You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by gs...@apache.org on 2007/10/16 00:52:45 UTC
svn commit: r584962 - in /wicket/trunk/jdk-1.5/wicket-auth-roles: .settings/
src/main/java/org/apache/wicket/authentication/
src/main/java/org/apache/wicket/authentication/pages/
src/main/java/org/apache/wicket/authentication/panel/ src/main/java/org/a...
Author: gseitz
Date: Mon Oct 15 15:52:42 2007
New Revision: 584962
URL: http://svn.apache.org/viewvc?rev=584962&view=rev
Log:
WICKET-1078
Modified:
wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs
wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs Mon Oct 15 15:52:42 2007
@@ -53,9 +53,11 @@
org.eclipse.jdt.core.formatter.brace_position_for_method_declaration=next_line
org.eclipse.jdt.core.formatter.brace_position_for_switch=next_line
org.eclipse.jdt.core.formatter.brace_position_for_type_declaration=next_line
+org.eclipse.jdt.core.formatter.comment.clear_blank_lines=false
org.eclipse.jdt.core.formatter.comment.clear_blank_lines_in_block_comment=false
org.eclipse.jdt.core.formatter.comment.clear_blank_lines_in_javadoc_comment=false
org.eclipse.jdt.core.formatter.comment.format_block_comments=true
+org.eclipse.jdt.core.formatter.comment.format_comments=true
org.eclipse.jdt.core.formatter.comment.format_header=false
org.eclipse.jdt.core.formatter.comment.format_html=true
org.eclipse.jdt.core.formatter.comment.format_javadoc_comments=true
@@ -65,7 +67,7 @@
org.eclipse.jdt.core.formatter.comment.indent_root_tags=true
org.eclipse.jdt.core.formatter.comment.insert_new_line_before_root_tags=insert
org.eclipse.jdt.core.formatter.comment.insert_new_line_for_parameter=insert
-org.eclipse.jdt.core.formatter.comment.line_length=80
+org.eclipse.jdt.core.formatter.comment.line_length=100
org.eclipse.jdt.core.formatter.compact_else_if=true
org.eclipse.jdt.core.formatter.continuation_indentation=2
org.eclipse.jdt.core.formatter.continuation_indentation_for_array_initializer=2
@@ -152,7 +154,7 @@
org.eclipse.jdt.core.formatter.insert_space_after_postfix_operator=do not insert
org.eclipse.jdt.core.formatter.insert_space_after_prefix_operator=do not insert
org.eclipse.jdt.core.formatter.insert_space_after_question_in_conditional=insert
-org.eclipse.jdt.core.formatter.insert_space_after_question_in_wildcard=do not insert
+org.eclipse.jdt.core.formatter.insert_space_after_question_in_wildcard=insert
org.eclipse.jdt.core.formatter.insert_space_after_semicolon_in_for=insert
org.eclipse.jdt.core.formatter.insert_space_after_unary_operator=do not insert
org.eclipse.jdt.core.formatter.insert_space_before_and_in_type_parameter=insert
@@ -238,7 +240,7 @@
org.eclipse.jdt.core.formatter.insert_space_before_postfix_operator=do not insert
org.eclipse.jdt.core.formatter.insert_space_before_prefix_operator=do not insert
org.eclipse.jdt.core.formatter.insert_space_before_question_in_conditional=insert
-org.eclipse.jdt.core.formatter.insert_space_before_question_in_wildcard=do not insert
+org.eclipse.jdt.core.formatter.insert_space_before_question_in_wildcard=insert
org.eclipse.jdt.core.formatter.insert_space_before_semicolon=do not insert
org.eclipse.jdt.core.formatter.insert_space_before_semicolon_in_for=do not insert
org.eclipse.jdt.core.formatter.insert_space_before_unary_operator=do not insert
@@ -255,12 +257,12 @@
org.eclipse.jdt.core.formatter.keep_imple_if_on_one_line=false
org.eclipse.jdt.core.formatter.keep_then_statement_on_same_line=false
org.eclipse.jdt.core.formatter.lineSplit=100
-org.eclipse.jdt.core.formatter.never_indent_block_comments_on_first_column=false
-org.eclipse.jdt.core.formatter.never_indent_line_comments_on_first_column=false
+org.eclipse.jdt.core.formatter.never_indent_block_comments_on_first_column=true
+org.eclipse.jdt.core.formatter.never_indent_line_comments_on_first_column=true
org.eclipse.jdt.core.formatter.number_of_blank_lines_at_beginning_of_method_body=0
org.eclipse.jdt.core.formatter.number_of_empty_lines_to_preserve=2
org.eclipse.jdt.core.formatter.put_empty_statement_on_new_line=true
org.eclipse.jdt.core.formatter.tabulation.char=tab
org.eclipse.jdt.core.formatter.tabulation.size=4
org.eclipse.jdt.core.formatter.use_tabs_only_for_leading_indentations=false
-org.eclipse.jdt.core.formatter.wrap_before_binary_operator=true
+org.eclipse.jdt.core.formatter.wrap_before_binary_operator=false
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs Mon Oct 15 15:52:42 2007
@@ -2,4 +2,53 @@
eclipse.preferences.version=1
formatter_profile=_Wicket
formatter_settings_version=11
+editor_save_participant_org.eclipse.jdt.ui.postsavelistener.cleanup=true
internal.default.compliance=default
