk * that a wrong dn will be mapped into. - * + * * @version $Revision$, $Date$ */ public class MapDNPattern { @@ -97,7 +97,7 @@ public class MapDNPattern { /** * Construct a DN pattern by parsing a pattern string. - * + * * @param pattern the DN pattern * @exception EBaseException If parsing error occurs. */ @@ -166,7 +166,7 @@ public class MapDNPattern { /** * Form a Ldap v3 DN string from a request and a cert subject name. - * + * * @param req the request for (un)publish * @param subject the subjectDN of the certificate * @return Ldap v3 DN string to use for base ldap search. diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java index c1688345b..61da1d7d2 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java +++ b/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java @@ -33,49 +33,49 @@ import com.netscape.certsrv.request.IRequest; * class for parsing a DN pattern used to construct a ldap dn from * request attributes and cert subject name. *

- * + * * dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and * request attributes . If empty or not set, the certificate subject name will be used as the ldap dn. *

- * + * * The syntax is - * + * *

  * 	dnPattern := rdnPattern *[ "," rdnPattern ]
  * 	rdnPattern := avaPattern *[ "+" avaPattern ]
- * 		avaPattern := name "=" value | 
- * 			      name "=" "$subj" "." attrName [ "." attrNumber ] | 
- * 			      name "=" "$req" "." attrName [ "." attrNumber ] | 
+ * 		avaPattern := name "=" value |
+ * 			      name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * 			      name "=" "$req" "." attrName [ "." attrNumber ] |
  * 			 	  "$rdn" "." number
  * 
- * + * *
  * Example1: cn=Certificate Manager,ou=people,o=mcom.com
  * cert subject name: dn:  CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager 
+ * request attributes: uid: cmanager
  * 

* The dn formulated will be :
* CN=Certificate Manager, OU=people, O=mcom.com *

* note: Subordinate ca enrollment will use ca mapper. Use predicate * to distinguish the ca itself and the subordinates. - * + * * Example2: UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, O=people, , O=mcom.com * cert subject name: dn: UID=jjames, OU=IS, O=people, , O=mcom.com - * request attributes: uid: cmanager + * request attributes: uid: cmanager *

* The dn formulated will be :
* UID=jjames, OU=IS, OU=people, O=mcom.com - *

+ *

* UID = the 'uid' attribute value in the request.
* OU = the 'ou' value in the cert subject name.
* O = the string people, mcom.com.
*