+org.eclipse.jdt.ui.text.custom_code_templates=<?xml version\="1.0" encoding\="UTF-8" standalone\="no"?><templates><template autoinsert\="false" context\="gettercomment_context" deleted\="false" description\="Comment for getter method" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.gettercomment" name\="gettercomment">/**\r\n * Gets ${bare_field_name}.\r\n * @return ${bare_field_name}\r\n */</template><template autoinsert\="false" context\="settercomment_context" deleted\="false" description\="Comment for setter method" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.settercomment" name\="settercomment">/**\r\n * Sets ${bare_field_name}.\r\n * @param ${param} ${bare_field_name}\r\n */</template><template autoinsert\="false" context\="constructorcomment_context" deleted\="false" description\="Comment for created constructors" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.constructorcomment" name\="constructorcomment">/**\r\n * Construct.\r\n
* ${tags}\r\n */</template><template autoinsert\="false" context\="filecomment_context" deleted\="false" description\="Comment for created Java files" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.filecomment" name\="filecomment"/><template autoinsert\="false" context\="typecomment_context" deleted\="false" description\="Comment for created types" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.typecomment" name\="typecomment">/**\r\n * @author ${user}\r\n * ${tags}\r\n */</template><template autoinsert\="true" context\="fieldcomment_context" deleted\="false" description\="Comment for fields" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.fieldcomment" name\="fieldcomment">/**\r\n * \r\n */</template><template autoinsert\="true" context\="methodcomment_context" deleted\="false" description\="Comment for non-overriding methods" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.methodcomment" name\="methodcomment">/**\r\n * ${tags}
\r\n */</template><template autoinsert\="false" context\="overridecomment_context" deleted\="false" description\="Comment for overriding methods" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.overridecomment" name\="overridecomment">/**\r\n * ${see_to_overridden}\r\n */</template><template autoinsert\="false" context\="newtype_context" deleted\="false" description\="Newly created files" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.newtype" name\="newtype">/*\r\n * Licensed to the Apache Software Foundation (ASF) under one or more\r\n * contributor license agreements. See the NOTICE file distributed with\r\n * this work for additional information regarding copyright ownership.\r\n * The ASF licenses this file to You under the Apache License, Version 2.0\r\n * (the "License"); you may not use this file except in compliance with\r\n * the License. You may obtain a copy of the License at\r\n *\r\n * http\://www.apache.org/licenses/LICENSE-2.0\r\
n *\r\n * Unless required by applicable law or agreed to in writing, software\r\n * distributed under the License is distributed on an "AS IS" BASIS,\r\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n * See the License for the specific language governing permissions and\r\n * limitations under the License.\r\n */\r\n${filecomment}\r\n${package_declaration}\r\n\r\n${typecomment}\r\n${type_declaration}</template><template autoinsert\="false" context\="catchblock_context" deleted\="false" description\="Code in new catch blocks" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.catchblock" name\="catchblock">throw new RuntimeException(${exception_var});</template><template autoinsert\="false" context\="methodbody_context" deleted\="false" description\="Code in created method stubs" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.methodbody" name\="methodbody">${body_statement}</template><template autoinsert\="false" context\="c
onstructorbody_context" deleted\="false" description\="Code in created constructor stubs" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.constructorbody" name\="constructorbody">${body_statement}</template><template autoinsert\="true" context\="getterbody_context" deleted\="false" description\="Code in created getters" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.getterbody" name\="getterbody">return ${field};</template><template autoinsert\="true" context\="setterbody_context" deleted\="false" description\="Code in created setters" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.setterbody" name\="setterbody">${field} \= ${param};</template><template autoinsert\="true" context\="classbody_context" deleted\="false" description\="Code in new class type bodies" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.classbody" name\="classbody">\r\n</template><template autoinsert\="true" context\="interfacebody_context" deleted\="false"
description\="Code in new interface type bodies" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.interfacebody" name\="interfacebody">\r\n</template><template autoinsert\="true" context\="enumbody_context" deleted\="false" description\="Code in new enum type bodies" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.enumbody" name\="enumbody">\r\n</template><template autoinsert\="true" context\="annotationbody_context" deleted\="false" description\="Code in new annotation type bodies" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.annotationbody" name\="annotationbody">\r\n</template><template autoinsert\="true" context\="delegatecomment_context" deleted\="false" description\="Comment for delegate methods" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.delegatecomment" name\="delegatecomment">/**\r\n * ${tags}\r\n * ${see_to_target}\r\n */</template></templates>
+sp_cleanup.add_default_serial_version_id=true
+sp_cleanup.add_generated_serial_version_id=false
+sp_cleanup.add_missing_annotations=true
+sp_cleanup.add_missing_deprecated_annotations=true
+sp_cleanup.add_missing_nls_tags=false
+sp_cleanup.add_missing_override_annotations=true
+sp_cleanup.add_serial_version_id=false
+sp_cleanup.always_use_blocks=true
+sp_cleanup.always_use_parentheses_in_expressions=false
+sp_cleanup.always_use_this_for_non_static_field_access=false
+sp_cleanup.always_use_this_for_non_static_method_access=false
+sp_cleanup.convert_to_enhanced_for_loop=false
+sp_cleanup.format_source_code=true
+sp_cleanup.make_local_variable_final=false
+sp_cleanup.make_parameters_final=false
+sp_cleanup.make_private_fields_final=true
+sp_cleanup.make_variable_declarations_final=true
+sp_cleanup.never_use_blocks=false
+sp_cleanup.never_use_parentheses_in_expressions=true
+sp_cleanup.on_save_use_additional_actions=true
+sp_cleanup.organize_imports=true
+sp_cleanup.qualify_static_field_accesses_with_declaring_class=false
+sp_cleanup.qualify_static_member_accesses_through_instances_with_declaring_class=true
+sp_cleanup.qualify_static_member_accesses_through_subtypes_with_declaring_class=true
+sp_cleanup.qualify_static_member_accesses_with_declaring_class=true
+sp_cleanup.qualify_static_method_accesses_with_declaring_class=false
+sp_cleanup.remove_private_constructors=true
+sp_cleanup.remove_trailing_whitespaces=true
+sp_cleanup.remove_trailing_whitespaces_all=true
+sp_cleanup.remove_trailing_whitespaces_ignore_empty=false
+sp_cleanup.remove_unnecessary_casts=true
+sp_cleanup.remove_unnecessary_nls_tags=true
+sp_cleanup.remove_unused_imports=true
+sp_cleanup.remove_unused_local_variables=false
+sp_cleanup.remove_unused_private_fields=true
+sp_cleanup.remove_unused_private_members=false
+sp_cleanup.remove_unused_private_methods=true
+sp_cleanup.remove_unused_private_types=true
+sp_cleanup.sort_members=false
+sp_cleanup.sort_members_all=false
+sp_cleanup.use_blocks=false
+sp_cleanup.use_blocks_only_for_return_and_throw=false
+sp_cleanup.use_parentheses_in_expressions=false
+sp_cleanup.use_this_for_non_static_field_access=true
+sp_cleanup.use_this_for_non_static_field_access_only_if_necessary=true
+sp_cleanup.use_this_for_non_static_method_access=true
+sp_cleanup.use_this_for_non_static_method_access_only_if_necessary=true
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java Mon Oct 15 15:52:42 2007
@@ -45,7 +45,7 @@
IUnauthorizedComponentInstantiationListener
{
/** Subclass of authenticated web session to instantiate */
- private final WeakReference<Class<? extends AuthenticatedWebSession>> webSessionClassRef;
+ private final WeakReference<Class< ? extends AuthenticatedWebSession>> webSessionClassRef;
/**
* Constructor
@@ -53,7 +53,8 @@
public AuthenticatedWebApplication()
{
// Get web session class to instantiate
- this.webSessionClassRef = new WeakReference<Class<? extends AuthenticatedWebSession>>(getWebSessionClass());
+ this.webSessionClassRef = new WeakReference<Class< ? extends AuthenticatedWebSession>>(
+ getWebSessionClass());
}
@Override
@@ -110,31 +111,31 @@
{
try
{
- return webSessionClassRef.get().getDeclaredConstructor(AuthenticatedWebApplication.class,
- Request.class).newInstance(AuthenticatedWebApplication.this, request);
+ return webSessionClassRef.get().getDeclaredConstructor(
+ AuthenticatedWebApplication.class, Request.class).newInstance(
+ AuthenticatedWebApplication.this, request);
}
catch (Exception e)
{
- throw new WicketRuntimeException(
- "Unable to instantiate web session " + webSessionClassRef.get(), e);
+ throw new WicketRuntimeException("Unable to instantiate web session " +
+ webSessionClassRef.get(), e);
}
}
/**
- * @return AuthenticatedWebSession subclass to use in this authenticated web
- * application.