*

- * + * * If an request attribute or subject DN component does not exist, the attribute is skipped.There is potential risk that * a wrong dn will be mapped into. - * + * * @version $Revision$, $Date$ */ class MapRDNPattern { @@ -96,7 +96,7 @@ class MapRDNPattern { /** * Construct a DN pattern by parsing a pattern string. - * + * * @param pattenr the DN pattern * @exception ELdapException If parsing error occurs. */ @@ -146,7 +146,7 @@ class MapRDNPattern { if (lastChar != -1) { try { - in.unread(lastChar); // pushback last , + in.unread(lastChar); // pushback last , } catch (IOException e) { throw new ELdapException( CMS.getUserMessage("CMS_LDAP_INTERNAL_ERROR", e.toString())); @@ -183,7 +183,7 @@ class MapRDNPattern { /** * Form a Ldap v3 DN string from a request and a cert subject name. - * + * * @param req the request for (un)publish * @param subject the subjectDN of the certificate * @return Ldap v3 DN string to use for base ldap search. diff --git a/base/common/src/com/netscape/cms/publish/mappers/NoMap.java b/base/common/src/com/netscape/cms/publish/mappers/NoMap.java index 155c54ce0..cc12714e2 100644 --- a/base/common/src/com/netscape/cms/publish/mappers/NoMap.java +++ b/base/common/src/com/netscape/cms/publish/mappers/NoMap.java @@ -31,7 +31,7 @@ import com.netscape.certsrv.request.IRequest; /** * No Map - * + * * @version $Revision$, $Date$ */ public class NoMap implements ILdapMapper, IExtendedPluginInfo { @@ -68,7 +68,7 @@ public class NoMap implements ILdapMapper, IExtendedPluginInfo { /** * Maps a X500 subject name to LDAP entry. * Uses DN pattern to form a DN for a LDAP base search. - * + * * @param conn the LDAP connection. * @param obj the object to map. * @exception ELdapException if any LDAP exceptions occured. diff --git a/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java index cb13b2452..c41025b54 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java @@ -50,7 +50,7 @@ import com.netscape.cmsutil.util.Utils; /** * This publisher writes certificate and CRL into * a directory. - * + * * @version $Revision$, $Date$ */ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo { @@ -257,7 +257,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo { oldLink.delete(); } File link = new File(linkName); - if (link.exists()) { // current link becomes an old link + if (link.exists()) { // current link becomes an old link link.renameTo(new File(linkName + ".old")); } File newLink = new File(linkName + ".new"); @@ -275,7 +275,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo { /** * Publishs a object to the ldap directory. - * + * * @param conn a Ldap connection * (null if LDAP publishing is not enabled) * @param dn dn of the ldap entry to publish cert @@ -391,7 +391,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo { /** * Unpublishs a object to the ldap directory. - * + * * @param conn the Ldap connection * (null if LDAP publishing is not enabled) * @param dn dn of the ldap entry to unpublish cert diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java index e47318b76..cbc77560f 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java @@ -43,7 +43,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; /** * Interface for publishing a CA certificate to - * + * * @version $Revision$, $Date$ */ public class LdapCaCertPublisher @@ -152,7 +152,7 @@ public class LdapCaCertPublisher * Adds the cert to the multi-valued certificate attribute as a * DER encoded binary blob. Does not check if cert already exists. * Converts the class to certificateAuthority. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the certificate * @param certObj the certificate object. diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java index 9000f6834..ac2b64973 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java @@ -47,7 +47,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; * Interface for mapping a X509 certificate to a LDAP entry * Publishes a certificate as binary and its subject name. * there is one subject name value for each certificate. - * + * * @version $Revision$, $Date$ */ public class LdapCertSubjPublisher implements ILdapPublisher { @@ -136,7 +136,7 @@ public class LdapCertSubjPublisher implements ILdapPublisher { * Adds the cert to the multi-valued certificate attribute as a * DER encoded binary blob. Does not check if cert already exists. * Then adds the subject name of the cert to the subject name attribute. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the certificate * @param certObj the certificate object. @@ -298,7 +298,7 @@ public class LdapCertSubjPublisher implements ILdapPublisher { return; } - // delete cert if there. + // delete cert if there. LDAPModificationSet modSet = new LDAPModificationSet(); if (hasCert) { diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java index c65ff79d5..014cc0e5e 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java @@ -41,7 +41,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; /** * module for publishing a cross certificate pair to ldap * crossCertificatePair attribute - * + * * @version $Revision$, $Date$ */ public class LdapCertificatePairPublisher @@ -153,7 +153,7 @@ public class LdapCertificatePairPublisher /** * publish a certificatePair * -should not be called from listeners. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the XcertificatePair * @param pair the Xcertificate bytes object. @@ -166,7 +166,7 @@ public class LdapCertificatePairPublisher /** * publish a certificatePair * -should not be called from listeners. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the XcertificatePair * @param pair the cross cert bytes diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java index 6826cc801..51bebe236 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java @@ -44,7 +44,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; /** * For publishing master or global CRL. * Publishes (replaces) the CRL in the CA's LDAP entry. - * + * * @version $Revision$, $Date$ */ public class LdapCrlPublisher implements ILdapPublisher, IExtendedPluginInfo { diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java index d2c488620..8dada61fb 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java @@ -52,7 +52,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; /** * Interface for mapping a X509 certificate to a LDAP entry - * + * * @version $Revision$, $Date$ */ public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPluginInfo { @@ -125,7 +125,7 @@ public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPlugin * publish a user certificate * Adds the cert to the multi-valued certificate attribute as a * DER encoded binary blob. Does not check if cert already exists. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the certificate * @param certObj the certificate object. @@ -155,7 +155,7 @@ public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPlugin return; } - // publish + // publish LDAPModification mod = new LDAPModification(LDAPModification.REPLACE, attr); conn.modify(dn, mod); diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java index e31ce674c..020c25552 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java +++ b/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java @@ -44,7 +44,7 @@ import com.netscape.certsrv.publish.ILdapPublisher; /** * Interface for mapping a X509 certificate to a LDAP entry - * + * * @version $Revision$, $Date$ */ public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInfo { @@ -114,7 +114,7 @@ public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInf * publish a user certificate * Adds the cert to the multi-valued certificate attribute as a * DER encoded binary blob. Does not check if cert already exists. - * + * * @param conn the LDAP connection * @param dn dn of the entry to publish the certificate * @param certObj the certificate object. @@ -176,7 +176,7 @@ public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInf return; } - // publish + // publish LDAPModification mod = null; if (deleteCert) { mod = new LDAPModification(LDAPModification.REPLACE, diff --git a/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java b/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java index af8d283dd..280a0ce97 100644 --- a/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java +++ b/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java @@ -30,7 +30,7 @@ import java.util.Vector; /** * Publisher utility class. - * + * * @version $Revision$, $Date$ */ public class PublisherUtils { @@ -105,7 +105,7 @@ public class PublisherUtils { /** * strips out double quotes around String parameter - * + * * @param s the string potentially bracketed with double quotes * @return string stripped of surrounding double quotes */ -- cgit