+ * @return AuthenticatedWebSession subclass to use in this authenticated web application.
*/
- protected abstract Class<? extends AuthenticatedWebSession> getWebSessionClass();
+ protected abstract Class< ? extends AuthenticatedWebSession> getWebSessionClass();
/**
* @return Subclass of sign-in page
*/
- protected abstract Class<? extends WebPage> getSignInPageClass();
+ protected abstract Class< ? extends WebPage> getSignInPageClass();
/**
- * Called when an AUTHENTICATED user tries to navigate to a page that they
- * are not authorized to access. You might want to override this to navigate
- * to some explanatory page or to the application's home page.
+ * Called when an AUTHENTICATED user tries to navigate to a page that they are not authorized to
+ * access. You might want to override this to navigate to some explanatory page or to the
+ * application's home page.
*
* @param page
* The page
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java Mon Oct 15 15:52:42 2007
@@ -23,9 +23,8 @@
/**
- * Basic authenticated web session. Subclasses must provide a method that
- * authenticates the session based on a username and password, and a method
- * implementation that gets the Roles
+ * Basic authenticated web session. Subclasses must provide a method that authenticates the session
+ * based on a username and password, and a method implementation that gets the Roles
*
* @author Jonathan Locke
*/
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java Mon Oct 15 15:52:42 2007
@@ -35,7 +35,7 @@
{
this(null);
}
-
+
/**
* Constructor
*
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java Mon Oct 15 15:52:42 2007
@@ -30,11 +30,10 @@
/**
- * Reusable user sign in panel with username and password as well as support for
- * cookie persistence of the both. When the SignInPanel's form is submitted, the
- * method signIn(String, String) is called, passing the username and password
- * submitted. The signIn() method should authenticate the user's session. The
- * default implementation calls AuthenticatedWebSession.get().signIn().
+ * Reusable user sign in panel with username and password as well as support for cookie persistence
+ * of the both. When the SignInPanel's form is submitted, the method signIn(String, String) is
+ * called, passing the username and password submitted. The signIn() method should authenticate the
+ * user's session. The default implementation calls AuthenticatedWebSession.get().signIn().
*
* @author Jonathan Locke
* @author Juergen Donnerstag
@@ -104,11 +103,11 @@
{
if (signIn(getUsername(), getPassword()))
{
- onSignInSucceeded();
+ onSignInSucceeded();
}
else
{
- onSignInFailed();
+ onSignInFailed();
}
}
}
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java Mon Oct 15 15:52:42 2007
@@ -64,9 +64,9 @@
}
/**
- * Conducts a check to see if the roles object is empty. Since the roles
- * object does not contain any null values and will always hold an empty
- * string, an extra test is required beyond roles.isEmpty().
+ * Conducts a check to see if the roles object is empty. Since the roles object does not contain
+ * any null values and will always hold an empty string, an extra test is required beyond
+ * roles.isEmpty().
*
* @param roles
* the Roles object to test
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java Mon Oct 15 15:52:42 2007
@@ -17,11 +17,10 @@
package org.apache.wicket.authorization.strategies.role;
/**
- * Strategy for doing role checking. Normally, an implementation of this
- * strategy interface would look in the current session for credentials that
- * indicate what roles the current user can take on, but any kind of strategy is
- * possible. For example, you could have a role checking strategy that allowed
- * gave users the ADMIN role between 9AM and 5PM.
+ * Strategy for doing role checking. Normally, an implementation of this strategy interface would
+ * look in the current session for credentials that indicate what roles the current user can take
+ * on, but any kind of strategy is possible. For example, you could have a role checking strategy
+ * that allowed gave users the ADMIN role between 9AM and 5PM.
*
* @author Eelco Hillenius
* @author Jonathan Locke
@@ -29,14 +28,14 @@
public interface IRoleCheckingStrategy
{
/**
- * Whether any of the given roles matches. For example, if a user has role
- * USER and the provided roles are {USER, ADMIN} this method should return
- * true as the user has at least one of the roles that were provided.
+ * Whether any of the given roles matches. For example, if a user has role USER and the provided
+ * roles are {USER, ADMIN} this method should return true as the user has at least one of the
+ * roles that were provided.
*
* @param roles
* the roles
- * @return true if a user or whatever subject this implementation wants to
- * work with has at least on of the provided roles
+ * @return true if a user or whatever subject this implementation wants to work with has at
+ * least on of the provided roles
*/
boolean hasAnyRole(Roles roles);
}
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java Mon Oct 15 15:52:42 2007
@@ -31,10 +31,10 @@
public final class Roles extends HashSet<String> implements IClusterable
{
private static final long serialVersionUID = 1L;
-
+
/** USER role (for use in annotations) */
public static final String USER = "USER";
-
+
/** ADMIN role (for use in annotations) */
public static final String ADMIN = "ADMIN";
@@ -116,8 +116,8 @@
*
* @param roles
* the roles to check
- * @return true if it contains all the roles or the provided roles object is
- * null, false otherwise
+ * @return true if it contains all the roles or the provided roles object is null, false
+ * otherwise
*/
public boolean hasAllRoles(Roles roles)
{
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java Mon Oct 15 15:52:42 2007
@@ -83,7 +83,7 @@
public boolean isActionAuthorized(final Component component, final Action action)
{
// Get component's class
- final Class<? extends Component> componentClass = component.getClass();
+ final Class< ? extends Component> componentClass = component.getClass();
// Check for a single action
if (!check(action, componentClass.getAnnotation(AuthorizeAction.class)))
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java Mon Oct 15 15:52:42 2007
@@ -25,8 +25,7 @@
/**
* A mapping of 1..n roles to an action. This annotions must be embedded in the
- * {@link org.apache.wicket.authorization.strategies.role.annotations.AuthorizeActions}
- * annotation.
+ * {@link org.apache.wicket.authorization.strategies.role.annotations.AuthorizeActions} annotation.
*
* @see org.apache.wicket.authorization.IAuthorizationStrategy
* @see org.apache.wicket.authorization.strategies.role.annotations.AnnotationsRoleAuthorizationStrategy
@@ -42,9 +41,8 @@
public @interface AuthorizeAction {
/**
- * The action that is allowed. The default actions that are supported by
- * Wicket are <code>RENDER</code> and
- * <code>ENABLE<code> as defined as constants
+ * The action that is allowed. The default actions that are supported by Wicket are
+ * <code>RENDER</code> and <code>ENABLE<code> as defined as constants
* of {@link org.apache.wicket.Component}.
*
* @see org.apache.wicket.Component#RENDER
@@ -57,16 +55,16 @@
/**
* The roles for this action.
*
- * @return the roles for this action. The default is an empty string
- * (annotations do not allow null default values)
+ * @return the roles for this action. The default is an empty string (annotations do not allow
+ * null default values)
*/
String[] roles() default "";
/**
* The roles to deny for this action.
*
- * @return the roles to deny for this action. The default is an empty string
- * (annotations do not allow null default values)
+ * @return the roles to deny for this action. The default is an empty string (annotations do not
+ * allow null default values)
*/
String[] deny() default "";
}
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java Mon Oct 15 15:52:42 2007
@@ -24,13 +24,12 @@
import java.lang.annotation.Target;
/**
- * Groups a set (technically an array) of {@link AuthorizeAction}s for
- * authorization. This annotation works on a class level, and can be used like
- * this:
+ * Groups a set (technically an array) of {@link AuthorizeAction}s for authorization. This
+ * annotation works on a class level, and can be used like this:
*
* <pre>
* // A panel that is only visible for users with role ADMIN
- * @AuthorizeAction(action = "RENDER", roles = { "ADMIN", "USER" })
+ * @AuthorizeAction(action = "RENDER", roles = { "ADMIN", "USER" })
* public class ForAdminsAndUsers extends Panel
* {
* public ForAdminsAndUsers(String id)
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java Mon Oct 15 15:52:42 2007
@@ -24,14 +24,13 @@
import java.lang.annotation.Target;
/**
- * Annotation for configuring what roles are allowed for instantiation the
- * annotated component or package. This annotation can be used for classes and
- * packages, and can be used like this:
+ * Annotation for configuring what roles are allowed for instantiation the annotated component or
+ * package. This annotation can be used for classes and packages, and can be used like this:
*
* <pre>
* // only users with role ADMIN are allowed to create instances of this page, whether it is
* // either bookmarkable or not
- * @AuthorizeInstantiation("ADMIN")
+ * @AuthorizeInstantiation("ADMIN")
* public class AdminAnnotationsBookmarkablePage extends WebPage
* </pre>
*
@@ -51,8 +50,7 @@
/**
* Gets the roles that are allowed to take the action.
*
- * @return the roles that are allowed. Returns a zero length array by
- * default
+ * @return the roles that are allowed. Returns a zero length array by default
*/
String[] value() default {};
}
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java Mon Oct 15 15:52:42 2007
@@ -25,10 +25,9 @@
/**
- * For each Action, holds a set of roles that can perform that action. Roles can
- * be granted access to a given action via authorize(Action, String role) and
- * denied access via unauthorize(Action, String role). All permissions can be
- * removed for a given action via authorizeAll(Action).
+ * For each Action, holds a set of roles that can perform that action. Roles can be granted access
+ * to a given action via authorize(Action, String role) and denied access via unauthorize(Action,
+ * String role). All permissions can be removed for a given action via authorizeAll(Action).
*
* @author Eelco Hillenius
* @author Jonathan Locke
@@ -49,7 +48,7 @@
* The roles
*/
public final void authorize(final Action action, final Roles rolesToAdd)
- {
+ {
if (action == null)
{
throw new IllegalArgumentException("Argument action cannot be null");
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java Mon Oct 15 15:52:42 2007
@@ -25,11 +25,10 @@
/**
- * An internal data structure that maps a given component class to a set of role
- * strings. Permissions can be granted to instantiate a given component class
- * via authorize(Class, Roles roles) and denied via unauthorize(Class, Roles
- * roles). All authorization can be removed for a given class with
- * authorizeAll(Class).
+ * An internal data structure that maps a given component class to a set of role strings.
+ * Permissions can be granted to instantiate a given component class via authorize(Class, Roles
+ * roles) and denied via unauthorize(Class, Roles roles). All authorization can be removed for a
+ * given class with authorizeAll(Class).
*
* @author Eelco Hillenius
* @author Jonathan Locke
@@ -92,8 +91,8 @@
*
* @param componentClass
* the component class
- * @return the roles that have a binding with the given component class, or
- * null if no entries are found
+ * @return the roles that have a binding with the given component class, or null if no entries
+ * are found
*/
public Roles authorizedRoles(final Class< ? extends Component> componentClass)
{
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java Mon Oct 15 15:52:42 2007
@@ -26,11 +26,10 @@
/**
- * Strategy that uses the Wicket metadata facility to check authorization. The
- * static <code>authorize</code> methods are for authorizing component actions
- * and component instantiation by role. This class is is the main entry point
- * for users wanting to use the roles-based authorization of the
- * wicket-auth-roles package based on wicket metadata.
+ * Strategy that uses the Wicket metadata facility to check authorization. The static
+ * <code>authorize</code> methods are for authorizing component actions and component
+ * instantiation by role. This class is is the main entry point for users wanting to use the
+ * roles-based authorization of the wicket-auth-roles package based on wicket metadata.
*
* For instance, use like:
*
@@ -54,9 +53,8 @@
public class MetaDataRoleAuthorizationStrategy extends AbstractRoleAuthorizationStrategy
{
/**
- * Component meta data key for ations/ roles information. Typically, you do
- * not need to use this meta data key directly, but instead use one of the
- * bind methods of this class.
+ * Component meta data key for ations/ roles information. Typically, you do not need to use this
+ * meta data key directly, but instead use one of the bind methods of this class.
*/
public static final MetaDataKey ACTION_PERMISSIONS = new MetaDataKey(ActionPermissions.class)
{
@@ -64,9 +62,8 @@
};
/**
- * Application meta data key for ations/ roles information. Typically, you
- * do not need to use this meta data key directly, but instead use one of
- * the bind methods of this class.
+ * Application meta data key for ations/ roles information. Typically, you do not need to use
+ * this meta data key directly, but instead use one of the bind methods of this class.
*/
public static final MetaDataKey INSTANTIATION_PERMISSIONS = new MetaDataKey(
InstantiationPermissions.class)
@@ -78,15 +75,14 @@
public static final String NO_ROLE = "wicket:NO_ROLE";
/**
- * Authorizes the given role to create component instances of type
- * componentClass. This authorization is added to any previously authorized
- * roles.
+ * Authorizes the given role to create component instances of type componentClass. This
+ * authorization is added to any previously authorized roles.
*
* @param componentClass
* The component type that is subject for the authorization
* @param roles
- * The comma separated roles that are authorized to create
- * component instances of type componentClass
+ * The comma separated roles that are authorized to create component instances of
+ * type componentClass
*/
public static final void authorize(final Class< ? extends Component> componentClass,
final String roles)
@@ -103,8 +99,7 @@
}
/**
- * Authorizes the given role to perform the given action on the given
- * component.
+ * Authorizes the given role to perform the given action on the given component.
*
* @param component
* The component that is subject to the authorization
@@ -127,8 +122,7 @@
}
/**
- * Grants permission to all roles to create instances of the given component
- * class.
+ * Grants permission to all roles to create instances of the given component class.
*
* @param componentClass
* The component class
@@ -145,8 +139,7 @@
}
/**
- * Grants permission to all roles to perform the given action on the given
- * component.
+ * Grants permission to all roles to perform the given action on the given component.
*
* @param component
* The component that is subject to the authorization
@@ -164,19 +157,17 @@
}
/**
- * Removes permission for the given roles to create instances of the given
- * component class. There is no danger in removing authorization by calling
- * this method. If the last authorization grant is removed for a given
- * componentClass, the internal role NO_ROLE will automatically be added,
- * effectively denying access to all roles (if this was not done, all roles
- * would suddenly have access since no authorization is equivalent to full
- * access).
+ * Removes permission for the given roles to create instances of the given component class.
+ * There is no danger in removing authorization by calling this method. If the last
+ * authorization grant is removed for a given componentClass, the internal role NO_ROLE will
+ * automatically be added, effectively denying access to all roles (if this was not done, all
+ * roles would suddenly have access since no authorization is equivalent to full access).
*
* @param componentClass
* The component type
* @param roles
- * The comma separated list of roles that are no longer to be
- * authorized to create instances of type componentClass
+ * The comma separated list of roles that are no longer to be authorized to create
+ * instances of type componentClass
*/
public static final void unauthorize(final Class< ? extends Component> componentClass,
final String roles)
@@ -190,21 +181,19 @@
}
/**
- * Removes permission for the given role to perform the given action on the
- * given component. There is no danger in removing authorization by calling
- * this method. If the last authorization grant is removed for a given
- * action, the internal role NO_ROLE will automatically be added,
- * effectively denying access to all roles (if this was not done, all roles
- * would suddenly have access since no authorization is equivalent to full
- * access).
+ * Removes permission for the given role to perform the given action on the given component.
+ * There is no danger in removing authorization by calling this method. If the last
+ * authorization grant is removed for a given action, the internal role NO_ROLE will
+ * automatically be added, effectively denying access to all roles (if this was not done, all
+ * roles would suddenly have access since no authorization is equivalent to full access).
*
* @param component
* The component
* @param action
* The action
* @param roles
- * The comma separated list of roles that are no longer allowed
- * to perform the given action
+ * The comma separated list of roles that are no longer allowed to perform the given
+ * action
*/
public static final void unauthorize(final Component component, final Action action,
final String roles)
@@ -218,8 +207,8 @@
}
/**
- * Grants authorization to instantiate the given class to just the role
- * NO_ROLE, effectively denying all other roles.
+ * Grants authorization to instantiate the given class to just the role NO_ROLE, effectively
+ * denying all other roles.
*
* @param componentClass
* The component class
@@ -231,8 +220,8 @@
}
/**
- * Grants authorization to perform the given action to just the role
- * NO_ROLE, effectively denying all other roles.
+ * Grants authorization to perform the given action to just the role NO_ROLE, effectively
+ * denying all other roles.
*
* @param component
* the component that is subject to the authorization
@@ -257,8 +246,7 @@
}
/**
- * Uses component level meta data to match roles for component action
- * execution.
+ * Uses component level meta data to match roles for component action execution.
*
* @see org.apache.wicket.authorization.IAuthorizationStrategy#isActionAuthorized(org.apache.wicket.Component,
* org.apache.wicket.authorization.Action)
@@ -283,8 +271,7 @@
}
/**
- * Uses application level meta data to match roles for component
- * instantiation.
+ * Uses application level meta data to match roles for component instantiation.
*
* @see org.apache.wicket.authorization.IAuthorizationStrategy#isInstantiationAuthorized(java.lang.Class)
*/
@@ -299,8 +286,8 @@
// as long as the interface does not use generics, we should check this
if (!Component.class.isAssignableFrom(componentClass))
{
- throw new IllegalArgumentException("argument componentClass must be of type "
- + Component.class.getName());
+ throw new IllegalArgumentException("argument componentClass must be of type " +
+ Component.class.getName());
}
final Roles roles = rolesAuthorizedToInstantiate(componentClass);
@@ -312,13 +299,12 @@
}
/**
- * Gets the roles for creation of the given component class, or null if none
- * were registered.
+ * Gets the roles for creation of the given component class, or null if none were registered.
*
* @param componentClass
* the component class
- * @return the roles that are authorized for creation of the componentClass,
- * or null if no specific authorization was configured
+ * @return the roles that are authorized for creation of the componentClass, or null if no
+ * specific authorization was configured
*/
private static Roles rolesAuthorizedToInstantiate(
final Class< ? extends Component> componentClass)
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java Mon Oct 15 15:52:42 2007
@@ -38,9 +38,9 @@
*/
public class AnnotationsRoleTest extends TestCase
{
- WicketTester tester;
+ WicketTester tester;
- /**
+ /**
* Construct.
*/
public AnnotationsRoleTest()
@@ -58,14 +58,18 @@
super(arg0);
}
- @Override
- protected void setUp() throws Exception {
- tester = new WicketTester();
- }
- @Override
- protected void tearDown() throws Exception {
- tester.destroy();
- }
+ @Override
+ protected void setUp() throws Exception
+ {
+ tester = new WicketTester();
+ }
+
+ @Override
+ protected void tearDown() throws Exception
+ {
+ tester.destroy();
+ }
+
/**
* @throws Exception
*/
@@ -123,7 +127,8 @@
}
}
Listener listener = new Listener();
- tester.getApplication().getSecuritySettings().setUnauthorizedComponentInstantiationListener(listener);
+ tester.getApplication().getSecuritySettings()
+ .setUnauthorizedComponentInstantiationListener(listener);
try
{
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java Mon Oct 15 15:52:42 2007
@@ -38,6 +38,7 @@
/**
* Construct.
+ *
* @param arg0
*/
public ActionPermissionsTest(String arg0)
Modified: wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java
URL: http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java (original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java Mon Oct 15 15:52:42 2007
@@ -16,12 +16,10 @@
*/
package org.apache.wicket.util.license;
-import org.apache.wicket.util.license.ApacheLicenseHeaderTestCase;
/**
- * Test that the license headers are in place in this project. The tests are run
- * from {@link ApacheLicenseHeaderTestCase}, but you can add project specific
- * tests here if needed.
+ * Test that the license headers are in place in this project. The tests are run from
+ * {@link ApacheLicenseHeaderTestCase}, but you can add project specific tests here if needed.
*
* @author Frank Bille Jensen (frankbille)
*/
@@ -32,20 +30,16 @@
*/
public ApacheLicenceHeaderTest()
{
-// addHeaders = true;
-
+ // addHeaders = true;
+
/*
* License header in test files lower the visibility of the test.
*/
- htmlIgnore = new String[] {
- "src/test/java"
- };
-
+ htmlIgnore = new String[] { "src/test/java" };
+
/*
* Low level configuration files for logging. No license needed.
*/
- propertiesIgnore = new String[] {
- "src/test/java"
- };
+ propertiesIgnore = new String[] { "src/test/java" };
}
}